{"id":7850,"date":"2024-05-13T13:00:09","date_gmt":"2024-05-13T11:00:09","guid":{"rendered":"https:\/\/www.ensec.ch\/managed-it-security\/analytics-as-a-service\/"},"modified":"2024-12-19T09:31:23","modified_gmt":"2024-12-19T08:31:23","slug":"analytics-as-a-service","status":"publish","type":"page","link":"https:\/\/www.ensec.ch\/en\/managed-it-security\/analytics-as-a-service\/","title":{"rendered":"Analytics as a Service"},"content":{"rendered":"<h1>Analytics as a Service<\/h1>\n<h2>Early identification of vulnerabilities and anomalies in the company network<\/h2>\n<div>\n<p><script src=\"https:\/\/cdn.lordicon.com\/libs\/frhvbuzj\/lord-icon-2.0.2.js\"><\/script> <lord-icon src=\"https:\/\/cdn.lordicon.com\/zpxybbhl.json\" trigger=\"loop\" colors=\"primary:#54BBAB,secondary:#007EA7\" stroke=\"35\" style=\"width: 90px; height: 90px;\"> <\/lord-icon><\/p>\n<\/div>\n<div>\n<h2>Our IT security experts will be happy to advise you.<\/h2>\n<p><a href=\"\/ensec\/kontakt\/\">Call now<\/a><\/p>\n<\/div>\n<ul>\n<li>\n        <a href=\"\">Navigation:<\/a>\n    <\/li>\n<li>\n        <a href=\"#vorteile\">Advantages<\/a>\n    <\/li>\n<li>\n        <a href=\"#services\">Services<\/a>\n    <\/li>\n<li>\n        <a href=\"#business\">Business relevance<\/a>\n    <\/li>\n<\/ul>\n<hr>\n<div>\n<p>In a world where data is the new gold and cyber threats are constantly on the rise, security analytics is not a luxury but a necessity. Security Analytics as a Service helps you to recognise threats at an early stage, respond effectively and protect your digital assets. With our services, you increase security, compliance and cost efficiency &#8211; a clear advantage for any modern organisation.<\/p>\n<\/div>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/11\/it-security_04.jpg\" alt=\"\"><\/p>\n<h3>Komax: Vulnerability Management as a Service<\/h3>\n<p>Case Study<\/p>\n<p><a href=\"\/wp-content\/uploads\/2024\/05\/Case-Study_Managed-Vulnerability-Management_Komax_2023.pdf\">Download now<\/a><\/p>\n<\/div>\n<h2>What are the advantages of Security Analytics as a Service?<\/h2>\n<hr>\n<h3>Early detection<\/h3>\n<div>\n<p>In today&#8217;s dynamic threat landscape, the ability to recognise threats at an early stage is crucial. Thanks to machine learning, our solutions are always up to date and can identify anomalies and suspicious behaviour before they escalate into real security incidents.<\/p>\n<\/div>\n<hr>\n<h3>Faster decision-making<\/h3>\n<div>\n<p>The insights gained with our services enable your security team to make well-founded decisions. We prepare the reports and analyses so that the right risk mitigation measures can be defined and implemented quickly.<\/p>\n<\/div>\n<hr>\n<h3>Compliance and regulation<\/h3>\n<div>\n<p><strong><\/strong>Many industries are subject to strict legal and regulatory requirements. When you purchase our <a href=\"https:\/\/www.ensec.ch\/managed-it-security\/\">Managed Security Services<\/a>, you also benefit from the in-depth expertise of our security consultants, who compile reports tailored to your company.<\/p>\n<\/div>\n<h2>Services<\/h2>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/test_g.svg\" alt=\"\"><\/p>\n<h3>Managed Threat Detection \/ NDR<\/h3>\n<div>\n<p>With the Managed NDR Service, we offer efficient real-time monitoring of your network activities. Based on powerful and proven AI algorithms, our service provides complete visibility of network data flows and enables automatic detection of suspicious behaviour to efficiently support your security team in responding to dormant and active threats \u2013 before any real damage is done.<\/p>\n<p>Threat detection includes:<\/p>\n<ul>\n<li><strong>Advanced Persistent Threats (APT):<\/strong> long-term, targeted attacks are prevented through early detection and intervention.<\/li>\n<li><strong>Active data leaks:<\/strong> Unauthorised data transfers are immediately identified and blocked.<\/li>\n<li><strong>Cyber attacks:<\/strong> A wide range of attacks, from malware to DDoS, are effectively defended against.<\/li>\n<li><strong>Malicious insiders:<\/strong> Internal, suspicious behaviour is detected and investigated.<\/li>\n<li><strong>Ransomware attacks:<\/strong> encryption attempts by ransomware are prevented in good time.<\/li>\n<\/ul>\n<p>The service can be easily integrated into your existing IT and security infrastructure. The architecture is customised to enable seamless integration into existing systems.<\/p>\n<\/div>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/mss_aaas_vulnerability-managment.svg\" alt=\"\"><\/p>\n<h3>Vulnerability Management as a Service<\/h3>\n<div>\n<p>The importance of mature vulnerability management cannot be overestimated. As crucial as the management of existing vulnerabilities is, very few IT teams have time for it.<\/p>\n<p>With our VM aaS, we support you in the development, coordination and optimisation of a holistic vulnerability management programme that is tailored to your company and your risk tolerance. This not only gives you insight into the vulnerabilities in your IT environment, including local, remote, cloud, container and virtual infrastructure, but also a clear overview of how they impact your business risk.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/Aus-Sich-des-Business_Analytics-as-a-Service.jpg\" alt=\"\"><\/p>\n<h2>Safety advantage through early detection of potential risks.<\/h2>\n<p>From a business perspective<\/p>\n<div>\n<p><strong>The early detection of threats reduces the cost of resolving security incidents.<\/strong><\/p>\n<p>Security analytics helps to ensure compliance with regulatory requirements through comprehensive monitoring and documentation.<\/p>\n<p>Analytics as a service provides clear insights into the security situation and potential risks. This enables clear planning and prioritisation of investments in IT security.<\/p>\n<\/div>\n<p><a href=\"#8\"><\/a><\/p>\n<\/div>\n<h2>\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\/p>\n<\/h2>\n<p>\n    <a href=\"mailto:hello@ensec.ch\">Write to us<\/a>\n<\/p>\n<div>\n<p>Or give us a call:<\/p>\n<\/div>\n<h3><a href=\"tel:+41447111144 \">+41 44 711 11 44<\/a><\/h3>\n<p><!--more--><br \/>\n<!-- {\"name\":\"Home\",\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"120\",\"css\":\".el-section {\\n\\tbackground-image: url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ensec-hintergrund_animation.svg'), url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/background_seamap-03.png');\\n  background-repeat: no-repeat, no-repeat;\\n  background-position: center, center;\\n  background-size: cover, cover;\\n}\",\"header_transparent_noplaceholder\":true,\"id\":\"top\",\"image_position\":\"top-center\",\"image_size\":\"cover\",\"media_background\":\"#007EA7\",\"media_overlay\":\"rgba(0, 0, 0, 0.1)\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"style\":\"muted\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"video_width\":\"2560\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"2-3,1-3\",\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Analytics as a Service\",\"margin\":\"small\",\"margin_remove_top\":true,\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"s\",\"text_align_fallback\":\"center\",\"title_color\":\"success\",\"title_element\":\"h1\",\"title_style\":\"heading-large\"}},{\"type\":\"headline\",\"props\":{\"content\":\"Early identification of vulnerabilities and anomalies in the company network\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"s\",\"text_align_fallback\":\"center\",\"title_color\":\"success\",\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p><script src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/libs\\\/frhvbuzj\\\/lord-icon-2.0.2.js\\\"><\\\/script> <lord-icon src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/zpxybbhl.json\\\" trigger=\\\"loop\\\" colors=\\\"primary:#54BBAB,secondary:#007EA7\\\" stroke=\\\"35\\\" style=\\\"width: 90px; height: 90px;\\\"> <\\\/lord-icon><\\\/p>\",\"css\":\".el-element {\\n\\twidth: 120px;\\n    padding: 15px;\\n    border-radius: 50%;\\n    background-color:#fff;\\n    box-shadow: rgba(50, 50, 93, 0.25) 0px 50px 100px -20px, rgba(0, 0, 0, 0.3) 0px 30px 60px -30px;\\n}\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"medium\",\"position\":\"relative\",\"position_top\":\"55\",\"position_z_index\":\"1\",\"text_align\":\"center\"}},{\"type\":\"grid\",\"props\":{\"animation\":\"fade\",\"content_column_breakpoint\":\"m\",\"css\":\".el-title {\\n\\tpadding-top:10px;\\n}\\n\\n.el-item > * {\\n\\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.16) 0px 10px 36px 0px, rgba(0, 0, 0, 0.06) 0px 0px 0px 1px;\\n}\\n\\n.el-item > *:hover {\\n    box-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\\n\\n.el-item > *:hover .el-link { \\n\\tbackground-color: #003249;\\n\\tborder: solid 1px #003249;\\n\\tcolor: #fff;\\n\\tbox-shadow: rgba(0, 0, 0, 0.25) 0px 54px 55px, rgba(0, 0, 0, 0.12) 0px -12px 30px, rgba(0, 0, 0, 0.12) 0px 4px 6px, rgba(0, 0, 0, 0.17) 0px 12px 13px, rgba(0, 0, 0, 0.09) 0px -3px 5px;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":true,\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_row_align\":false,\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":false,\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_width\":\"80\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"link_margin\":\"medium\",\"link_style\":\"primary\",\"link_text\":\"Read More\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_easing\":\"1\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"text_align\":\"center\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"\",\"link\":\"kontakt\\\/\",\"link_text\":\"Call now\",\"title\":\"Our IT security experts will be happy to advise you.\"}}]}]}]}],\"name\":\"Hero \\u2013\\u00a0Level 2 \\\/\\\/ CTA - animiert\",\"modified\":\"2021-07-13T19:31:48.139Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-left-medium\",\"animation_delay\":\"60\",\"css\":\".el-section {\\n\\tmargin-bottom:130px;\\n}\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":false,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"active\":true,\"content\":\"Navigation:\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Advantages\",\"link\":\"#vorteile\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Services\",\"link\":\"#services\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Business relevance\",\"link\":\"#business\"}}]},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]}],\"props\":{\"column_gap\":\"large\"}},{\"type\":\"row\",\"props\":{\"column_gap\":\"large\",\"layout\":\"2-3,1-3\",\"margin\":\"large\",\"row_gap\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"column_divider\":false,\"content\":\"\n\n<p>In a world where data is the new gold and cyber threats are constantly on the rise, security analytics is not a luxury but a necessity. Security Analytics as a Service helps you to recognise threats at an early stage, respond effectively and protect your digital assets. With our services, you increase security, compliance and cost efficiency - a clear advantage for any modern organisation.<\\\/p>\",\"margin\":\"\",\"text_align\":\"left\",\"text_style\":\"lead\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"}}]},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"top-center\",\"image_size\":\"contain\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"name\":\"Panel Image Left\",\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content\":\"\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"small\",\"css\":\".el-title {\\n\\tpadding-top:10px;\\n}\\n\\n.el-image {\\n\\tborder-radius:15px 0 0 15px;\\n}\\n\\n\\n.el-element a {\\n\\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.16) 0px 10px 36px 0px, rgba(0, 0, 0, 0.06) 0px 0px 0px 1px;\\n}\\n\\n.el-element:hover {\\n   \\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n    transition:0.5s;\\n}\\n\\n.el-element:hover .el-link { \\n\\tbackground-color: #003249;\\n\\tborder: solid 1px #003249;\\n\\tcolor: #fff;\\n\\tbox-shadow: rgba(0, 0, 0, 0.25) 0px 54px 55px, rgba(0, 0, 0, 0.12) 0px -12px 30px, rgba(0, 0, 0, 0.12) 0px 4px 6px, rgba(0, 0, 0, 0.17) 0px 12px 13px, rgba(0, 0, 0, 0.09) 0px -3px 5px;\\n}\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/11\\\/it-security_04.jpg\",\"image_align\":\"left\",\"image_grid_breakpoint\":\"s\",\"image_grid_width\":\"2-5\",\"image_height\":800,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":800,\"link\":\"wp-content\\\/uploads\\\/2024\\\/05\\\/Case-Study_Managed-Vulnerability-Management_Komax_2023.pdf\",\"link_margin\":\"medium\",\"link_size\":\"large\",\"link_style\":\"secondary\",\"link_target\":true,\"link_text\":\"Download now\",\"margin\":\"default\",\"meta\":\"Case Study\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"text-meta\",\"panel_expand\":\"image\",\"panel_image_no_padding\":true,\"panel_link\":true,\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"title\":\"Komax: Vulnerability Management as a Service\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_margin\":\"small\"}}]}],\"props\":{\"margin\":\"xlarge\",\"row_gap\":\"large\"}}],\"name\":\"Content \\u2013 Level 2\",\"modified\":\"2021-05-11T13:23:47.505Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-left-medium\",\"animation_delay\":\"60\",\"css\":\".el-section {\\n\\tmargin-bottom:130px;\\n}\",\"id\":\"vorteile\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":false,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"What are the advantages of Security Analytics as a Service?\",\"margin\":\"large\",\"margin_remove_bottom\":true,\"maxwidth_breakpoint\":\"m\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_end\":\"70vh + 70%\",\"parallax_opacity\":\"0.3,1\",\"parallax_y\":\"30,0\",\"text_align\":\"left\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"column_divider\":false,\"content\":\"\",\"margin\":\"default\",\"text_align\":\"left\",\"text_style\":\"lead\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}],\"props\":{\"id\":\"vorteile\",\"layout\":\"3-4,1-4\"}},{\"type\":\"row\",\"props\":{\"layout\":\"1-3,1-3,1-3\",\"margin\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"small\",\"margin\":\"default\",\"margin_remove_bottom\":false}},{\"type\":\"headline\",\"props\":{\"content\":\"Early detection\",\"margin_remove_top\":true,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>In today's dynamic threat landscape, the ability to recognise threats at an early stage is crucial. Thanks to machine learning, our solutions are always up to date and can identify anomalies and suspicious behaviour before they escalate into real security incidents.<\\\/p>\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"small\",\"margin\":\"default\",\"margin_remove_bottom\":false}},{\"type\":\"headline\",\"props\":{\"content\":\"Faster decision-making\",\"margin_remove_top\":true,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>The insights gained with our services enable your security team to make well-founded decisions. We prepare the reports and analyses so that the right risk mitigation measures can be defined and implemented quickly.<\\\/p>\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"small\",\"margin\":\"default\",\"margin_remove_bottom\":false}},{\"type\":\"headline\",\"props\":{\"content\":\"Compliance and regulation\",\"margin_remove_top\":true,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p><strong><\\\/strong>Many industries are subject to strict legal and regulatory requirements. When you purchase our <a href=\\\"https:\\\/\\\/www.ensec.ch\\\/managed-it-security\\\/\\\">Managed Security Services<\\\/a>, you also benefit from the in-depth expertise of our security consultants, who compile reports tailored to your company.<\\\/p>\",\"margin\":\"default\"}}]}]}],\"name\":\"Content \\u2013 Level 2\",\"modified\":\"2021-05-11T13:23:47.505Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-left-medium\",\"animation_delay\":\"100\",\"id\":\"bestandteile\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/04\\\/seekarte_hintergrund-02.svg\",\"image_position\":\"top-right\",\"image_size\":\"contain\",\"padding\":\"large\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"\"},\"children\":[{\"type\":\"row\",\"props\":{\"width\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Services\",\"id\":\"services\",\"margin\":\"large\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_end\":\"70vh + 70%\",\"parallax_opacity\":\"0.3,1\",\"parallax_y\":\"30,0\",\"text_align\":\"left\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}},{\"name\":\"Accordion Image Left\",\"type\":\"accordion\",\"children\":[{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<p>With the Managed NDR Service, we offer efficient real-time monitoring of your network activities. Based on powerful and proven AI algorithms, our service provides complete visibility of network data flows and enables automatic detection of suspicious behaviour to efficiently support your security team in responding to dormant and active threats \\u2013 before any real damage is done.<\\\/p>\\n\n\n<p>Threat detection includes:<\\\/p>\\n\n\n<ul>\\n\n\n<li><strong>Advanced Persistent Threats (APT):<\\\/strong> long-term, targeted attacks are prevented through early detection and intervention.<\\\/li>\\n\n\n<li><strong>Active data leaks:<\\\/strong> Unauthorised data transfers are immediately identified and blocked.<\\\/li>\\n\n\n<li><strong>Cyber attacks:<\\\/strong> A wide range of attacks, from malware to DDoS, are effectively defended against.<\\\/li>\\n\n\n<li><strong>Malicious insiders:<\\\/strong> Internal, suspicious behaviour is detected and investigated.<\\\/li>\\n\n\n<li><strong>Ransomware attacks:<\\\/strong> encryption attempts by ransomware are prevented in good time.<\\\/li>\\n<\\\/ul>\\n\n\n<p>The service can be easily integrated into your existing IT and security infrastructure. The architecture is customised to enable seamless integration into existing systems.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/test_g.svg\",\"title\":\"Managed Threat Detection \\\/ NDR\"}},{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<p>The importance of mature vulnerability management cannot be overestimated. As crucial as the management of existing vulnerabilities is, very few IT teams have time for it.<\\\/p>\\n\n\n<p>With our VM aaS, we support you in the development, coordination and optimisation of a holistic vulnerability management programme that is tailored to your company and your risk tolerance. This not only gives you insight into the vulnerabilities in your IT environment, including local, remote, cloud, container and virtual infrastructure, but also a clear overview of how they impact your business risk.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/mss_aaas_vulnerability-managment.svg\",\"title\":\"Vulnerability Management as a Service\"}}],\"props\":{\"collapsible\":false,\"content_column_breakpoint\":\"m\",\"css\":\".el-title {\\n\\tfont-size:2.3vh;\\n    padding-bottom:15px;\\n}\\n\\n.el-image {\\n\\tmargin-top:10px;\\n}\\n\\n.el-content {\\n\\tmax-width:80%;\\n}\\n\\n.uk-child-width-expand {\\n\\tpadding-bottom:50px;\\n}\",\"image_align\":\"left\",\"image_border\":\"rounded\",\"image_grid_breakpoint\":\"s\",\"image_grid_width\":\"1-4\",\"image_height\":\"200\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_vertical_align\":false,\"image_width\":\"250\",\"link_margin\":\"small\",\"link_style\":\"text\",\"link_text\":\"Read more\",\"margin\":\"default\",\"margin_remove_top\":false,\"multiple\":false,\"show_image\":true,\"show_link\":true,\"title_element\":\"h3\"}}]}]}],\"name\":\"Bestandteile\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"top-center\",\"image_size\":\"contain\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"animation\":\"none\",\"content\":\"\n\n<p><strong>The early detection of threats reduces the cost of resolving security incidents.<\\\/strong><\\\/p>\\n\n\n<p>Security analytics helps to ensure compliance with regulatory requirements through comprehensive monitoring and documentation.<\\\/p>\\n\n\n<p>Analytics as a service provides clear insights into the security situation and potential risks. This enables clear planning and prioritisation of investments in IT security.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"medium\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/Aus-Sich-des-Business_Analytics-as-a-Service.jpg\",\"image_align\":\"right\",\"image_grid_breakpoint\":\"m\",\"image_grid_column_gap\":\"large\",\"image_grid_width\":\"3-5\",\"image_height\":\"780\",\"image_link\":true,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":\"910\",\"link\":\"#8\",\"link_style\":\"text\",\"link_text\":\"\",\"margin\":\"large\",\"margin_remove_top\":false,\"meta\":\"From a business perspective\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"h4\",\"panel_padding\":\"large\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"l\",\"parallax_x\":\"220,0\",\"title\":\"Safety advantage through early detection of potential risks.\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_link\":false,\"title_margin\":\"small\",\"title_style\":\"h2\"}}]}]}],\"name\":\"Aus Sicht des Business \\u2013 schmal\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"100\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-top: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 0 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n\\tborder-right: 0px solid #fff;\\n    padding: 0 0 0 50px;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"large\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"content\":\"\n\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\\\/p>\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\",\"title_style\":\"h1\"}}]},{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-left: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 50px 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n \\tborder-left: 0px solid #fff;\\n    padding: 0 50px 0 0;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"none\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"button\",\"props\":{\"button_size\":\"large\",\"css\":\".el-content {\\n\\tfont-size: 1.3rem;\\n    padding: 15px 40px;\\n    text-transform: uppercase;\\n}\\n\\n.el-content:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"text_align\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"primary\",\"content\":\"Write to us\",\"icon_align\":\"left\",\"link\":\"mailto:hello@ensec.ch\"}}]},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Or give us a call:<\\\/p>\",\"margin\":\"default\",\"margin_remove_bottom\":true,\"text_align\":\"center\"}},{\"type\":\"headline\",\"props\":{\"content\":\"+41 44 711 11 44\",\"link\":\"tel:+41447111144 \",\"margin_remove_top\":true,\"text_align\":\"center\",\"title_element\":\"h3\"}}]}],\"props\":{\"column_gap\":\"collapse\",\"layout\":\"2-3,1-3\",\"row_gap\":\"collapse\"}}],\"name\":\"ensec \\u2013 Call to action\"}],\"version\":\"4.4.16\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Analytics as a Service Early identification of vulnerabilities and anomalies in the company network Our IT security experts will be happy to advise you. Call now Navigation: Advantages Services Business relevance In a world where data is the new gold and cyber threats are constantly on the rise, security analytics is not a luxury but [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":7803,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7850","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/comments?post=7850"}],"version-history":[{"count":4,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7850\/revisions"}],"predecessor-version":[{"id":8095,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7850\/revisions\/8095"}],"up":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7803"}],"wp:attachment":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/media?parent=7850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}