{"id":7803,"date":"2024-03-26T11:10:02","date_gmt":"2024-03-26T10:10:02","guid":{"rendered":"https:\/\/www.ensec.ch\/managed-it-security\/"},"modified":"2025-01-27T11:17:52","modified_gmt":"2025-01-27T10:17:52","slug":"managed-it-security","status":"publish","type":"page","link":"https:\/\/www.ensec.ch\/en\/managed-it-security\/","title":{"rendered":"Managed Security Services"},"content":{"rendered":"<ul>\n<li>\n        <a href=\"\">Navigation:<\/a>\n    <\/li>\n<li>\n        <a href=\"#vorteile\">Advantages<\/a>\n    <\/li>\n<li>\n        <a href=\"#services\">Services<\/a>\n    <\/li>\n<li>\n        <a href=\"#business\">Business Relevance<\/a>\n    <\/li>\n<\/ul>\n<hr>\n<h1>\n<p>Managed Security Services<\/p>\n<\/h1>\n<div>\n<p>A scalable fleet of tools, services and professionals. For comprehensive security. Across the board. And in depth.<\/p>\n<\/div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/11\/it-security-service-rolf.png\" alt=\"\"><br \/>\n<img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/05\/quote.svg\" alt=\"\"><\/p>\n<div>\n<p>If you prefer an agile speedboat to a sluggish steamer when it comes to information security, ensec is the perfect choice. ensec offers companies a wide range of services that can be put together in a modular fashion and that have all the tricks of the trade.<\/p>\n<\/div>\n<h2>At ensec, everything is tailor-made.<\/h2>\n<hr>\n<div>\n<p>You would like to transfer operational responsibility for individual parts of your IT security infrastructure to us? Then you will find arguments on this page as to why you should commission ensec <a href=\"https:\/\/www.ensec.ch\/managed-it-security\/\">Managed Security Services (MSS)<\/a>. On the other hand, if you require reactive support for the infrastructure you operate, then let us talk about our <a href=\"https:\/\/www.ensec.ch\/ensec-support\/\">support services<\/a>.\u00a0<\/p>\n<p>What makes our MSS special is you, our customers: every company is different, no two infrastructures are the same. That&#8217;s why we don&#8217;t deliver our MSS off the peg. We deliver what you want and need. Together, we will work out a list of the services that ensec can meaningfully operate for you.\u00a0<\/p>\n<\/div>\n<div>\n<p>Clear escalation levels ensure that the respective conversation partners always communicate at eye level. Not off the shelf also means that we can agree on a mixed operation. For example, you can implement simpler changes such as new firewall rules yourself \u2013 or commission us to do so if necessary. Before we take operational responsibility off your hands, we define which changes belong to the standard and which response times you would like us to provide.<\/p>\n<p><strong>We do not compromise on data security:<\/strong> in addition to ensuring the availability of services, installing security updates and safeguarding the software lifecycle, we also take care of backup and restore for each of the components we operate.\u00a0<\/p>\n<\/div>\n<h2>Our Managed Security Services<\/h2>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/startnav_mss_managed_sase.svg\" alt=\"\"><\/p>\n<h3>SASE | SSE  | ZTNA<\/h3>\n<p><a href=\"\/ensec\/en\/managed-it-security\/managed-sase\/\">Learn more<\/a><\/p>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/06\/network-security.svg\" alt=\"\"><\/p>\n<h3>Infrastructure<\/h3>\n<p><a href=\"\/ensec\/en\/it-security-integration\/infrastructure-security\/\">Learn more<\/a><\/p>\n<\/li>\n<\/ul>\n<h2>\n<\/h2>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/startnav_mss_analytics-as-a-service.svg\" alt=\"\"><\/p>\n<h3>Analytics<\/h3>\n<p><a href=\"\/ensec\/en\/managed-it-security\/analytics-as-a-service\/\">Learn more<\/a><\/p>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/startnav_mss_information-security-as-a-service.svg\" alt=\"\"><\/p>\n<h3>Information Security <\/h3>\n<p><a href=\"\/ensec\/en\/managed-it-security\/information-security-as-service\/\">Learn more<\/a><\/p>\n<\/li>\n<\/ul>\n<h2>What are the advantages of Managed Security Services?<\/h2>\n<ul>\n<li>\n<h3>Calculable Costs<\/h3>\n<p>01<\/p>\n<div>\n<p>IT budgets are notorious for being exceeded and not being easy to calculate. With Managed Services, your company receives security at a fixed price.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Specific Know-how<\/h3>\n<p>02<\/p>\n<div>\n<p>Complex IT landscapes and multi-vendor approaches are difficult to operate and keeping expertise up to date is a challenge. We provide you with concentrated know-how.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Monitoring &#038; Reporting<\/h3>\n<p>03<\/p>\n<div>\n<p>We monitor the services transferred to us, and you will also receive regular reports tailored to your needs.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>More time for your team<\/h3>\n<p>04<\/p>\n<div>\n<p>We free up time for your employees and take care of the operation of your IT security infrastructure and the monitoring and review of your security level.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Efficient and modular<\/h3>\n<p>05<\/p>\n<div>\n<p>We offer you exactly the level of service you need, whether operational, analytical or managed information security, or a combination of all three.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<p>Information and IT security has become a complex undertaking and is not only a growing concern for a company&#8217;s IT departments.<\/p>\n<p>Companies need support: straightforward, targeted and to the extent necessary. That is what we provide.<\/p>\n<\/div>\n<div>From a business perspective<\/div>\n<h2>To help you continue to be successful in business in the future<\/h2>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/11\/it-security_11.jpg\" alt=\"\"><\/p>\n<div>\n<p>The continuous modernisation of a company&#8217;s IT infrastructure has been a prerequisite for surviving in a competitive environment for years: IT is business-relevant or even business-critical.<\/p>\n<\/div>\n<div>\n<p>With our <a href=\"https:\/\/www.ensec.ch\/managed-it-security\/\">Managed Security Services<\/a>, we ensure that you operate future-proof IT concepts. We do this by giving you the freedom to focus on a meaningful cloud migration, for example: the quick lift and shift to the cloud usually brings no financial benefits. To optimise the migration, your IT teams need time to concentrate on the new architecture. We give you this time.<\/p>\n<\/div>\n<h2>\n<p>Would you like to hear more about ensec? Contact us.<\/p>\n<\/h2>\n<p><p>\n        <a href=\"mailto:hello@ensec.ch\">Write to us<\/a>\n    <\/p>\n<\/p>\n<div>\n<p>Or call us:<\/p>\n<\/div>\n<h3><a href=\"tel:+41447111144 \">+41 44 711 11 44<\/a><\/h3>\n<p><!--more--><br \/>\n<!-- {\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"animation\":\"slide-right-medium\",\"animation_delay\":\"60\",\"css\":\"@media (min-width: 960px) {\\n\\t.uk-position-cover, video {\\n    \\tmargin-left:60%;\\n\\t\\twidth:40%;\\n\\t}\\n    \\n    .uk-position-cover {\\n    \\tdisplay:none;\\n    }\\n    \\n    video {\\n    \\tpadding:390px 40px 15% 0;   \\n    }\\n\\n    .el-section {\\n        padding-top:180px;\\n    \\tbackground-image: url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg');\\n  \\t\\tbackground-repeat: no-repeat;\\n  \\t\\tbackground-position: top calc(50% + 5%);\\n  \\t\\tbackground-size: 100% auto;\\n  \\t\\tmargin: 0;\\n    }\\n}\",\"header_transparent\":false,\"header_transparent_noplaceholder\":true,\"header_transparent_text_color\":\"dark\",\"height\":\"viewport\",\"height_offset_top\":true,\"height_viewport\":60,\"image_position\":\"center-center\",\"image_size\":\"cover\",\"media_overlay\":\"rgba(0, 45, 66, 0.69)\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"bottom\",\"video\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/GettyImages-1422123217.mp4\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"image_size\":\"width-1-1\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"1-1\"},\"children\":[{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"active\":true,\"content\":\"Navigation:\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Advantages\",\"link\":\"#vorteile\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Services\",\"link\":\"#services\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Business Relevance\",\"link\":\"#business\"}}]},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}},{\"type\":\"headline\",\"props\":{\"block_align\":\"center\",\"content\":\"\n\n<p>Managed Security Services<\\\/p>\",\"css\":\"@media (min-width: 960px) {\\n\\t.el-element {\\n\\t\\twidth:46%;\\n        font-size:6rem;\\n        font-weight:bold;\\n\\t}\\n}\\n\\n@media (max-width: 960px) {\\n\\t.el-element {\\n\\t\\tcolor:#fff;\\n        font-weight:bold;\\n\\t}\\n}\",\"margin\":\"medium\",\"margin_remove_top\":true,\"text_align\":\"left\",\"title_element\":\"h1\",\"title_style\":\"heading-xlarge\"},\"name\":\"Seitentitel\"},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>A scalable fleet of tools, services and professionals. For comprehensive security. Across the board. And in depth.<\\\/p>\",\"css\":\"@media (max-width: 960px) {\\n    .el-element {\\n    \\tcolor:#fff;\\n    }\\n}\",\"margin\":\"large\",\"margin_remove_top\":true,\"maxwidth\":\"xlarge\",\"text_style\":\"lead\"}},{\"type\":\"image\",\"props\":{\"css\":\".el-element {\\n\\tmargin-bottom:-13px !important;\\n}\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/11\\\/it-security-service-rolf.png\",\"image_svg_color\":\"emphasis\",\"image_width\":650,\"margin\":\"default\",\"position\":\"relative\",\"position_z_index\":\"1\"}}]}]},{\"type\":\"row\",\"props\":{\"css\":\".uk-card-primary {\\n    \\tborder-radius:5px;\\n\\t\\tpadding:60px 60px 50px 50px;\\n}\\n\\n@media (min-width: 960px) {\\n    .uk-card-primary {\\n    \\tborder-radius:5px;\\n\\t\\tpadding:100px 240px 100px 80px;\\n\\t}\\n}\\n\\n\",\"row_gap\":\"collapse\"},\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".uk-card-primary {\\n\\tbox-shadow: rgba(17, 17, 26, 0.1) 0px 8px 24px, rgba(17, 17, 26, 0.1) 0px 16px 56px, rgba(17, 17, 26, 0.1) 0px 24px 80px;\\n}\",\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"style\":\"card-primary\"},\"children\":[{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/quote.svg\",\"image_svg_color\":\"emphasis\",\"image_width\":60,\"margin\":\"default\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>If you prefer an agile speedboat to a sluggish steamer when it comes to information security, ensec is the perfect choice. ensec offers companies a wide range of services that can be put together in a modular fashion and that have all the tricks of the trade.<\\\/p>\",\"margin\":\"\",\"text_style\":\"lead\"}}]}]}],\"name\":\"Hero\"},{\"name\":\"Intro\",\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"60\",\"css\":\"@media (max-width: 960px) {\\n    .el-section {\\n\\t\\tmargin-top:60px;\\n\\t}\\n}\\n\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"padding_remove_top\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"parallax\",\"content\":\"At ensec, everything is tailor-made.\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_end\":\"70vh + 70%\",\"parallax_opacity\":\"0.3,1\",\"parallax_y\":\"30,0\",\"text_align\":\"left\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}},{\"type\":\"divider\",\"props\":{\"css\":\".el-element {\\n\\tmax-width:50%;\\n}\",\"divider_element\":\"hr\",\"margin\":\"medium\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"}}],\"props\":{\"layout\":\"2-3,1-3\"}},{\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\",\"margin\":\"large\",\"row_gap\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"column_divider\":false,\"content\":\"\n\n<p>You would like to transfer operational responsibility for individual parts of your IT security infrastructure to us? Then you will find arguments on this page as to why you should commission ensec <a href=\\\"https:\\\/\\\/www.ensec.ch\\\/managed-it-security\\\/\\\">Managed Security Services (MSS)<\\\/a>. On the other hand, if you require reactive support for the infrastructure you operate, then let us talk about our <a href=\\\"https:\\\/\\\/www.ensec.ch\\\/ensec-support\\\/\\\">support services<\\\/a>.\\u00a0<\\\/p>\\n\n\n<p>What makes our MSS special is you, our customers: every company is different, no two infrastructures are the same. That's why we don't deliver our MSS off the peg. We deliver what you want and need. Together, we will work out a list of the services that ensec can meaningfully operate for you.\\u00a0<\\\/p>\",\"margin\":\"\",\"text_align\":\"left\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"column_divider\":false,\"content\":\"\n\n<p>Clear escalation levels ensure that the respective conversation partners always communicate at eye level. Not off the shelf also means that we can agree on a mixed operation. For example, you can implement simpler changes such as new firewall rules yourself \\u2013 or commission us to do so if necessary. Before we take operational responsibility off your hands, we define which changes belong to the standard and which response times you would like us to provide.<\\\/p>\\n\n\n<p><strong>We do not compromise on data security:<\\\/strong> in addition to ensuring the availability of services, installing security updates and safeguarding the software lifecycle, we also take care of backup and restore for each of the components we operate.\\u00a0<\\\/p>\",\"margin\":\"\",\"text_align\":\"left\"}}]}]}]},{\"type\":\"section\",\"props\":{\"animation\":\"slide-left-medium\",\"animation_delay\":\"100\",\"css\":\".el-section {\\n        background-color:#002d42;\\n}\\n\\n@media (min-width: 960px) {\\n    .el-section {\\n\\t\\tmargin:0 40px 0 40px;\\n        border-radius:5px;\\n\\t}\\n}\",\"id\":\"services\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_parallax_bgy\":\"150,\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"padding\":\"large\",\"style\":\"muted\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"1-3,2-3\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Our Managed Security Services\",\"maxwidth_breakpoint\":\"m\",\"title_color\":\"warning\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"css\":\".uk-card-primary {\\n\\tborder-radius:5px;\\n}\\n\\n.el-item:hover .uk-card-primary {\\n    background-color:#007ea7;\\n\\tbox-shadow: rgba(0, 126, 167, 0.4) 0px 8px 24px, rgba(0, 126, 167, 0.4) 0px 16px 56px, rgba(0, 126, 167, 0.4) 0px 24px 80px;\\n    transition: background-color 0.5s, box-shadow 0.5s;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_parallax\":\"0\",\"grid_small\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"item_animation\":true,\"item_maxwidth\":\"xlarge\",\"lightbox_bg_close\":true,\"link_style\":\"text\",\"link_text\":\"Learn more\",\"margin\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,-80\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h2\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/startnav_mss_managed_sase.svg\",\"link\":\"en\\\/managed-it-security\\\/managed-sase\\\/\",\"title\":\"SASE | SSE  | ZTNA\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/06\\\/network-security.svg\",\"link\":\"en\\\/it-security-integration\\\/infrastructure-security\\\/\",\"title\":\"Infrastructure\"}}]}]}]},{\"type\":\"row\",\"props\":{\"layout\":\"1-3,2-3\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<p><br \\\/><br \\\/><\\\/p>\",\"maxwidth_breakpoint\":\"m\",\"title_color\":\"warning\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"css\":\".uk-card-primary {\\n\\tborder-radius:5px;\\n}\\n\\n.el-item:hover .uk-card-primary {\\n    background-color:#007ea7;\\n\\tbox-shadow: rgba(0, 126, 167, 0.4) 0px 8px 24px, rgba(0, 126, 167, 0.4) 0px 16px 56px, rgba(0, 126, 167, 0.4) 0px 24px 80px;\\n    transition: background-color 0.5s, box-shadow 0.5s;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_parallax\":\"0\",\"grid_small\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"item_animation\":true,\"item_maxwidth\":\"xlarge\",\"lightbox_bg_close\":true,\"link_style\":\"text\",\"link_text\":\"Learn more\",\"margin\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,-80\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h2\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/startnav_mss_analytics-as-a-service.svg\",\"link\":\"en\\\/managed-it-security\\\/analytics-as-a-service\\\/\",\"title\":\"Analytics\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/startnav_mss_information-security-as-a-service.svg\",\"link\":\"en\\\/managed-it-security\\\/information-security-as-service\\\/\",\"title\":\"Information Security \"}}]}]}]},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"css\":\".uk-card-primary {\\n\\tborder-radius:5px;\\n}\\n\\n.el-item:hover .uk-card-primary {\\n    background-color:#007ea7;\\n\\tbox-shadow: rgba(0, 126, 167, 0.4) 0px 8px 24px, rgba(0, 126, 167, 0.4) 0px 16px 56px, rgba(0, 126, 167, 0.4) 0px 24px 80px;\\n    transition: background-color 0.5s, box-shadow 0.5s; \\n    }\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"3\",\"grid_parallax\":\"0\",\"grid_small\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"item_animation\":true,\"item_maxwidth\":\"xlarge\",\"lightbox_bg_close\":true,\"link_style\":\"text\",\"link_text\":\"Mehr erfahren\",\"margin\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,-80\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"status\":\"disabled\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h2\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Modular | Skalierbar | Erprobt<\\\/p>\",\"title\":\"Auf Ihre Bed\\u00fcfnisse zugeschnitten\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/startnav_mss_analytics-as-a-service.svg\",\"link\":\"managed-it-security\\\/analytics-as-a-service\\\/\",\"title\":\"Analytics\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/startnav_mss_information-security-as-a-service.svg\",\"link\":\"it-security-integration\\\/cloud-security\\\/\",\"title\":\"Information Security\"}}]}]}]}],\"name\":\"Services\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"100\",\"css\":\"@media (min-width: 960px) {\\n    .el-section {\\n\\t\\tmargin:0 40px 0 40px\\n\\t}\\n}\",\"image_position\":\"top-left\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-5\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_fallback\":\"center\",\"content\":\"What are the advantages of Managed Security Services?\",\"id\":\"vorteile\",\"maxwidth\":\"xlarge\",\"position\":\"relative\",\"position_z_index\":\"1\",\"text_align\":\"left\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-5\"},\"children\":[{\"type\":\"grid\",\"props\":{\"block_align_fallback\":\"center\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"small\",\"css\":\".el-meta {\\n\\tfont-weight:bold;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":false,\"grid_column_gap\":\"large\",\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_row_align\":false,\"grid_row_gap\":\"large\",\"grid_small\":\"2\",\"icon_width\":\"40\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"auto\",\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"image_width\":\"40\",\"item_animation\":true,\"lightbox_bg_close\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\",\"meta_align\":\"above-title\",\"meta_color\":\"primary\",\"meta_element\":\"div\",\"meta_style\":\"h3\",\"parallax_easing\":\"1\",\"position\":\"relative\",\"position_z_index\":\"1\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"text_align\":\"left\",\"text_align_fallback\":\"center\",\"title_align\":\"top\",\"title_color\":\"emphasis\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_margin\":\"remove\",\"title_style\":\"h3\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>IT budgets are notorious for being exceeded and not being easy to calculate. With Managed Services, your company receives security at a fixed price.<\\\/p>\",\"image\":\"\",\"meta\":\"01\",\"title\":\"Calculable Costs\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Complex IT landscapes and multi-vendor approaches are difficult to operate and keeping expertise up to date is a challenge. We provide you with concentrated know-how.<\\\/p>\",\"image\":\"\",\"meta\":\"02\",\"title\":\"Specific Know-how\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>We monitor the services transferred to us, and you will also receive regular reports tailored to your needs.<\\\/p>\",\"image\":\"\",\"meta\":\"03\",\"title\":\"Monitoring & Reporting\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>We free up time for your employees and take care of the operation of your IT security infrastructure and the monitoring and review of your security level.<\\\/p>\",\"image\":\"\",\"meta\":\"04\",\"title\":\"More time for your team\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>We offer you exactly the level of service you need, whether operational, analytical or managed information security, or a combination of all three.<\\\/p>\",\"image\":\"\",\"meta\":\"05\",\"title\":\"Efficient and modular\"}}]}]}],\"props\":{\"column_gap\":\"large\",\"layout\":\"2-5,3-5\",\"margin\":\"remove-vertical\",\"margin_remove_bottom\":true,\"row_gap\":\"large\"}}],\"name\":\"Vorteile\",\"modified\":\"2021-01-08T13:56:27.050Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"60\",\"header_transparent\":false,\"header_transparent_noplaceholder\":true,\"header_transparent_text_color\":\"dark\",\"height_offset_top\":false,\"height_viewport\":60,\"image\":\"wp-content\\\/uploads\\\/2024\\\/03\\\/seekarte-hintergrund_queer.svg\",\"image_position\":\"bottom-right\",\"image_size\":\"height-1-1\",\"media_focal_point\":\"bottom-right\",\"media_overlay_gradient\":\"linear-gradient(90deg, rgba(255,255,255,1) 0%, rgba(255,255,255,0) 100%)\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"padding_remove_top\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Information and IT security has become a complex undertaking and is not only a growing concern for a company's IT departments.<\\\/p>\\n\n\n<p>Companies need support: straightforward, targeted and to the extent necessary. That is what we provide.<\\\/p>\",\"css\":\"@media (min-width: 960px) {\\n\\t.el-element {\\n\\t\\tpadding: 0 0 50px 40px;\\n\\t}\\n}\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\",\"text_style\":\"lead\"}}]}]}],\"name\":\"Zitat\"},{\"name\":\"Zwischenbild\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/06\\\/ensec_sea-construction_01.jpg\",\"image_effect\":\"fixed\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"image_width\":\"1920\",\"padding\":\"large\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tmin-height:500px;\\n}\",\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\"}}]}]},{\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"100\",\"css\":\"@media (min-width: 960px) {\\n    .el-section {\\n\\t\\tmargin:40px 40px 0 40px\\n\\t}\\n}\",\"id\":\"business\",\"image_position\":\"top-left\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"padding_remove_top\":false,\"style\":\"primary\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"2-5\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_fallback\":\"center\",\"content\":\"From a business perspective\",\"maxwidth\":\"xlarge\",\"position\":\"relative\",\"position_z_index\":\"1\",\"text_align\":\"left\",\"text_align_fallback\":\"center\",\"title_element\":\"div\",\"title_style\":\"h5\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-5\"}}],\"props\":{\"column_gap\":\"large\",\"layout\":\"2-5,3-5\",\"margin\":\"default\",\"margin_remove_bottom\":false,\"row_gap\":\"large\"}},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-5\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_fallback\":\"center\",\"content\":\"To help you continue to be successful in business in the future\",\"maxwidth\":\"xlarge\",\"position\":\"relative\",\"position_z_index\":\"1\",\"text_align\":\"left\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-5\"},\"children\":[{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2021\\\/11\\\/it-security_11.jpg\",\"image_svg_color\":\"emphasis\",\"margin\":\"default\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>The continuous modernisation of a company's IT infrastructure has been a prerequisite for surviving in a competitive environment for years: IT is business-relevant or even business-critical.<\\\/p>\",\"margin\":\"medium\",\"text_style\":\"lead\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>With our <a href=\\\"https:\\\/\\\/www.ensec.ch\\\/managed-it-security\\\/\\\">Managed Security Services<\\\/a>, we ensure that you operate future-proof IT concepts. We do this by giving you the freedom to focus on a meaningful cloud migration, for example: the quick lift and shift to the cloud usually brings no financial benefits. To optimise the migration, your IT teams need time to concentrate on the new architecture. We give you this time.<\\\/p>\",\"margin\":\"default\"}}]}],\"props\":{\"column_gap\":\"large\",\"layout\":\"2-5,3-5\",\"margin\":\"remove-vertical\",\"margin_remove_bottom\":true,\"row_gap\":\"large\"}}],\"name\":\"Aus Sicht des Business gr\\u00fcn\"},{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"}}]}]},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_top\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-top: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 0 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n\\tborder-right: 0px solid #fff;\\n    padding: 0 0 0 50px;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"large\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"content\":\"\n\n<p>Would you like to hear more about ensec? Contact us.<\\\/p>\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\",\"title_style\":\"h1\"}}]},{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-left: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 50px 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n \\tborder-left: 0px solid #fff;\\n    padding: 0 50px 0 0;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"none\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"button\",\"props\":{\"button_size\":\"large\",\"css\":\".el-content {\\n\\tfont-size: 1.3rem;\\n    padding: 15px 40px;\\n    text-transform: uppercase;\\n}\\n\\n.el-content:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"text_align\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"primary\",\"content\":\"Write to us\",\"dialog_layout\":\"modal\",\"dialog_offcanvas_flip\":true,\"icon_align\":\"left\",\"link\":\"mailto:hello@ensec.ch\"}}]},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Or call us:<\\\/p>\",\"margin\":\"default\",\"margin_remove_bottom\":true,\"text_align\":\"center\"}},{\"type\":\"headline\",\"props\":{\"content\":\"+41 44 711 11 44\",\"link\":\"tel:+41447111144 \",\"margin_remove_top\":true,\"text_align\":\"center\",\"title_element\":\"h3\"}}]}],\"props\":{\"column_gap\":\"collapse\",\"layout\":\"2-3,1-3\",\"row_gap\":\"collapse\"}}],\"name\":\"ensec \\u2013 Call to action\"}],\"version\":\"4.5.1\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Navigation: Advantages Services Business Relevance Managed Security Services A scalable fleet of tools, services and professionals. For comprehensive security. Across the board. And in depth. If you prefer an agile speedboat to a sluggish steamer when it comes to information security, ensec is the perfect choice. ensec offers companies a wide range of services that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7803","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/comments?post=7803"}],"version-history":[{"count":5,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7803\/revisions"}],"predecessor-version":[{"id":8237,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7803\/revisions\/8237"}],"wp:attachment":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/media?parent=7803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}