{"id":7876,"date":"2021-09-28T10:18:09","date_gmt":"2021-09-28T08:18:09","guid":{"rendered":"https:\/\/www.ensec.ch\/it-security-beratung\/security-architektur\/"},"modified":"2024-12-17T14:19:27","modified_gmt":"2024-12-17T13:19:27","slug":"security-architektur","status":"publish","type":"page","link":"https:\/\/www.ensec.ch\/en\/it-security-beratung\/security-architektur\/","title":{"rendered":"Security Architecture"},"content":{"rendered":"<h1>Security Architecture<\/h1>\n<div>\n<p><script src=\"https:\/\/cdn.lordicon.com\/libs\/frhvbuzj\/lord-icon-2.0.2.js\"><\/script> <lord-icon src=\"https:\/\/cdn.lordicon.com\/zpxybbhl.json\" trigger=\"loop\" colors=\"primary:#54BBAB,secondary:#007EA7\" stroke=\"35\" style=\"width: 90px; height: 90px;\"> <\/lord-icon><\/p>\n<\/div>\n<div>\n<h2>Our IT security experts will be happy to advise you.<\/h2>\n<p><a href=\"\/ensec\/kontakt\/\">Call now<\/a><\/p>\n<\/div>\n<hr>\n<h2>\n<p>The architecture of your IT security should be based on industry standards, directives, guidelines and best practice. It forms the foundation for an effective and efficient defence against today&#8217;s threats in cyberspace.<\/p>\n<\/p>\n<p>In order to meet the constantly changing requirements of SaaS, IaaS, home office and offshoring, the architecture should have adequate flexibility.<\/p>\n<\/h2>\n<div>Our IT security consulting for your business<\/div>\n<ul>\n<li>\n        <a href=\"\/ensec\/it-security-beratung\/security-strategie\/\">Security Strategy<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/it-security-beratung\/grc\/\">GRC<\/a>\n    <\/li>\n<li>\n        <a href=\"\">Security Architecture<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/it-security-beratung\/security-awareness\/\">Security Awareness<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/it-security-beratung\/technologieberatung\/\">Technology consulting<\/a>\n    <\/li>\n<\/ul>\n<hr>\n<h2>\n<p>We guide you through the entire process<\/p>\n<\/h2>\n<div>\n<p>By IT security architecture, we mean all measures in IT that serve to prevent misuse of your IT systems and increase the availability of the infrastructure.<\/p>\n<\/div>\n<div>\n<p>These are not exclusively technical solutions, but also include internal guidelines, directives and IT concepts for configuring and operating the infrastructure:<\/p>\n<ul>\n<li>Protection of IaaS and SaaS in the cloud<\/li>\n<li>Protection of the endpoints<\/li>\n<li>Protection of the networks<\/li>\n<li>Protection of OT<\/li>\n<\/ul>\n<p>ensec&#8217;s IT security consultants and engineers work with you to assess the existing security measures and develop customised variants. This is always done in the context of your requirements in terms of protection needs, operability and costs.<\/p>\n<\/div>\n<h3>\n<h3>Balanced measures: ensec supports you in the balancing act<\/h3>\n<\/h3>\n<div>\n<p>For the investment in your IT security to effectively increase protection, the measures must be balanced. For example, the best protection of IaaS components is jeopardised if endpoint or office networks are neglected, making it relatively easy to carry out attacks on your company and your data via these channels.<\/p>\n<\/p>\n<p>Our experience in the areas of risk management and IT security will help you to implement a balanced IT security architecture in which your investments are made at the point where they are most effective.<\/p>\n<\/div>\n<h3>Compatible solutions: We know the interfaces<\/h3>\n<div>\n<p>The technical components of the IT security architecture comprise a wide range of active and passive modules &#8211; from the web application firewall (WAF) to the endpoint detection and response (EDR) solution. The interaction of the products is essential for operability in order to achieve the greatest possible automation and avoid problems over the lifecycle. Depending on your goal and protection needs, different strategies may be appropriate &#8211; &#8216;best of breed&#8217; with integration of interfaces for the highest requirements, or the &#8216;single vendor&#8217; approach to efficiently achieve good protection for your organisation. Our IT security engineers have proven experience to ensure future-proof implementation.<\/p>\n<\/div>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/11\/it-security_03.jpg\" alt=\"\"><\/p>\n<h2>Cyber security &#8211; without stomach ache<\/h2>\n<p>From a business perspective<\/p>\n<div>\n<p>The IT security architecture defines the foundation and blueprint of your cyber security.<\/p>\n<p>The starting points are recorded and the strategy for the future is defined. This makes costs and benefits transparent over the coming years and measurable and comparable through the implementation of industry standards and best practices.<\/p>\n<\/div>\n<p><a href=\"#8\"><\/a><\/p>\n<\/div>\n<h2>\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\/p>\n<\/h2>\n<p>\n    <a href=\"mailto:hello@ensec.ch\">Write to us<\/a>\n<\/p>\n<div>\n<p>Or give us a call:<\/p>\n<\/div>\n<h3><a href=\"tel:+41447111144 \">+41 44 711 11 44<\/a><\/h3>\n<p><!--more--><br \/>\n<!-- {\"name\":\"Home\",\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"120\",\"css\":\".el-section {\\n\\tbackground-image: url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ensec-hintergrund_animation.svg'), url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/background_seamap-03.png');\\n  background-repeat: no-repeat, no-repeat;\\n  background-position: center, center;\\n  background-size: cover, cover;\\n}\",\"header_transparent_noplaceholder\":true,\"id\":\"top\",\"image_position\":\"top-center\",\"image_size\":\"cover\",\"media_background\":\"#007EA7\",\"media_overlay\":\"rgba(0, 0, 0, 0.1)\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"style\":\"muted\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"video_width\":\"2560\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"2-3,1-3\",\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Security Architecture\",\"margin\":\"small\",\"margin_remove_top\":true,\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"s\",\"text_align_fallback\":\"center\",\"title_color\":\"success\",\"title_element\":\"h1\",\"title_style\":\"heading-large\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p><script src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/libs\\\/frhvbuzj\\\/lord-icon-2.0.2.js\\\"><\\\/script> <lord-icon src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/zpxybbhl.json\\\" trigger=\\\"loop\\\" colors=\\\"primary:#54BBAB,secondary:#007EA7\\\" stroke=\\\"35\\\" style=\\\"width: 90px; height: 90px;\\\"> <\\\/lord-icon><\\\/p>\",\"css\":\".el-element {\\n\\twidth: 120px;\\n    padding: 15px;\\n    border-radius: 50%;\\n    background-color:#fff;\\n    box-shadow: rgba(50, 50, 93, 0.25) 0px 50px 100px -20px, rgba(0, 0, 0, 0.3) 0px 30px 60px -30px;\\n}\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"medium\",\"position\":\"relative\",\"position_top\":\"55\",\"position_z_index\":\"1\",\"text_align\":\"center\"}},{\"type\":\"grid\",\"props\":{\"animation\":\"fade\",\"content_column_breakpoint\":\"m\",\"css\":\".el-title {\\n\\tpadding-top:10px;\\n}\\n\\n.el-item > * {\\n\\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.16) 0px 10px 36px 0px, rgba(0, 0, 0, 0.06) 0px 0px 0px 1px;\\n}\\n\\n.el-item > *:hover {\\n    box-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\\n\\n.el-item > *:hover .el-link { \\n\\tbackground-color: #003249;\\n\\tborder: solid 1px #003249;\\n\\tcolor: #fff;\\n\\tbox-shadow: rgba(0, 0, 0, 0.25) 0px 54px 55px, rgba(0, 0, 0, 0.12) 0px -12px 30px, rgba(0, 0, 0, 0.12) 0px 4px 6px, rgba(0, 0, 0, 0.17) 0px 12px 13px, rgba(0, 0, 0, 0.09) 0px -3px 5px;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":true,\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_row_align\":false,\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":false,\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_width\":\"80\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"link_margin\":\"medium\",\"link_style\":\"primary\",\"link_text\":\"Read More\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_easing\":\"1\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"text_align\":\"center\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"\",\"link\":\"kontakt\\\/\",\"link_text\":\"Call now\",\"title\":\"Our IT security experts will be happy to advise you.\"}}]}]}]}],\"name\":\"Hero \\u2013\\u00a0Level 2 \\\/\\\/ CTA - animiert\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"breadcrumbs\",\"props\":{\"show_current\":true,\"show_home\":true}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}],\"props\":{\"layout\":\"3-4,1-4\"}},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"medium\",\"margin_remove_bottom\":true,\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<p>The architecture of your IT security should be based on industry standards, directives, guidelines and best practice. It forms the foundation for an effective and efficient defence against today's threats in cyberspace.<\\\/p>\\n\n\n<p><\\\/p>\\n\n\n<p>In order to meet the constantly changing requirements of SaaS, IaaS, home office and offshoring, the architecture should have adequate flexibility.<\\\/p>\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"large\",\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Our IT security consulting for your business\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"div\",\"title_style\":\"h5\"}},{\"type\":\"subnav\",\"props\":{\"css\":\"@media only screen and (max-width: 600px) {\\n  a.el-content, a.el-link {\\n  padding:10px 20px;\\n  }\\n}\\n\\n.el-link {\\n  padding: 20px 40px;\\n  border: solid 1px #007ea7;\\n  background-color: #fff;\\n  color: #007ea7;\\n}\\n\\n.el-link:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\\n\\n.el-content {\\n  padding: 20px 40px;\\n  border: solid 1px #007ea7;\\n  background-color: #007ea7;\\n  color: #fff;\\n}\",\"subnav_style\":\"pill\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Security Strategy\",\"link\":\"it-security-beratung\\\/security-strategie\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"GRC\",\"link\":\"it-security-beratung\\\/grc\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Security Architecture\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Security Awareness\",\"link\":\"it-security-beratung\\\/security-awareness\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Technology consulting\",\"link\":\"it-security-beratung\\\/technologieberatung\\\/\"}}],\"modified\":\"2021-05-11T13:39:40.496Z\",\"name\":\"Subnav \\u2013 IT Security\"},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"remove-vertical\",\"margin_remove_top\":true},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<p>We guide you through the entire process<\\\/p>\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h2\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>By IT security architecture, we mean all measures in IT that serve to prevent misuse of your IT systems and increase the availability of the infrastructure.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\",\"text_color\":\"primary\",\"text_style\":\"large\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>These are not exclusively technical solutions, but also include internal guidelines, directives and IT concepts for configuring and operating the infrastructure:<\\\/p>\\n\n\n<ul>\\n\n\n<li>Protection of IaaS and SaaS in the cloud<\\\/li>\\n\n\n<li>Protection of the endpoints<\\\/li>\\n\n\n<li>Protection of the networks<\\\/li>\\n\n\n<li>Protection of OT<\\\/li>\\n<\\\/ul>\\n\n\n<p>ensec's IT security consultants and engineers work with you to assess the existing security measures and develop customised variants. This is always done in the context of your requirements in terms of protection needs, operability and costs.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"medium\",\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<h3>Balanced measures: ensec supports you in the balancing act<\\\/h3>\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>For the investment in your IT security to effectively increase protection, the measures must be balanced. For example, the best protection of IaaS components is jeopardised if endpoint or office networks are neglected, making it relatively easy to carry out attacks on your company and your data via these channels.<\\\/p>\\n\n\n<p><\\\/p>\\n\n\n<p>Our experience in the areas of risk management and IT security will help you to implement a balanced IT security architecture in which your investments are made at the point where they are most effective.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}},{\"type\":\"headline\",\"props\":{\"content\":\"Compatible solutions: We know the interfaces\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>The technical components of the IT security architecture comprise a wide range of active and passive modules - from the web application firewall (WAF) to the endpoint detection and response (EDR) solution. The interaction of the products is essential for operability in order to achieve the greatest possible automation and avoid problems over the lifecycle. Depending on your goal and protection needs, different strategies may be appropriate - 'best of breed' with integration of interfaces for the highest requirements, or the 'single vendor' approach to efficiently achieve good protection for your organisation. Our IT security engineers have proven experience to ensure future-proof implementation.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]}],\"name\":\"Content \\u2013 Level 2\",\"modified\":\"2021-05-11T13:23:47.505Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"top-center\",\"image_size\":\"contain\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"animation\":\"none\",\"content\":\"\n\n<p>The IT security architecture defines the foundation and blueprint of your cyber security.<\\\/p>\\n\n\n<p>The starting points are recorded and the strategy for the future is defined. This makes costs and benefits transparent over the coming years and measurable and comparable through the implementation of industry standards and best practices.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"medium\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/11\\\/it-security_03.jpg\",\"image_align\":\"right\",\"image_grid_breakpoint\":\"m\",\"image_grid_column_gap\":\"large\",\"image_grid_width\":\"3-5\",\"image_height\":\"780\",\"image_link\":true,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":\"910\",\"link\":\"#8\",\"link_style\":\"text\",\"link_text\":\"\",\"margin\":\"large\",\"margin_remove_top\":false,\"meta\":\"From a business perspective\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"h4\",\"panel_padding\":\"large\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"l\",\"parallax_x\":\"220,0\",\"title\":\"Cyber security - without stomach ache\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_link\":false,\"title_margin\":\"small\",\"title_style\":\"h2\"}}]}]}],\"name\":\"Aus Sicht des Business \\u2013 schmal\"},{\"name\":\"Services\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"id\":\"services\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"padding\":\"small\",\"padding_remove_bottom\":false,\"padding_remove_top\":false,\"status\":\"disabled\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"GRC Services im Detail\",\"title_element\":\"h2\",\"title_style\":\"h1\"}}]}],\"props\":{\"width\":\"expand\"}}]},{\"name\":\"Services\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"id\":\"services\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-05.svg\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"padding\":\"small\",\"padding_remove_top\":false,\"status\":\"disabled\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-1\"},\"children\":[{\"type\":\"grid\",\"props\":{\"animation\":\"none\",\"content_column_breakpoint\":\"m\",\"css\":\".el-item > *:hover {\\n\\tbox-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_large\":\"4\",\"grid_medium\":\"\",\"grid_parallax\":\"0\",\"grid_small\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"item_animation\":true,\"item_maxwidth\":\"xlarge\",\"link_style\":\"text\",\"link_text\":\"Mehr erfahren\",\"margin\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,-80\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h2\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Die Security Governance schafft die Voraussetzungen und einen Ordnungsrahmen f\\u00fcr eine optimale Unterst\\u00fctzung der Unternehmensziele. Was es zu beachten gilt.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/support-1.svg\",\"link\":\"it-security-services\\\/ciso-as-a-service\\\/level-3\\\/\",\"title\":\"Security Governance\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Die Informationssicherheit f\\u00fcr Unternehmen wird immer wichtiger. Ein Information Security Management System bietet Schutz. So sollte es ausgestaltet sein.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/mss-1.svg\",\"link\":\"it-security-services\\\/ciso-as-a-service\\\/level-3\\\/\",\"title\":\"Information Security Management\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Business Continuity Management stellt sicher, dass kritische Gesch\\u00e4ftsprozesse und -Daten auch in Notsituationen verf\\u00fcgbar bleiben. Was das f\\u00fcr die IT heisst.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/security-analytics-1.svg\",\"link\":\"it-security-services\\\/ciso-as-a-service\\\/level-3\\\/\",\"title\":\"Business Continuity Management\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Die rechtlichen und regulatorischen Pflichten stellen im IT-Umfeld eine wesentliche Teilmenge aller Compliance-Anforderungen dar. Das m\\u00fcssen CIOs und CCOs wissen.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/experts.svg\",\"link\":\"it-security-services\\\/ciso-as-a-service\\\/level-3\\\/\",\"title\":\"IT Compliance & Datenschutz\"}}]}]}],\"props\":{\"width\":\"expand\"}}]},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-top: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 0 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n\\tborder-right: 0px solid #fff;\\n    padding: 0 0 0 50px;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"large\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"content\":\"\n\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\\\/p>\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-left: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 50px 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n \\tborder-left: 0px solid #fff;\\n    padding: 0 50px 0 0;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"none\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"button\",\"props\":{\"button_size\":\"large\",\"css\":\".el-content {\\n\\tfont-size: 1.3rem;\\n    padding: 15px 40px;\\n    text-transform: uppercase;\\n}\\n\\n.el-content:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"text_align\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"primary\",\"content\":\"Write to us\",\"icon_align\":\"left\",\"link\":\"mailto:hello@ensec.ch\"}}]},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Or give us a call:<\\\/p>\",\"margin\":\"default\",\"margin_remove_bottom\":true,\"text_align\":\"center\"}},{\"type\":\"headline\",\"props\":{\"content\":\"+41 44 711 11 44\",\"link\":\"tel:+41447111144 \",\"margin_remove_top\":true,\"text_align\":\"center\",\"title_element\":\"h3\"}}]}],\"props\":{\"column_gap\":\"collapse\",\"layout\":\"2-3,1-3\",\"row_gap\":\"collapse\"}}],\"name\":\"Call to Action\",\"modified\":\"2021-02-09T15:59:25.850Z\"}],\"version\":\"4.4.16\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Architecture Our IT security experts will be happy to advise you. Call now The architecture of your IT security should be based on industry standards, directives, guidelines and best practice. It forms the foundation for an effective and efficient defence against today&#8217;s threats in cyberspace. In order to meet the constantly changing requirements of [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":7868,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7876","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7876","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/comments?post=7876"}],"version-history":[{"count":3,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7876\/revisions"}],"predecessor-version":[{"id":7879,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7876\/revisions\/7879"}],"up":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7868"}],"wp:attachment":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/media?parent=7876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}