{"id":8551,"date":"2021-08-02T01:49:01","date_gmt":"2021-08-01T23:49:01","guid":{"rendered":"https:\/\/maxxys.de\/endpoint-protection\/"},"modified":"2025-01-10T15:00:24","modified_gmt":"2025-01-10T14:00:24","slug":"endpoint-protection","status":"publish","type":"page","link":"https:\/\/maxxys.de\/en\/solutions\/endpoint-protection\/","title":{"rendered":"Endpoint Protection"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"8551\" class=\"elementor elementor-8551 elementor-1593\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ae085bb e-flex e-con-boxed e-con e-parent\" data-id=\"ae085bb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;pyramids&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M761.9,44.1L643.1,27.2L333.8,98L0,3.8V0l1000,0v3.9\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eac5dc0 elementor-widget elementor-widget-heading\" data-id=\"eac5dc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Best Practice Endpoint Protection<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5893526 e-flex e-con-boxed e-con e-parent\" data-id=\"5893526\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7a2626 elementor-widget elementor-widget-heading\" data-id=\"c7a2626\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Standardized Endpoint Protection for optimal IT security of your IT landscape<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67ea4e9 elementor-widget elementor-widget-text-editor\" data-id=\"67ea4e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the digital age, the IT security of end devices is of fundamental importance and crucial for your company&#8217;s competitiveness. The endpoint protection solutions from our IT consulting company are designed not only to protect the physical aspects, but also to focus in particular on protecting your intellectual property. The IT security of your IT and Cloud infrastructure is our top priority. <strong>Centralized IT security monitoring gives you complete transparency<\/strong> about the maturity level of IT security in your IT landscape.<\/p><p>Endpoint Protection solutions are the best practice method for protecting every single end device in your IT infrastructure network and ensuring that all devices accessing your network are secure. Endpoint protection is therefore a crucial part of IT security operations and IT security monitoring to meet your company&#8217;s IT security requirements.<\/p><p><strong>User administration and authorizations<\/strong> are important in the area of Endpoint Protection. With central user management and authorization, you can&#8230;<\/p><ul><li>control who can access which resources in your network and IT infrastructure.<\/li><li>minimize the risk of internal threats.<\/li><li>ensure that only those who really need access to sensitive information have it.<\/li><\/ul><p>Today, IT security is an essential prerequisite for sustainable and profitable business. We are convinced that a strong security foundation not only helps to protect your company from threats, but also plays an important role in successfully mastering future challenges, such as the <strong>scalability of end devices<\/strong>. The Endpoint Protection solution from our IT consulting company can be dynamically adapted to the requirements of your organization and your IT security.<\/p><p>Take the next step towards secure endpoints and IT security operations. Contact us to benefit from a customized Endpoint Protection solution.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a486ed elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1a486ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/maxxys.de\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cd45c61 e-flex e-con-boxed e-con e-parent\" data-id=\"cd45c61\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd92486 elementor-widget elementor-widget-heading\" data-id=\"fd92486\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Centralized Endpoint Protection for secure, efficient working in a mobile world<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8034ea elementor-widget elementor-widget-text-editor\" data-id=\"e8034ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">As part of the digital transformation to a Cloud infrastructure and the scaling of the company, the complexity of the IT infrastructure and end devices is growing. At the same time, the number of cyber attacks is constantly increasing. As an IT consulting company, we are aware of these challenges and support you with a seamlessly integrated Endpoint Protection solution as the basis for your IT security operations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7143cd6 e-grid e-con-full e-con e-child\" data-id=\"7143cd6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46e2ef9 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"46e2ef9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-lock\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M400 224h-24v-72C376 68.2 307.8 0 224 0S72 68.2 72 152v72H48c-26.5 0-48 21.5-48 48v192c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V272c0-26.5-21.5-48-48-48zm-104 0H152v-72c0-39.7 32.3-72 72-72s72 32.3 72 72v72z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSecurity for end devices\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tThe end devices in the IT landscape provide access to your company network. High IT security requirements should therefore be defined for end devices in particular so that they do not serve as a \"gateway\" in the event of a cyber attack. With the help of Endpoint Protection, you can ensure that all end devices in your network are equipped with the defined guidelines as part of IT security operations. The IT security monitoring of the Endpoint Protection solution gives you complete transparency about the security level of the end devices to prevent security breaches.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46e1113 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"46e1113\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tBusiness Continuity Management (BCM)\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tIn the event of a security breach, an end device in your IT infrastructure would be a potential \"gateway\" into the company network. Implementing Endpoint Protection gives your IT security operations team a holistic overview of the IT security level of the endpoints within your environment. In the event of a potential cyber attack, IT security monitoring would help you to identify the affected device in the shortest possible time and isolate it from the network. This reduces the extent of the security breach and the impact on your company's ability to do business.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aeb465f elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"aeb465f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-laptop\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M624 416H381.54c-.74 19.81-14.71 32-32.74 32H288c-18.69 0-33.02-17.47-32.77-32H16c-8.8 0-16 7.2-16 16v16c0 35.2 28.8 64 64 64h512c35.2 0 64-28.8 64-64v-16c0-8.8-7.2-16-16-16zM576 48c0-26.4-21.6-48-48-48H112C85.6 0 64 21.6 64 48v336h512V48zm-64 272H128V64h384v256z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tScalability\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tIn a dynamic working environment, the number of end devices in the IT infrastructure is constantly scaling. This makes it all the more important that the Endpoint Protection solution scales with your business requirements in order to guarantee the IT security of your IT landscape. Our endpoint protection and management solution integrates seamlessly into your environment and adapts flexibly to your IT security operations requirements.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4dc77f elementor-widget elementor-widget-text-editor\" data-id=\"b4dc77f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">As an IT consulting company, we support you in integrating a reliable and centralized Endpoint Protection solution into your IT infrastructure. Gain complete transparency about the IT security level of your end devices with the help of IT security monitoring.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40499bc elementor-align-center elementor-widget elementor-widget-button\" data-id=\"40499bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/maxxys.de\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-289131b e-flex e-con-boxed e-con e-parent\" data-id=\"289131b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e61c434 elementor-widget elementor-widget-heading\" data-id=\"e61c434\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Increase IT security in your company with a combination of security awareness and Endpoint Protection<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d86552 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"3d86552\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Ebene_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 490 490\" style=\"enable-background:new 0 0 490 490;\" xml:space=\"preserve\"><path d=\"M206.7,397.7c17.9,0,32.4-14.5,32.4-32.4c0-17.9-14.5-32.4-32.4-32.4s-32.4,14.5-32.4,32.4  C174.3,383.1,188.8,397.6,206.7,397.7z M206.7,346.8c10.2,0,18.4,8.3,18.4,18.4s-8.3,18.4-18.4,18.4s-18.4-8.3-18.4-18.4  C188.3,355,196.5,346.8,206.7,346.8z\"><\/path><path d=\"M152.2,423.8v44.9c0,3.9,3.2,6.6,7,6.6h94.9c1.8,0.1,3.6-0.6,4.9-1.8c1.3-1.2,2.1-3,2.1-4.8v-44.9c0-7.9-3.2-15.4-8.8-20.9  c-5.6-5.5-13.2-8.6-21.1-8.5c-2.2-0.1-4.3,0.9-5.6,2.6c-1.4,1.9-3.1,3.5-5,4.9c-10.5,7.6-25.1,5.4-32.9-4.9  c-1.3-1.7-3.4-2.7-5.6-2.7c-7.9-0.1-15.5,3-21.1,8.5C155.4,408.4,152.2,415.9,152.2,423.8z M166.2,423.8c0-7.6,5.4-14.1,12.8-15.6  c7.1,7.8,17.1,12.2,27.6,12.2c10.5,0,20.5-4.4,27.6-12.2c7.4,1.5,12.8,8,12.8,15.6v37.5h-81V423.8z\"><\/path><path d=\"M321.3,397.7c17.9,0,32.4-14.5,32.4-32.4c0-17.9-14.5-32.4-32.4-32.4s-32.4,14.5-32.4,32.4  C288.9,383.1,303.4,397.6,321.3,397.7z M321.3,346.8c10.2,0,18.4,8.3,18.4,18.4s-8.3,18.4-18.4,18.4s-18.4-8.3-18.4-18.4  C302.9,355,311.1,346.8,321.3,346.8z\"><\/path><path d=\"M267.1,423.8v44.9c-0.1,1.8,0.6,3.5,1.9,4.8c1.3,1.2,3,1.9,4.8,1.8h94.9c3.9,0,7.3-2.7,7.3-6.6v-44.9  c0-16.5-13.7-29.4-30.2-29.4c-2.2-0.1-4.3,0.9-5.6,2.6c-1.4,1.9-3.1,3.5-5,4.9c-10.5,7.6-25.1,5.4-32.9-4.9  c-1.3-1.7-3.4-2.7-5.6-2.7c-7.8-0.1-15.4,3-21,8.5C270.2,408.4,267.1,416,267.1,423.8z M281.1,423.8c-0.1-7.6,5.3-14.1,12.7-15.6  c12.9,14.1,34.4,16.2,49.8,4.9c2-1.4,3.9-3.1,5.6-4.9c7.5,1.5,12.9,8,13,15.6v37.5h-81V423.8z\"><\/path><path d=\"M435.9,397.7c17.9,0,32.4-14.5,32.4-32.4c0-17.9-14.5-32.4-32.4-32.4c-17.9,0-32.4,14.5-32.4,32.4  C403.5,383.1,418,397.6,435.9,397.7z M435.9,346.8c10.2,0,18.4,8.3,18.4,18.4s-8.3,18.4-18.4,18.4c-10.2,0-18.4-8.3-18.4-18.4  C417.5,355,425.8,346.8,435.9,346.8z\"><\/path><path d=\"M460.5,394.4c-2.2-0.1-4.3,0.9-5.6,2.6c-1.4,1.9-3.1,3.5-5,4.9c-10.4,7.7-25.1,5.6-32.9-4.9c-1.3-1.7-3.4-2.7-5.6-2.7  c-16.5,0-30.3,13-30.3,29.4v44.9c0,3.9,3.5,6.6,7.4,6.6h94.9c1.8,0.1,3.5-0.6,4.7-1.8c1.3-1.3,1.9-3,1.9-4.7v-44.9  c0.1-7.8-3-15.4-8.6-20.9C475.9,397.4,468.4,394.3,460.5,394.4L460.5,394.4z M463.4,408.2c7.4,1.5,12.7,8,12.6,15.6v37.5h-81v-37.5  c0.1-7.6,5.5-14.1,13-15.6c7.1,7.7,17.1,12.1,27.6,12.1S456.3,416,463.4,408.2L463.4,408.2z\"><\/path><path d=\"M86.7,107.3c21.8,0,39.5-17.7,39.5-39.6v-13c0-21.8-17.7-39.5-39.5-39.5S47.3,32.9,47.3,54.8v13  C47.2,89.6,64.9,107.3,86.7,107.3z M61.2,54.8c0-14.1,11.4-25.5,25.5-25.5c14.1,0,25.5,11.4,25.5,25.5v13  c0,14.1-11.4,25.5-25.5,25.5c-14.1,0-25.5-11.4-25.5-25.5V54.8z\"><\/path><path d=\"M0.3,252c0,6.5,2.6,12.8,7.2,17.4c4.7,4.6,11,7.1,17.5,7h0l0.3,0.2c4.3,0,8.5-1.2,12.2-3.3l4.4,149.7  c0.4,10.7,7.2,20.2,17.3,23.9c10.1,3.7,21.4,1,28.7-6.9c7.3,7.9,18.6,10.7,28.7,6.9c10.1-3.7,16.9-13.2,17.3-23.9l4.4-149.4  c3.7,2.1,7.9,3.2,12.1,3.2c6.6,0,12.9-2.7,17.6-7.3c4.7-4.7,7.3-11,7.2-17.6v-99.8c2.2-22.3-14-42.1-36.3-44.4  c-1.3-0.1-2.7-0.2-4-0.2h-17.2c-1.8,0-3.5,0.7-4.8,1.9l-25,23.5l-24.1-23.4c-1.3-1.3-3.1-2-4.9-2H40.7c-10.8,0-21.2,4.3-28.9,12  C4.2,127.2,0,137.6,0,148.4c0,1.2,0.3,2.5,0.3,3.8V252z M107.5,434.7c-3.3,0-6.4-1.3-8.7-3.7c-2.3-2.3-3.6-5.5-3.6-8.8V275  c0-3.9-3.1-7-7-7c-3.9,0-7,3.1-7,7v147.1c-0.1,6.8-5.6,12.4-12.4,12.5c-6.8,0.1-12.5-5.2-12.8-12.1l-5.2-172.1h74.1l-5,172.1  C119.7,429.3,114.3,434.6,107.5,434.7z M21.7,129.4c5-5.1,11.9-7.9,19-7.9h15.4l26.8,26.1c0,0,0.1,0.1,0.1,0.1  c0.1,0.1,0.2,0.2,0.3,0.3c0.1,0.1,0.2,0.1,0.3,0.2c0.1,0.1,0.2,0.1,0.3,0.2c0.1,0.1,0.2,0.1,0.3,0.2c0.1,0.1,0.2,0.1,0.3,0.2  s0.2,0.1,0.3,0.2c0.1,0.1,0.2,0.1,0.3,0.1c0.1,0,0.2,0.1,0.3,0.1c0.1,0,0.2,0.1,0.3,0.1c0.1,0,0.2,0.1,0.3,0.1c0.1,0,0.2,0,0.3,0.1  c0.1,0,0.2,0,0.3,0.1c0.1,0,0.2,0,0.3,0c0.1,0,0.2,0,0.3,0c0.1,0,0.2,0,0.3,0h0.3c0.1,0,0.2,0,0.3,0c0.1,0,0.2,0,0.3,0  c0.1,0,0.2,0,0.3-0.1c0.1,0,0.2,0,0.3-0.1c0.1,0,0.2-0.1,0.3-0.1c0.1,0,0.2-0.1,0.3-0.1c0.1,0,0.2-0.1,0.3-0.1  c0.1,0,0.2-0.1,0.3-0.1c0.1,0,0.2-0.1,0.3-0.2c0.1-0.1,0.2-0.1,0.3-0.2c0.1-0.1,0.2-0.1,0.3-0.2c0.1-0.1,0.2-0.1,0.3-0.2  c0.1-0.1,0.2-0.1,0.3-0.2s0.2-0.2,0.3-0.2c0.1,0,0.1-0.1,0.2-0.2l27.9-26.2h14.4c8,0.1,15.6,3.8,20.8,9.9c4.5,5.5,6.5,12.6,5.7,19.7  c0,0.2-0.2,0.5-0.2,0.7V252c0,6.1-4.9,11-11,11c-6.1,0-11-4.9-11-11v-21.8l0.1-3.5c0-0.5-0.1-1-0.1-1.4V185c0-3.9-3.1-7-7-7  c-3.9,0-7,3.1-7,7v45l0.1,6.5H50.4l-0.2-10.3c0-0.3,0-0.6,0-0.9V185c0-3.9-3.1-7-7-7c-3.9,0-7,3.1-7,7v66.5c0,2.9-1.2,5.7-3.3,7.8  c-2.1,2.1-4.9,3.2-7.8,3.2H25c-2.8,0.1-5.6-1-7.6-3c-2-2-3.1-4.7-3.1-7.5V151.9c0-0.2-0.1-0.5-0.1-0.7c-0.1-0.9-0.2-1.8-0.2-2.7  C13.9,141.3,16.7,134.5,21.7,129.4z\"><\/path><path d=\"M190.2,78.6h11v142.9c0,7.5,3,14.6,8.3,19.8c5.3,5.3,12.4,8.2,19.9,8.1h88l-48.5,43.3c-2.2,1.9-2.9,5-1.9,7.7  c1,2.7,3.6,4.5,6.5,4.5c1.7,0,3.4-0.6,4.6-1.8l53.6-47.8l53.6,47.8c2.9,2.6,7.3,2.3,9.9-0.6c2.6-2.9,2.3-7.4-0.6-10l-48.5-43.3h88  c7.4,0,14.5-2.9,19.8-8.2c5.2-5.3,8.1-12.4,8.1-19.8V78.6h11.7c4-0.1,7.1-3.2,7.3-7.2v-48c-0.1-3.9-3.4-6.9-7.3-6.8H190.2  c-1.8-0.1-3.6,0.6-4.9,1.9c-1.3,1.3-2.1,3-2.1,4.8v48C183.2,75.3,186.3,78.5,190.2,78.6z M448,221.5c0.1,3.7-1.4,7.3-4,9.9  c-2.6,2.6-6.2,4.1-9.9,4.1H229.4c-3.7,0-7.3-1.4-10-4c-2.7-2.6-4.2-6.2-4.2-10V78.6H448V221.5z M197.2,30.6H467v34H197.2V30.6z\"><\/path><path d=\"M247.1,133.5h128.9c3.9,0,7-3.1,7-7c0-3.9-3.1-7-7-7H247.1c-3.9,0-7,3.1-7,7C240.1,130.4,243.3,133.5,247.1,133.5z\"><\/path><path d=\"M247.1,161.5H417c3.9,0,7-3.1,7-7c0-3.9-3.1-7-7-7H247.1c-3.9,0-7,3.1-7,7C240.1,158.4,243.3,161.5,247.1,161.5z\"><\/path><path d=\"M247.1,188.5H417c3.9,0,7-3.1,7-7c0-3.9-3.1-7-7-7H247.1c-3.9,0-7,3.1-7,7C240.1,185.4,243.3,188.5,247.1,188.5z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSecurity awareness - strong security awareness for your team\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1c65511 e-grid e-con-boxed e-con e-child\" data-id=\"1c65511\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4679eda elementor-widget elementor-widget-icon-box\" data-id=\"4679eda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tVigilance and employee training increase the level of security\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tRobust IT security requires not only technical protective measures, such as Endpoint Protection, but above all sensitizing your employees to security risks. We support you with targeted campaigns to raise your employees' awareness of potential dangers.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3913bce elementor-widget elementor-widget-icon-box\" data-id=\"3913bce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tStrengthen understanding of security\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tEvery single employee plays an important role in defending against cyber threats. It is therefore essential that each individual understands the risks and knows how to minimize them. We rely on individual training and education to deepen your employees' understanding of security and improve their ability to recognize potential threats and respond to them correctly.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afbaf1a elementor-widget elementor-widget-icon-box\" data-id=\"afbaf1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tRobust \"human firewall\" through targeted training\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tPeople are usually the weakest link in the security chain. Targeted training and courses help to sensitize your employees to IT security and train them to become a strong \"human firewall\". The concept is based on strengthening the security culture in your company by utilizing and expanding the skills and knowledge of each individual employee. The aim is to create an environment in which every employee proactively contributes to IT security.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8b5a7c3 e-flex e-con-boxed e-con e-parent\" data-id=\"8b5a7c3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-537f580 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"537f580\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xmlns:serif=\"http:\/\/www.serif.com\/\" width=\"100%\" height=\"100%\" viewBox=\"0 0 205 128\" xml:space=\"preserve\" style=\"fill-rule:evenodd;clip-rule:evenodd;stroke-linejoin:round;stroke-miterlimit:2;\">    <g transform=\"matrix(1,0,0,1,-152.299,-116.781)\">        <g>            <clipPath id=\"_clip1\">                <rect x=\"152.291\" y=\"116.781\" width=\"204\" height=\"127.5\"><\/rect>            <\/clipPath>            <g clip-path=\"url(#_clip1)\">                <g transform=\"matrix(1.59628,0,0,-1.59654,152.299,404.158)\">                    <path d=\"M126,104L2,104C0.9,104 0,103.1 0,102C0,100.9 0.9,100 2,100L126,100C127.1,100 128,100.9 128,102C128,103.1 127.1,104 126,104Z\" style=\"fill-rule:nonzero;\"><\/path>                <\/g>                <g transform=\"matrix(1.59628,0,0,-1.59654,152.299,244.504)\">                    <path d=\"M61,54C59.9,54 59,53.1 59,52C59,50.9 59.9,50 61,50L67,50C68.1,50 69,50.9 69,52C69,53.1 68.1,54 67,54L61,54Z\" style=\"fill-rule:nonzero;\"><\/path>                <\/g>                <g transform=\"matrix(1.59628,0,0,-1.59654,152.299,270.048)\">                    <path d=\"M12,24L40,24C39.1,25.2 38.5,26.5 38.2,28L12,28C10.9,28 10,28.9 10,30L10,90C10,91.1 10.9,92 12,92L116,92C117.1,92 118,91.1 118,90L118,30C118,28.9 117.1,28 116,28L99.8,28C99.5,26.5 98.9,25.2 98,24L116,24C119.3,24 122,26.7 122,30L122,90C122,93.3 119.3,96 116,96L12,96C8.7,96 6,93.3 6,90L6,30C6,26.7 8.7,24 12,24Z\" style=\"fill-rule:nonzero;\"><\/path>                <\/g>                <g transform=\"matrix(1.59628,0,0,-1.59654,152.299,298.786)\">                    <path d=\"M82,90L82,82L86,82L86,90C86,93.3 83.3,96 80,96L48,96C44.7,96 42,93.3 42,90L42,48C42,44.7 44.7,42 48,42L70,42C69.1,43.2 68.5,44.5 68.2,46L48,46C46.9,46 46,46.9 46,48L46,90C46,91.1 46.9,92 48,92L80,92C81.1,92 82,91.1 82,90Z\" style=\"fill-rule:nonzero;\"><\/path>                <\/g>                <g transform=\"matrix(1.59628,0,0,-1.59654,152.299,327.524)\">                    <path d=\"M76,60L92,60C94.2,60 96,61.8 96,64L96,92C96,94.2 94.2,96 92,96L76,96C73.8,96 72,94.2 72,92L72,64C72,61.8 73.8,60 76,60ZM76,92L92,92L92,64L76,64L76,92Z\" style=\"fill-rule:nonzero;\"><\/path>                <\/g>                <g transform=\"matrix(1.59628,0,0,-1.59654,152.299,359.455)\">                    <path d=\"M85,90L83,90C81.9,90 81,89.1 81,88C81,86.9 81.9,86 83,86L85,86C86.1,86 87,86.9 87,88C87,89.1 86.1,90 85,90Z\" style=\"fill-rule:nonzero;\"><\/path>                <\/g>                <g transform=\"matrix(1.59628,0,0,-1.59654,152.299,180.642)\">                    <path d=\"M66,32C66,31.735 65.949,31.48 65.848,31.235C65.746,30.99 65.602,30.773 65.414,30.586C65.227,30.398 65.01,30.254 64.765,30.152C64.52,30.051 64.265,30 64,30C63.735,30 63.48,30.051 63.235,30.152C62.99,30.254 62.773,30.398 62.586,30.586C62.398,30.773 62.254,30.99 62.152,31.235C62.051,31.48 62,31.735 62,32C62,32.265 62.051,32.52 62.152,32.765C62.254,33.01 62.398,33.227 62.586,33.414C62.773,33.602 62.99,33.746 63.235,33.848C63.48,33.949 63.735,34 64,34C64.265,34 64.52,33.949 64.765,33.848C65.01,33.746 65.227,33.602 65.414,33.414C65.602,33.227 65.746,33.01 65.848,32.765C65.949,32.52 66,32.265 66,32Z\" style=\"fill-rule:nonzero;\"><\/path>                <\/g>            <\/g>        <\/g>    <\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tDrive &amp; Device Control - Control of drives and devices\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa44964 e-grid e-con-boxed e-con e-child\" data-id=\"fa44964\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b8fedc elementor-widget elementor-widget-icon-box\" data-id=\"5b8fedc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tWhitelisting\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWhitelisting as part of IT Security Operations allows you to grant only trusted drives and devices access to the network. Advanced technologies such as machine learning are used to make and optimize decisions about trustworthiness.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61bc423 elementor-widget elementor-widget-icon-box\" data-id=\"61bc423\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tFile encryption\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWe guarantee secure file encryption, regardless of whether your data is stored in the Cloud, on servers, desktops or laptops. In this way, you ensure IT security for your most valuable resources - your data.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b567b4 elementor-widget elementor-widget-icon-box\" data-id=\"9b567b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAccess rights\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWe enable the assignment of specific, user- and group-based access rights. This gives you full control over who can access what data.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-138eaf1 elementor-widget elementor-widget-icon-box\" data-id=\"138eaf1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSelf-service function\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tCentralized key management with a self-service function enables users to manage their digital keys themselves while maintaining the highest IT security standards.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e121a8e elementor-widget elementor-widget-icon-box\" data-id=\"e121a8e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tEncryption 2-Go\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWith \"Encryption 2-Go\", we encrypt data on external drives and data carriers securely and transparently. This method protects your data regardless of where it is stored.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cdf4d02 elementor-widget elementor-widget-icon-box\" data-id=\"cdf4d02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tZero Trust Strategy\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tZero trust means that no service, no user and no device is trusted. Every data movement is monitored and requires authentication to ensure that only authorized users can access your data.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd8bc0a elementor-widget elementor-widget-icon-box\" data-id=\"fd8bc0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tReporting tool\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWe offer you an integrated central reporting tool with extensive analysis options for monitoring and controlling your data. This allows you to keep an eye on your IT security situation at all times with the help of IT security monitoring and adjust it as required as part of IT security operations.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2470661 e-flex e-con-boxed e-con e-parent\" data-id=\"2470661\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ea1534 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"1ea1534\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Ebene_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 60.5 49.6\" style=\"enable-background:new 0 0 60.5 49.6;\" xml:space=\"preserve\"><g id=\"Ebene_2_00000024698956973445086560000004762050004681328020_\">\t<g id=\"Ebene_1-2\">\t\t<path d=\"M40.1,22.7c-0.3,0-0.5-0.1-0.7-0.3c-0.4-0.3-0.4-0.9,0-1.3c0,0,0,0,0,0L53.7,7.8c0.4-0.4,1-0.4,1.3,0c0.4,0.4,0.4,1,0,1.3    L40.8,22.5C40.6,22.6,40.4,22.7,40.1,22.7z\"><\/path>\t\t<path d=\"M35,23.5c-0.2,0-0.3,0-0.5-0.1l-12.3-7.5c-0.4-0.3-0.6-0.8-0.3-1.2c0,0,0,0,0,0c0.3-0.4,0.8-0.6,1.2-0.3c0,0,0,0,0,0    l12.3,7.5c0.4,0.3,0.6,0.8,0.3,1.2C35.6,23.3,35.3,23.5,35,23.5z\"><\/path>\t\t<path d=\"M6.1,28.5c-0.2,0-0.5-0.1-0.6-0.2c-0.4-0.4-0.4-0.9,0-1.3c0,0,0,0,0,0l11.7-12.1c0.4-0.4,0.9-0.4,1.3,0c0,0,0,0,0,0    c0.4,0.3,0.4,0.9,0,1.3c0,0,0,0,0,0L6.7,28.2C6.5,28.4,6.3,28.5,6.1,28.5z\"><\/path>\t\t<path d=\"M3.9,33.6H3.8c-1.1,0-2-0.5-2.8-1.3c-0.7-0.8-1.1-1.8-1-2.8c0-1,0.5-2,1.3-2.7c1.6-1.5,4.1-1.3,5.5,0.3    c1.5,1.6,1.3,4.1-0.3,5.5C5.8,33.2,4.9,33.6,3.9,33.6z M3.9,27.6c-1.2,0-2.1,0.9-2.1,2.1c0,1.2,0.9,2.1,2.1,2.1S6,30.9,6,29.7    c0-0.5-0.2-1-0.6-1.4C5.1,27.8,4.6,27.6,3.9,27.6L3.9,27.6z\"><\/path>\t\t<path d=\"M20,17.2h-0.2c-2.2-0.1-3.8-1.9-3.7-4.1s1.9-3.8,4.1-3.7c2.2,0.1,3.8,1.9,3.7,4.1l0,0C23.8,15.6,22.1,17.2,20,17.2z     M20,11.2c-1.2,0-2.1,0.9-2.1,2.1c0,1.2,0.9,2.1,2.1,2.1c1.1,0,2.1-0.9,2.1-2l0,0c0.1-1.2-0.8-2.1-2-2.2L20,11.2z M23,13.5    L23,13.5z\"><\/path>\t\t<path d=\"M37.9,28.1h-0.2C35.6,28,33.9,26.2,34,24c0-1,0.5-2,1.3-2.7c1.6-1.5,4.1-1.3,5.6,0.3c0.7,0.8,1.1,1.8,1,2.8l0,0    C41.7,26.5,40,28.1,37.9,28.1z M37.9,22.1c-1.1,0-2,0.9-2.1,2c0,0.6,0.2,1.1,0.5,1.5c0.8,0.9,2.1,0.9,3,0.1    c0.4-0.4,0.7-0.9,0.7-1.5l0,0c0.1-1.2-0.8-2.1-2-2.2C38,22.1,38,22.1,37.9,22.1L37.9,22.1z M40.9,24.4L40.9,24.4z\"><\/path>\t\t<path d=\"M56.6,10h-0.2c-2.2-0.1-3.8-1.9-3.8-4.1c0.1-2.2,2-3.8,4.2-3.7c2.1,0.1,3.7,1.9,3.7,4l0,0C60.4,8.3,58.7,10,56.6,10z     M56.6,4c-1.1,0-2,0.9-1.9,2s0.9,2,2,1.9s2-0.9,1.9-2C58.6,4.9,57.7,4,56.6,4L56.6,4z M59.6,6.2L59.6,6.2z\"><\/path>\t\t<path d=\"M28.7,38.8c-10.7,0-19.4-8.7-19.4-19.4S17.9,0,28.7,0s19.4,8.7,19.4,19.4v0C48,30.1,39.4,38.8,28.7,38.8z M28.7,1.8    c-9.7,0-17.6,7.9-17.6,17.6S19,37,28.7,37c9.7,0,17.6-7.9,17.6-17.6C46.2,9.7,38.4,1.8,28.7,1.8L28.7,1.8z\"><\/path>\t\t<path d=\"M55.1,49.6c-1,0-1.9-0.4-2.6-1.1L39,34.9c-0.4-0.4-0.4-0.9,0-1.3c0.4-0.4,0.9-0.4,1.3,0l13.5,13.6c0.7,0.7,1.9,0.7,2.6,0    c0.7-0.7,0.7-1.9,0-2.7l-13-13c-0.4-0.3-0.4-0.9-0.1-1.3s0.9-0.4,1.3-0.1c0,0,0,0,0.1,0.1l13,13c1.4,1.5,1.4,3.8,0,5.2    C57,49.2,56.1,49.6,55.1,49.6L55.1,49.6z\"><\/path>\t<\/g><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tInterface control\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb784fa e-grid e-con-boxed e-con e-child\" data-id=\"eb784fa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-802cbfb elementor-widget elementor-widget-icon-box\" data-id=\"802cbfb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tGuidelines\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tInterface control is based on IT security guidelines that are specifically tailored to your company. By precisely defining approvals and blocks, you can ensure that your employees' access rights are precisely tailored to their needs.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-762d0fd elementor-widget elementor-widget-icon-box\" data-id=\"762d0fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tBlock applications\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWith our approach, you can block unauthorized end devices and software applications in the network. You prevent insecure or unauthorized devices and applications from gaining access to your network.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2df589b elementor-widget elementor-widget-icon-box\" data-id=\"2df589b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAccess rights\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tYou can further increase IT security by defining access rights that depend on the current network connection. For example, you can grant certain employees access to specific resources only if they access the network over a secure connection.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15eb3b9 elementor-widget elementor-widget-icon-box\" data-id=\"15eb3b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tControl\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tGain full control over the use of storage media. By specifying who can use a drive, you ensure the secure handling of data and minimize potential IT security risks. This makes data access easier to control via continuous IT security monitoring.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-af60c70 e-flex e-con-boxed e-con e-parent\" data-id=\"af60c70\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef3a16e elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"ef3a16e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Ebene_1\" data-name=\"Ebene 1\" viewBox=\"0 0 71.69 39.55\"><g id=\"Ebene_2\" data-name=\"Ebene 2\"><g id=\"Ebene_1-2\" data-name=\"Ebene 1-2\"><path d=\"M71.53,19.35C70.85,18.56,54.55,0,36,0h0C15.83,0,.56,18.92.2,19.37a.74.74,0,0,0-.2.47c0,1.55,15.34,19.71,36,19.71h0c21.08,0,35.42-19.2,35.57-19.39A.66.66,0,0,0,71.53,19.35ZM36,38.26h0a18.5,18.5,0,0,1,0-37h0a18.5,18.5,0,0,1,0,37ZM1.39,20C2.8,18.25,12.32,7.27,25.59,3A19.74,19.74,0,0,0,26,36.82C12.16,32.83,2.56,21.84,1.39,20ZM46.13,36.73a19.74,19.74,0,0,0,1.12-33.2c11.69,4.46,21,14.2,23,16.28C68.43,22,59.41,32.72,46.13,36.73Z\"><\/path><path d=\"M32.09,8.43a.66.66,0,0,0-.16.5l1.33,14a.66.66,0,0,0,.65.58h3.87a.64.64,0,0,0,.65-.58l1.33-14a.66.66,0,0,0-.16-.5.67.67,0,0,0-.48-.21H32.57A.67.67,0,0,0,32.09,8.43Zm6.32,1.08L37.2,22.26H34.49L33.28,9.51Z\"><\/path><path d=\"M38,25.82H33.74a.65.65,0,0,0-.65.64v4.22a.65.65,0,0,0,.65.65H38a.65.65,0,0,0,.64-.65V26.46A.64.64,0,0,0,38,25.82ZM37.31,30H34.38V27.11h2.93Z\"><\/path><\/g><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tApplication control\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c96c691 e-grid e-con-boxed e-con e-child\" data-id=\"c96c691\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f5bc85 elementor-widget elementor-widget-icon-box\" data-id=\"5f5bc85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPrevention\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tApplication control can stop unauthorized programs before they can cause damage to your company. This preventive measure protects your IT infrastructure and ensures that only authorized and secure applications are used.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c35b92 elementor-widget elementor-widget-icon-box\" data-id=\"6c35b92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tBlock attack attempts\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tProtect your company from zero-day exploits. In this type of attack, software vulnerabilities are exploited before they can be fixed by the software manufacturer. Our Endpoint Protection solutions identify and block such attempted attacks.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe85199 elementor-widget elementor-widget-icon-box\" data-id=\"fe85199\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tRulebook\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tOnce defined, rules for the use of applications remain in place even after software upgrades. You can be sure that your application control policies are consistently applied and adhered to regardless of software updates or changes.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a521da6 elementor-widget elementor-widget-icon-box\" data-id=\"a521da6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tBlacklisting &amp; Whitelisting\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tOur solutions provide a transparent and efficient process for application blacklisting and whitelisting. This allows you to automate IT security measures while maintaining control over the applications running on your systems.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-916fdb8 e-flex e-con-boxed e-con e-parent\" data-id=\"916fdb8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3052a7f elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"3052a7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Ebene_1\" data-name=\"Ebene 1\" viewBox=\"0 0 71.69 39.55\"><g id=\"Ebene_2\" data-name=\"Ebene 2\"><g id=\"Ebene_1-2\" data-name=\"Ebene 1-2\"><path d=\"M71.53,19.35C70.85,18.56,54.55,0,36,0h0C15.83,0,.56,18.92.2,19.37a.74.74,0,0,0-.2.47c0,1.55,15.34,19.71,36,19.71h0c21.08,0,35.42-19.2,35.57-19.39A.66.66,0,0,0,71.53,19.35ZM36,38.26h0a18.5,18.5,0,0,1,0-37h0a18.5,18.5,0,0,1,0,37ZM1.39,20C2.8,18.25,12.32,7.27,25.59,3A19.74,19.74,0,0,0,26,36.82C12.16,32.83,2.56,21.84,1.39,20ZM46.13,36.73a19.74,19.74,0,0,0,1.12-33.2c11.69,4.46,21,14.2,23,16.28C68.43,22,59.41,32.72,46.13,36.73Z\"><\/path><path d=\"M44,15.91H40.92V11.6c0-2,0-4.18-1.32-5.54a5.09,5.09,0,0,0-3.77-1.25,5,5,0,0,0-3.71,1.25c-1.38,1.38-1.37,3.58-1.36,5.51v4.34h-3.1a.65.65,0,0,0-.65.65h0V31.75a.65.65,0,0,0,.65.65H44a.65.65,0,0,0,.65-.65h0V16.56a.65.65,0,0,0-.65-.65ZM32,12.26v-.69C32,9.8,32,8,33,7a3.8,3.8,0,0,1,2.8-.87,3.86,3.86,0,0,1,2.9.9c1,1,.95,2.75.94,4.62v4.32H32.05c0-.94,0-2.71,0-3.68ZM43.39,31.11H28.3V17.2H43.39Z\"><\/path><path d=\"M30.11,19.48v4a.64.64,0,0,0,.64.64H40.93a.65.65,0,0,0,.65-.64v-4a.65.65,0,0,0-.65-.64H30.75A.64.64,0,0,0,30.11,19.48Zm4.68,3.33V20.13H36.9v2.68Zm5.51,0H38.19V20.13H40.3Zm-8.9-2.68h2.1v2.68H31.4Z\"><\/path><\/g><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tIdentity and access management\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-754c89a e-grid e-con-boxed e-con e-child\" data-id=\"754c89a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab25e0f elementor-widget elementor-widget-icon-box\" data-id=\"ab25e0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tOnboarding and offboarding\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAs part of the onboarding and offboarding process, IT Security Operations regularly updates and cleans up authorizations, certifications, segregation of duties and role management to ensure that they are always up to date.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a2b068 elementor-widget elementor-widget-icon-box\" data-id=\"7a2b068\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tProvisioning\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAssign individual team members individual access rights to software, drives and IT services. This ensures that each employee receives exactly the resources they need for their work.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6644215 elementor-widget elementor-widget-icon-box\" data-id=\"6644215\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tDeprovisioning\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tIf employees leave your company or internal restructuring takes place, these rights can be revoked accordingly. This minimizes IT security risks and maintains the integrity of your network.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0962e62 elementor-widget elementor-widget-icon-box\" data-id=\"0962e62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tUser Self-Service\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWith this function, your employees and customers can quickly and efficiently find solutions to their concerns.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc65674 elementor-widget elementor-widget-icon-box\" data-id=\"cc65674\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPolicy Management\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAs an IT consulting company, we work with you to establish processes that ensure the creation, distribution and maintenance of uniform IT security guidelines for identities in your company.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2977b63 elementor-widget elementor-widget-icon-box\" data-id=\"2977b63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tWorkflow management\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tOur workflow management ensures that all legal requirements are met in your company.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-005d0fe e-flex e-con-boxed e-con e-parent\" data-id=\"005d0fe\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-055a342 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"055a342\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Ebene_1\" data-name=\"Ebene 1\" viewBox=\"0 0 43.71 43.72\"><g id=\"Ebene_2\" data-name=\"Ebene 2\"><g id=\"Ebene_1-2\" data-name=\"Ebene 1-2\"><path d=\"M34,32.45c-2-6.37-5.42-9-8.24-10a6.82,6.82,0,1,0-9.49-1.72A7,7,0,0,0,18,22.45c-2.83,1-6.29,3.62-8.25,10a.93.93,0,0,0,.63,1.15.73.73,0,0,0,.25,0H33.1a1,1,0,0,0,.9-1.19ZM21.49,21.82a4.88,4.88,0,1,1,.88,0h-.88ZM19.28,24a6.86,6.86,0,0,1,1-.22,9.36,9.36,0,0,1,1.18-.08h.72a7.8,7.8,0,0,1,1.28.1c2.15.34,6,1.84,8.33,8H11.87C13.83,26.48,17,24.6,19.28,24Z\" transform=\"translate(0.02 0.02)\"><\/path><path d=\"M7.73,7.18a.5.5,0,0,0,.7,0,19.85,19.85,0,0,1,26.75,0,.59.59,0,0,0,.36.13.53.53,0,0,0,.35-.17l.67-.74a.53.53,0,0,0,.13-.4.51.51,0,0,0-.17-.34,21.85,21.85,0,0,0-29.44,0,.57.57,0,0,0-.16.35.53.53,0,0,0,.13.36Z\" transform=\"translate(0.02 0.02)\"><\/path><path d=\"M35.89,36.57a.52.52,0,0,0-.35-.16h0a.45.45,0,0,0-.35.13,19.86,19.86,0,0,1-26.74,0,.54.54,0,0,0-.36-.14.53.53,0,0,0-.35.17l-.68.74a.49.49,0,0,0-.13.36.54.54,0,0,0,.16.34,21.85,21.85,0,0,0,29.43,0,.5.5,0,0,0,0-.71Z\" transform=\"translate(0.02 0.02)\"><\/path><path d=\"M38,7.13A.51.51,0,0,0,37.66,7a.49.49,0,0,0-.36.13l-.74.68a.44.44,0,0,0-.16.34.49.49,0,0,0,.13.36,19.87,19.87,0,0,1-.05,26.75.54.54,0,0,0-.14.36.51.51,0,0,0,.17.34l.73.68a.51.51,0,0,0,.34.13.52.52,0,0,0,.37-.16A21.86,21.86,0,0,0,38,7.13Z\" transform=\"translate(0.02 0.02)\"><\/path><path d=\"M7.34,35.58h0a.53.53,0,0,0-.13-.36,19.85,19.85,0,0,1,0-26.75.53.53,0,0,0,.13-.36.51.51,0,0,0-.17-.34l-.74-.68A.48.48,0,0,0,6,7a.51.51,0,0,0-.34.17,21.85,21.85,0,0,0,0,29.44.52.52,0,0,0,.37.16.51.51,0,0,0,.34-.13L7.16,36A.49.49,0,0,0,7.34,35.58Z\" transform=\"translate(0.02 0.02)\"><\/path><\/g><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAccess Management - Privileged Access Management\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fff2b5f e-grid e-con-boxed e-con e-child\" data-id=\"fff2b5f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aeedf56 elementor-widget elementor-widget-icon-box\" data-id=\"aeedf56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAccess management for privileged users and external service providers\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tYou can manage access to privileged accounts easily and transparently. This enables effective IT security monitoring of privileged users and reduces the risk of unauthorized access.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-daca0dd elementor-widget elementor-widget-icon-box\" data-id=\"daca0dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPassword management and session recording\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWe offer extensive password management and the ability to record sessions. These features are particularly useful for securing privileged accounts and ensuring compliance.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cd1d27 elementor-widget elementor-widget-icon-box\" data-id=\"4cd1d27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAnalysis of privileged user activities for compliance purposes\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWith our solutions, you can analyze and record the activities of privileged users. This makes it easier to meet compliance requirements and provides additional transparency and IT security.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4613f70 e-con-full e-flex e-con e-parent\" data-id=\"4613f70\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-77b2e36 e-con-full e-flex e-con e-child\" data-id=\"77b2e36\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7959469 elementor-widget elementor-widget-image\" data-id=\"7959469\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/maxxys.de\/wp-content\/uploads\/2024\/08\/Originalgroesse-MAXXOps.png\" class=\"attachment-full size-full wp-image-14638\" alt=\"\" srcset=\"https:\/\/maxxys.de\/wp-content\/uploads\/2024\/08\/Originalgroesse-MAXXOps.png 500w, https:\/\/maxxys.de\/wp-content\/uploads\/2024\/08\/Originalgroesse-MAXXOps-300x300.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3162c67 e-con-full e-flex e-con e-child\" data-id=\"3162c67\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d5d52d3 uael-heading-align-left elementor-widget__width-initial elementor-widget elementor-widget-uael-advanced-heading\" data-id=\"d5d52d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"uael-advanced-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"uael-module-content uael-heading-wrapper\">\n\t\t\t\t\t\t\n\t\t\t<h2 class=\"uael-heading\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-heading-text elementor-inline-editing uael-size--default\" data-elementor-setting-key=\"heading_title\" data-elementor-inline-editing-toolbar=\"basic\">The MAXXOps end-to-end approach is ideal for integrating an endpoint protection solution, both in a greenfield and brownfield environment.<\/span>\n\t\t\t\t\t\t\t<\/h2>\n\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fad1b3 elementor-widget elementor-widget-text-editor\" data-id=\"7fad1b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Due to the complexity of IT infrastructures and the challenge of selecting suitable endpoint protection solutions to optimize IT security, it is essential for us as an IT consulting company to take a holistic approach. We accompany our customers through the entire process of digital transformation and rely on <strong>our proven end-to-end MAXXOps approach<\/strong>. This approach provides a structured approach for the implementation of new IT infrastructure solutions such as endpoint protection for IT security operations and IT security monitoring to ensure the security of end devices in the IT landscape.<\/p><ol><li>Maturity level and needs analysis<\/li><li>Target definition and gap analysis<\/li><li>Definition of the scope, design and documentation of the target processes<\/li><li>Joint implementation phase and project execution<\/li><li>Support and further development<\/li><\/ol><div>\u00a0<\/div><p>Regardless of whether you have an existing solution for endpoint protection in your IT infrastructure or would like to introduce a completely new solution: With the MAXXOps approach, we as an IT consulting company enable both <strong>brownfield and greenfield implementations of IT security operations<\/strong>. In addition, we support you in a possible change from your current operating solution and in the transition to a new endpoint protection solution in your IT infrastructure for optimized IT security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a421c01 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"a421c01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/maxxys.de\/en\/services\/maxxops\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">MORE INFORMATIONS<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-312c763 e-flex e-con-boxed e-con e-parent\" data-id=\"312c763\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a2f995e elementor-widget elementor-widget-elementskit-heading\" data-id=\"a2f995e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title \">We work together with these manufacturers:<\/h2><div class=\"ekit_heading_separetor_wraper ekit_heading_elementskit-border-divider ekit-dotted\"><div class=\"elementskit-border-divider ekit-dotted\"><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-acb4ae7 e-grid e-con-full e-con e-child\" data-id=\"acb4ae7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-94a1333 elementor-widget elementor-widget-image\" data-id=\"94a1333\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/maxxys.de\/wp-content\/uploads\/elementor\/thumbs\/2025-01_MAXXYS_Broadcom-Logo-1-qzps79sje2td7r3cseryb6juuacqe64m05zog2xohw.png\" title=\"2025-01_MAXXYS_Broadcom-Logo\" alt=\"Broadcom Logo\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5b9f5f elementor-widget elementor-widget-image\" data-id=\"c5b9f5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/maxxys.de\/wp-content\/uploads\/elementor\/thumbs\/ivanti-qtbr22d63hcxags18vn0u12uj3tzynlqt70mvu7ww4.webp\" title=\"ivanti.webp\" alt=\"ivanti.webp\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da98f71 elementor-widget elementor-widget-image\" data-id=\"da98f71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/maxxys.de\/wp-content\/uploads\/elementor\/thumbs\/DriveLook-Logo--quo765cvejieovl1xvfpo6bz7rd3a8xwdcor4npb9g.webp\" title=\"DriveLook-Logo-\" alt=\"Logo - DriveLook\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-48111640 e-flex e-con-boxed e-con e-parent\" data-id=\"48111640\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;pyramids&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateX_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateX_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1.2,&quot;sizes&quot;:[]},&quot;background_motion_fx_translateX_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M761.9,44.1L643.1,27.2L333.8,98L0,3.8V0l1000,0v3.9\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e7bcffd elementor-widget elementor-widget-heading\" data-id=\"5e7bcffd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Contact us. We will be happy to advise you.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a57930 e-flex e-con-boxed e-con e-parent\" data-id=\"1a57930\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-71e4dbf3 e-grid e-con-full e-con e-child\" data-id=\"71e4dbf3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-603b9987 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"603b9987\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-map-marker-alt\" viewBox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M172.268 501.67C26.97 291.031 0 269.413 0 192 0 85.961 85.961 0 192 0s192 85.961 192 192c0 77.413-26.97 99.031-172.268 309.67-9.535 13.774-29.93 13.773-39.464 0zM192 272c44.183 0 80-35.817 80-80s-35.817-80-80-80-80 35.817-80 80 35.817 80 80 80z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAddress\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAm Helgenhaus 15<br>\n35510 Butzbach\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5103b193 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"5103b193\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"tel:%20+496441210040\" class=\"elementor-icon\" tabindex=\"-1\" aria-label=\"Phone\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-phone\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M493.4 24.6l-104-24c-11.3-2.6-22.9 3.3-27.5 13.9l-48 112c-4.2 9.8-1.4 21.3 6.9 28l60.6 49.6c-36 76.7-98.9 140.5-177.2 177.2l-49.6-60.6c-6.8-8.3-18.2-11.1-28-6.9l-112 48C3.9 366.5-2 378.1.6 389.4l24 104C27.1 504.2 36.7 512 48 512c256.1 0 464-207.5 464-464 0-11.2-7.7-20.9-18.6-23.4z\"><\/path><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"tel:%20+496441210040\" >\n\t\t\t\t\t\t\tPhone\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t+49 6441 21004 0\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1813a86b elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"1813a86b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"mailto:info@maxxys.de\" class=\"elementor-icon\" tabindex=\"-1\" aria-label=\"E-mail\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-envelope\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z\"><\/path><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"mailto:info@maxxys.de\" >\n\t\t\t\t\t\t\tE-mail\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tinfo@maxxys.de\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Best Practice Endpoint Protection Standardized Endpoint Protection for optimal IT security of your IT landscape In the digital age, the IT security of end devices is of fundamental importance and crucial for your company&#8217;s competitiveness. The endpoint protection solutions from our IT consulting company are designed not only to protect the physical aspects, but also [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":8553,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"Endpoint Protection solution for your IT infrastructure security","_seopress_titles_desc":"A standardized Endpoint Protection solution provides you with transparency about your IT infrastructure security.","_seopress_robots_index":"","footnotes":""},"class_list":["post-8551","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/maxxys.de\/en\/wp-json\/wp\/v2\/pages\/8551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/maxxys.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/maxxys.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/maxxys.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/maxxys.de\/en\/wp-json\/wp\/v2\/comments?post=8551"}],"version-history":[{"count":8,"href":"https:\/\/maxxys.de\/en\/wp-json\/wp\/v2\/pages\/8551\/revisions"}],"predecessor-version":[{"id":16320,"href":"https:\/\/maxxys.de\/en\/wp-json\/wp\/v2\/pages\/8551\/revisions\/16320"}],"up":[{"embeddable":true,"href":"https:\/\/maxxys.de\/en\/wp-json\/wp\/v2\/pages\/8553"}],"wp:attachment":[{"href":"https:\/\/maxxys.de\/en\/wp-json\/wp\/v2\/media?parent=8551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}