{"id":7868,"date":"2024-05-13T14:02:47","date_gmt":"2024-05-13T12:02:47","guid":{"rendered":"https:\/\/www.ensec.ch\/it-security-beratung\/"},"modified":"2025-01-27T13:40:58","modified_gmt":"2025-01-27T12:40:58","slug":"it-security-beratung","status":"publish","type":"page","link":"https:\/\/www.ensec.ch\/en\/it-security-beratung\/","title":{"rendered":"IT Security Consulting"},"content":{"rendered":"<h1>\n<p>IT Security Consulting<\/p>\n<\/h1>\n<div>\n<p>Our expertise keeps your IT securely on track.<\/p>\n<\/div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/10\/it-security-beratung_simon.png\" alt=\"\"><br \/>\n<img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/05\/quote.svg\" alt=\"\"><\/p>\n<div>\n<p><em>ensec Consulting puts companies&#8217; information security on a standardised, secure course. Our expertise clears the way when setting up complex control systems and protects against the risky shoals of internal regulations and external regulatory requirements.<\/em><\/p>\n<\/div>\n<h2>ensec expertise turns supposed security into actual security.<\/h2>\n<hr>\n<h2>The vast majority of companies that fall victim to ransomware attacks have firewalls, anti-virus solutions, backups and possibly other security technologies in place. Management and employees are therefore often lulled into a false sense of security and are initially at a loss for explanations after a successful attack.<\/h2>\n<div>\n<p>The reasons for the failure of existing security measures are manifold and often a combination of several factors. Starting with a lack of strategy, non-existent guidelines and employee training, through to incorrect architecture or technology decisions and incomplete controls.<\/p>\n<\/div>\n<h2>Security &#8211; a question of strategy.<\/h2>\n<div>\n<p>According to recent surveys, only a small double-digit percentage of all companies have a security strategy that is aligned with their corporate objectives. This is all too often reflected in bad investments, poor planning and ultimately inadequate security. We know how to help companies define and navigate their course.<\/p>\n<\/div>\n<h2>Customise and implement security architecture.<\/h2>\n<div>\n<p>A good architecture is the basis for the technical manifestation of the security strategy. Our experts have well-founded answers to the question of whether the current architecture is still adequate and how it needs to be readjusted with regard to current and future risks. ensec also advises companies on setting up and implementing a completely new security architecture.<\/p>\n<\/div>\n<h2>Our IT security consulting in detail<\/h2>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/07\/beratung-strategie.svg\" alt=\"\"><\/p>\n<h3>Security Strategy<\/h3>\n<p><a href=\"\/ensec\/en\/it-security-beratung\/security-strategie\/\">Learn more<\/a><\/p>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/07\/beratung-grc.svg\" alt=\"\"><\/p>\n<h3>GRC<\/h3>\n<p><a href=\"\/ensec\/en\/it-security-beratung\/grc\/\">Learn more<\/a><\/p>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/07\/beratung-architektur.svg\" alt=\"\"><\/p>\n<h3>Security Architektur<\/h3>\n<p><a href=\"\/ensec\/en\/it-security-beratung\/security-architektur\/\">Mehr erfahren<\/a><\/p>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/07\/beratung-awarness.svg\" alt=\"\"><\/p>\n<h3>Security Awareness<\/h3>\n<p><a href=\"\/ensec\/en\/it-security-beratung\/security-awareness\/\">Mehr erfahren<\/a><\/p>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/07\/beratung-technologie.svg\" alt=\"\"><\/p>\n<h3>Technology Consulting<\/h3>\n<p><a href=\"\/ensec\/en\/it-security-beratung\/technologieberatung\/\">Mehr erfahren<\/a><\/p>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/cyber-resilience.svg\" alt=\"\"><\/p>\n<h3>Cyber Resilience<\/h3>\n<p><a href=\"\/ensec\/en\/it-security-beratung\/cyber-resilience\/\">Mehr erfahren<\/a><\/p>\n<\/li>\n<\/ul>\n<h2>GRC &#8211; having the risks under control.<\/h2>\n<div>\n<p>GRC combines the management of the company (governance), risk management (risk) and compliance into one discipline. Our services in this area range from corresponding analyses to the development of management systems and awareness training.<\/p>\n<\/div>\n<h2>From the human risk factor to the human firewall with security awareness.<\/h2>\n<div>\n<p>Between 50 % and 90 % of all data thefts and malware incidents are due to employee misbehaviour. Our experts will help you to establish a security culture that takes the wind out of the sails of simple passwords, successful phishing attempts and insecure surfing behaviour.<\/p>\n<\/div>\n<h2>Technology consulting &#8211; appropriate selection and implementation.<\/h2>\n<div>\n<p>No matter how fit and well-trained the crew and captain may be. If the hull is full of holes and the sails are mounted incorrectly, the ship will go nowhere. ensec offers a comprehensive range of technological consulting services, from product evaluation and integration concepts to assessments of existing setups and configurations.<\/p>\n<\/p>\n<p>As partners and experienced experts in the field of information security, we advise CIOs, CISOs and their teams on the design and implementation of solutions that ensure the security and legality of corporate activities in the digital world.<\/p>\n<\/p>\n<p>Incidentally, we also attach great importance to ensuring that things are not just right at the level of zeros and ones, but also in interpersonal and personal relationships. Our customers appreciate our seniority, routine, expertise and, last but not least, our sociability.<\/p>\n<\/div>\n<div>From a business perspective<\/div>\n<h2>Information security is a matter for the boss. And that of ensec.<\/h2>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/10\/19-Stimmung-Ensec-Buero-0595-scaled.jpg\" alt=\"\"><\/p>\n<div>\n<p>In view of the current and future relevance and potential of digital processes, the legal requirements, but also the associated risks and dangers, information security should have a firm place on the management agenda and &#8211; which we believe is essential &#8211; also enjoy greater acceptance and appreciation. After all, the risks are simply too great to be neglected.<\/p>\n<\/div>\n<h2>\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\/p>\n<\/h2>\n<p><p>\n        <a href=\"mailto:hello@ensec.ch\">Write to us<\/a>\n    <\/p>\n<\/p>\n<div>\n<p>Or give us a call:<\/p>\n<\/div>\n<h3><a href=\"tel:+41447111144 \">+41 44 711 11 44<\/a><\/h3>\n<p><!--more--><br \/>\n<!-- {\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"animation\":\"slide-right-medium\",\"animation_delay\":\"60\",\"css\":\"@media (min-width: 960px) {\\n\\t.uk-position-cover, video {\\n    \\tmargin-left:60%;\\n\\t\\twidth:40%;\\n\\t}\\n    \\n    .uk-position-cover {\\n    \\tdisplay:none;\\n    }\\n    \\n    video {\\n    \\tpadding:390px 40px 15% 0;   \\n    }\\n\\n    .el-section {\\n        padding-top:180px;\\n    \\tbackground-image: url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg');\\n  \\t\\tbackground-repeat: no-repeat;\\n  \\t\\tbackground-position: top calc(50% + 5%);\\n  \\t\\tbackground-size: 100% auto;\\n  \\t\\tmargin: 0;\\n    }\\n}\",\"header_transparent\":false,\"header_transparent_noplaceholder\":true,\"header_transparent_text_color\":\"dark\",\"height\":\"viewport\",\"height_offset_top\":true,\"height_viewport\":60,\"image_position\":\"center-center\",\"image_size\":\"cover\",\"media_overlay\":\"rgba(0, 45, 66, 0.69)\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"bottom\",\"video\":\"wp-content\\\/uploads\\\/2024\\\/05\\\/GettyImages-1289963395.mp4\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"image_size\":\"width-1-1\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"1-1\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align\":\"center\",\"content\":\"\n\n<p>IT Security Consulting<\\\/p>\",\"css\":\"@media (min-width: 960px) {\\n\\t.el-element {\\n\\t\\twidth:46%;\\n        font-size:6rem;\\n        font-weight:bold;\\n\\t}\\n}\\n\\n@media (max-width: 960px) {\\n\\t.el-element {\\n\\t\\tcolor:#fff;\\n        font-weight:bold;\\n\\t}\\n}\",\"margin\":\"medium\",\"margin_remove_top\":true,\"text_align\":\"left\",\"title_element\":\"h1\",\"title_style\":\"heading-xlarge\"},\"name\":\"Seitentitel\"},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Our expertise keeps your IT securely on track.<\\\/p>\",\"css\":\"@media (max-width: 960px) {\\n    .el-element {\\n    \\tcolor:#fff;\\n    }\\n}\",\"margin\":\"large\",\"margin_remove_bottom\":true,\"margin_remove_top\":true,\"maxwidth\":\"xlarge\",\"text_style\":\"lead\"}},{\"type\":\"image\",\"props\":{\"css\":\".el-element {\\n\\tmargin-bottom:-33px !important;\\n}\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/10\\\/it-security-beratung_simon.png\",\"image_svg_color\":\"emphasis\",\"image_width\":500,\"margin\":\"default\",\"position\":\"relative\",\"position_z_index\":\"1\"}}]}]},{\"type\":\"row\",\"props\":{\"css\":\".uk-card-primary {\\n    \\tborder-radius:5px;\\n\\t\\tpadding:60px 60px 50px 50px;\\n}\\n\\n@media (min-width: 960px) {\\n    .uk-card-primary {\\n    \\tborder-radius:5px;\\n\\t\\tpadding:100px 240px 100px 80px;\\n\\t}\\n}\\n\\n\",\"row_gap\":\"collapse\"},\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".uk-card-primary {\\n\\tbox-shadow: rgba(17, 17, 26, 0.1) 0px 8px 24px, rgba(17, 17, 26, 0.1) 0px 16px 56px, rgba(17, 17, 26, 0.1) 0px 24px 80px;\\n}\",\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"style\":\"card-primary\"},\"children\":[{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/quote.svg\",\"image_svg_color\":\"emphasis\",\"image_width\":60,\"margin\":\"default\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p><em>ensec Consulting puts companies' information security on a standardised, secure course. Our expertise clears the way when setting up complex control systems and protects against the risky shoals of internal regulations and external regulatory requirements.<\\\/em><\\\/p>\",\"margin\":\"\",\"text_style\":\"lead\"}}]}]}],\"name\":\"Hero\"},{\"name\":\"Intro\",\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"60\",\"css\":\"@media (max-width: 960px) {\\n    .el-section {\\n\\t\\tmargin-top:60px;\\n\\t}\\n}\\n\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"padding_remove_top\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"parallax\",\"content\":\"ensec expertise turns supposed security into actual security.\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_end\":\"70vh + 70%\",\"parallax_opacity\":\"0.3,1\",\"parallax_y\":\"30,0\",\"text_align\":\"left\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}},{\"type\":\"divider\",\"props\":{\"css\":\".el-element {\\n\\tmax-width:50%;\\n}\",\"divider_element\":\"hr\",\"margin\":\"medium\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"}}],\"props\":{\"layout\":\"2-3,1-3\"}},{\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\",\"margin\":\"large\",\"row_gap\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"The vast majority of companies that fall victim to ransomware attacks have firewalls, anti-virus solutions, backups and possibly other security technologies in place. Management and employees are therefore often lulled into a false sense of security and are initially at a loss for explanations after a successful attack.\",\"title_element\":\"h2\",\"title_style\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"column_divider\":false,\"content\":\"\n\n<p>The reasons for the failure of existing security measures are manifold and often a combination of several factors. Starting with a lack of strategy, non-existent guidelines and employee training, through to incorrect architecture or technology decisions and incomplete controls.<\\\/p>\",\"margin\":\"\",\"text_align\":\"left\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Security - a question of strategy.\",\"title_element\":\"h2\",\"title_style\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"column_divider\":false,\"content\":\"\n\n<p>According to recent surveys, only a small double-digit percentage of all companies have a security strategy that is aligned with their corporate objectives. This is all too often reflected in bad investments, poor planning and ultimately inadequate security. We know how to help companies define and navigate their course.<\\\/p>\",\"margin\":\"\",\"text_align\":\"left\"}},{\"type\":\"headline\",\"props\":{\"content\":\"Customise and implement security architecture.\",\"title_element\":\"h2\",\"title_style\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"column_divider\":false,\"content\":\"\n\n<p>A good architecture is the basis for the technical manifestation of the security strategy. Our experts have well-founded answers to the question of whether the current architecture is still adequate and how it needs to be readjusted with regard to current and future risks. ensec also advises companies on setting up and implementing a completely new security architecture.<\\\/p>\",\"margin\":\"\",\"text_align\":\"left\"}}]}]}]},{\"type\":\"section\",\"props\":{\"animation\":\"slide-left-medium\",\"animation_delay\":\"100\",\"css\":\".el-section {\\n        background-color:#002d42;\\n}\\n\\n@media (min-width: 960px) {\\n    .el-section {\\n\\t\\tmargin:0 40px 0 40px;\\n        border-radius:5px;\\n\\t}\\n}\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_parallax_bgy\":\"150,\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"padding\":\"large\",\"style\":\"muted\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"1-3,2-3\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Our IT security consulting in detail\",\"maxwidth_breakpoint\":\"m\",\"title_color\":\"warning\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"css\":\".uk-card-primary {\\n\\tborder-radius:5px;\\n}\\n\\n.el-item:hover .uk-card-primary {\\n    background-color:#007ea7;\\n\\tbox-shadow: rgba(0, 126, 167, 0.4) 0px 8px 24px, rgba(0, 126, 167, 0.4) 0px 16px 56px, rgba(0, 126, 167, 0.4) 0px 24px 80px;\\n    transition: background-color 0.5s, box-shadow 0.5s;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_parallax\":\"0\",\"grid_small\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"item_animation\":true,\"item_maxwidth\":\"xlarge\",\"lightbox_bg_close\":true,\"link_style\":\"text\",\"link_text\":\"Learn more\",\"margin\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,-80\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h2\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/07\\\/beratung-strategie.svg\",\"link\":\"en\\\/it-security-beratung\\\/security-strategie\\\/\",\"title\":\"Security Strategy\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/07\\\/beratung-grc.svg\",\"link\":\"en\\\/it-security-beratung\\\/grc\\\/\",\"title\":\"GRC\"}}]}]}]},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-1\"},\"children\":[{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"css\":\".uk-card-primary {\\n\\tborder-radius:5px;\\n}\\n\\n.el-item:hover .uk-card-primary {\\n    background-color:#007ea7;\\n\\tbox-shadow: rgba(0, 126, 167, 0.4) 0px 8px 24px, rgba(0, 126, 167, 0.4) 0px 16px 56px, rgba(0, 126, 167, 0.4) 0px 24px 80px;\\n    transition: background-color 0.5s, box-shadow 0.5s;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"3\",\"grid_parallax\":\"0\",\"grid_small\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"item_animation\":true,\"item_maxwidth\":\"xlarge\",\"lightbox_bg_close\":true,\"link_style\":\"text\",\"link_text\":\"Mehr erfahren\",\"margin\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,-80\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h2\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/07\\\/beratung-architektur.svg\",\"link\":\"en\\\/it-security-beratung\\\/security-architektur\\\/\",\"title\":\"Security Architektur\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/07\\\/beratung-awarness.svg\",\"link\":\"en\\\/it-security-beratung\\\/security-awareness\\\/\",\"title\":\"Security Awareness\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/07\\\/beratung-technologie.svg\",\"link\":\"en\\\/it-security-beratung\\\/technologieberatung\\\/\",\"title\":\"Technology Consulting\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/cyber-resilience.svg\",\"link\":\"en\\\/it-security-beratung\\\/cyber-resilience\\\/\",\"title\":\"Cyber Resilience\"}}]}]}]}],\"name\":\"Services\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"100\",\"css\":\"@media (min-width: 960px) {\\n    .el-section {\\n\\t\\tmargin:0 40px 0 40px\\n\\t}\\n}\",\"image_position\":\"top-left\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\",\"margin\":\"large\",\"row_gap\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"GRC - having the risks under control.\",\"title_element\":\"h2\",\"title_style\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"column_divider\":false,\"content\":\"\n\n<p>GRC combines the management of the company (governance), risk management (risk) and compliance into one discipline. Our services in this area range from corresponding analyses to the development of management systems and awareness training.<\\\/p>\",\"margin\":\"\",\"text_align\":\"left\"}},{\"type\":\"headline\",\"props\":{\"content\":\"From the human risk factor to the human firewall with security awareness.\",\"title_element\":\"h2\",\"title_style\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"column_divider\":false,\"content\":\"\n\n<p>Between 50 % and 90 % of all data thefts and malware incidents are due to employee misbehaviour. Our experts will help you to establish a security culture that takes the wind out of the sails of simple passwords, successful phishing attempts and insecure surfing behaviour.<\\\/p>\",\"margin\":\"\",\"text_align\":\"left\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Technology consulting - appropriate selection and implementation.\",\"title_element\":\"h2\",\"title_style\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"column_divider\":false,\"content\":\"\n\n<p>No matter how fit and well-trained the crew and captain may be. If the hull is full of holes and the sails are mounted incorrectly, the ship will go nowhere. ensec offers a comprehensive range of technological consulting services, from product evaluation and integration concepts to assessments of existing setups and configurations.<\\\/p>\\n\n\n<p><\\\/p>\\n\n\n<p>As partners and experienced experts in the field of information security, we advise CIOs, CISOs and their teams on the design and implementation of solutions that ensure the security and legality of corporate activities in the digital world.<\\\/p>\\n\n\n<p><\\\/p>\\n\n\n<p>Incidentally, we also attach great importance to ensuring that things are not just right at the level of zeros and ones, but also in interpersonal and personal relationships. Our customers appreciate our seniority, routine, expertise and, last but not least, our sociability.<\\\/p>\",\"margin\":\"\",\"text_align\":\"left\"}}]}]}],\"name\":\"Vorteile\",\"modified\":\"2021-01-08T13:56:27.050Z\"},{\"name\":\"Zwischenbild\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/06\\\/ensec_sea-construction_07.jpg\",\"image_effect\":\"fixed\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"image_width\":\"1920\",\"padding\":\"large\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tmin-height:500px;\\n}\",\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\"}}]}]},{\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"100\",\"css\":\"@media (min-width: 960px) {\\n    .el-section {\\n\\t\\tmargin:0 40px 0 40px\\n\\t}\\n}\",\"image_position\":\"top-left\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"2-5\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_fallback\":\"center\",\"content\":\"From a business perspective\",\"maxwidth\":\"xlarge\",\"position\":\"relative\",\"position_z_index\":\"1\",\"text_align\":\"left\",\"text_align_fallback\":\"center\",\"title_element\":\"div\",\"title_style\":\"h5\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-5\"}}],\"props\":{\"column_gap\":\"large\",\"layout\":\"2-5,3-5\",\"margin\":\"default\",\"margin_remove_bottom\":false,\"row_gap\":\"large\"}},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-5\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_fallback\":\"center\",\"content\":\"Information security is a matter for the boss. And that of ensec.\",\"maxwidth\":\"xlarge\",\"position\":\"relative\",\"position_z_index\":\"1\",\"text_align\":\"left\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-5\"},\"children\":[{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2021\\\/10\\\/19-Stimmung-Ensec-Buero-0595-scaled.jpg\",\"image_svg_color\":\"emphasis\",\"margin\":\"default\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>In view of the current and future relevance and potential of digital processes, the legal requirements, but also the associated risks and dangers, information security should have a firm place on the management agenda and - which we believe is essential - also enjoy greater acceptance and appreciation. After all, the risks are simply too great to be neglected.<\\\/p>\",\"margin\":\"default\"}}]}],\"props\":{\"column_gap\":\"large\",\"layout\":\"2-5,3-5\",\"margin\":\"remove-vertical\",\"margin_remove_bottom\":true,\"row_gap\":\"large\"}}],\"name\":\"Aus Sicht des Business\",\"modified\":\"2021-01-08T13:56:27.050Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_top\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-top: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 0 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n\\tborder-right: 0px solid #fff;\\n    padding: 0 0 0 50px;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"large\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"content\":\"\n\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\\\/p>\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\",\"title_style\":\"h1\"}}]},{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-left: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 50px 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n \\tborder-left: 0px solid #fff;\\n    padding: 0 50px 0 0;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"none\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"button\",\"props\":{\"button_size\":\"large\",\"css\":\".el-content {\\n\\tfont-size: 1.3rem;\\n    padding: 15px 40px;\\n    text-transform: uppercase;\\n}\\n\\n.el-content:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"text_align\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"primary\",\"content\":\"Write to us\",\"dialog_layout\":\"modal\",\"dialog_offcanvas_flip\":true,\"icon_align\":\"left\",\"link\":\"mailto:hello@ensec.ch\"}}]},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Or give us a call:<\\\/p>\",\"margin\":\"default\",\"margin_remove_bottom\":true,\"text_align\":\"center\"}},{\"type\":\"headline\",\"props\":{\"content\":\"+41 44 711 11 44\",\"link\":\"tel:+41447111144 \",\"margin_remove_top\":true,\"text_align\":\"center\",\"title_element\":\"h3\"}}]}],\"props\":{\"column_gap\":\"collapse\",\"layout\":\"2-3,1-3\",\"row_gap\":\"collapse\"}}],\"name\":\"ensec \\u2013 Call to action\"}],\"version\":\"4.5.1\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT Security Consulting Our expertise keeps your IT securely on track. ensec Consulting puts companies&#8217; information security on a standardised, secure course. Our expertise clears the way when setting up complex control systems and protects against the risky shoals of internal regulations and external regulatory requirements. ensec expertise turns supposed security into actual security. The [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7868","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/comments?post=7868"}],"version-history":[{"count":9,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7868\/revisions"}],"predecessor-version":[{"id":8239,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7868\/revisions\/8239"}],"wp:attachment":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/media?parent=7868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}