{"id":7883,"date":"2021-09-10T15:17:33","date_gmt":"2021-09-10T13:17:33","guid":{"rendered":"https:\/\/www.ensec.ch\/it-security-beratung\/technologieberatung\/"},"modified":"2025-01-27T16:11:11","modified_gmt":"2025-01-27T15:11:11","slug":"technologieberatung","status":"publish","type":"page","link":"https:\/\/www.ensec.ch\/en\/it-security-beratung\/technologieberatung\/","title":{"rendered":"Technology Consulting"},"content":{"rendered":"<h1>Technology Consulting<\/h1>\n<div>\n<p><script src=\"https:\/\/cdn.lordicon.com\/libs\/frhvbuzj\/lord-icon-2.0.2.js\"><\/script> <lord-icon src=\"https:\/\/cdn.lordicon.com\/zpxybbhl.json\" trigger=\"loop\" colors=\"primary:#54BBAB,secondary:#007EA7\" stroke=\"35\" style=\"width: 90px; height: 90px;\"> <\/lord-icon><\/p>\n<\/div>\n<div>\n<h2>Our IT security experts will be happy to advise you.<\/h2>\n<p><a href=\"\/ensec\/kontakt\/\">Call now<\/a><\/p>\n<\/div>\n<hr>\n<h2>\n<p>IT security products are only as good as their configuration and integration into the existing IT landscape. Specific technical expertise and an understanding of the situation of the company in question are correspondingly important. ensec offers a comprehensive range of technological consulting services, from product evaluation and integration concepts to assessments of existing setups and configurations.<\/p>\n<\/h2>\n<div>Our IT security consulting for your business<\/div>\n<ul>\n<li>\n        <a href=\"\/ensec\/en\/it-security-beratung\/security-strategie\/\">Security Strategy<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-beratung\/grc\/\">GRC<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-beratung\/security-architektur\/\">Security Architecture<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-beratung\/security-awareness\/\">Security Awareness<\/a>\n    <\/li>\n<li>\n        <a href=\"\">Technology Consulting<\/a>\n    <\/li>\n<\/ul>\n<hr>\n<h2>\n<p>Without correct configuration and integration, IT gets out of hand.<\/p>\n<\/h2>\n<div>\n<p>All ensec consultants and engineers could give anecdotes of companies that have bought products such as firewalls or a vulnerability scanner but never implemented them properly. There are many reasons for this, ranging from a lack of expertise and time pressure to poor project management or a lack of controls. In some cases, the companies concerned are aware of this. Quite a few, on the other hand, assume that the technology fulfils its purpose and are lulled into a false sense of security.<\/p>\n<\/div>\n<h3>ensec advises and implements<\/h3>\n<div>\n<p>We are happy to support companies with product evaluation, integration planning or reviewing existing setups, as well as with all other questions about products and solutions in the field of IT security. A reliable study shows that tens of thousands of cyber attacks were launched against Swiss companies every month in 2020 &#8211; this is not the only figure that emphasises the importance of professionally integrated and operated security products.<\/p>\n<\/div>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/11\/it-security_10.jpg\" alt=\"\"><\/p>\n<h2>That is why technology consulting is essential.<\/h2>\n<p>From a business perspective<\/p>\n<div>\n<p><strong>The purchase and operation of IT security products are associated with costs, which are usually justified by the corresponding risk minimisation.<\/strong><\/p>\n<p>However, incorrectly or poorly implemented solutions cost money without generating the hoped-for added value and can lull employees and management into a false sense of security.<\/p>\n<p>In the event of a successful attack, major material and immaterial damage such as loss of reputation can occur. For this reason, it is essential to find the right products, integrate them correctly and check the configuration from time to time.<\/p>\n<\/div>\n<p><a href=\"#8\"><\/a><\/p>\n<\/div>\n<h2>\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\/p>\n<\/h2>\n<p><p>\n        <a href=\"mailto:hello@ensec.ch\">Write to us<\/a>\n    <\/p>\n<\/p>\n<div>\n<p>Or give us a call:<\/p>\n<\/div>\n<h3><a href=\"tel:+41447111144 \">+41 44 711 11 44<\/a><\/h3>\n<p><!--more--><br \/>\n<!-- {\"name\":\"Home\",\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"120\",\"css\":\".el-section {\\n\\tbackground-image: url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ensec-hintergrund_animation.svg'), url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/background_seamap-03.png');\\n  background-repeat: no-repeat, no-repeat;\\n  background-position: center, center;\\n  background-size: cover, cover;\\n}\",\"header_transparent_noplaceholder\":true,\"id\":\"top\",\"image_position\":\"top-center\",\"image_size\":\"cover\",\"media_background\":\"#007EA7\",\"media_overlay\":\"rgba(0, 0, 0, 0.1)\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"style\":\"muted\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"video_width\":\"2560\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"2-3,1-3\",\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Technology Consulting\",\"margin\":\"small\",\"margin_remove_top\":true,\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"s\",\"text_align_fallback\":\"center\",\"title_color\":\"success\",\"title_element\":\"h1\",\"title_style\":\"heading-large\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p><script src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/libs\\\/frhvbuzj\\\/lord-icon-2.0.2.js\\\"><\\\/script> <lord-icon src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/zpxybbhl.json\\\" trigger=\\\"loop\\\" colors=\\\"primary:#54BBAB,secondary:#007EA7\\\" stroke=\\\"35\\\" style=\\\"width: 90px; height: 90px;\\\"> <\\\/lord-icon><\\\/p>\",\"css\":\".el-element {\\n\\twidth: 120px;\\n    padding: 15px;\\n    border-radius: 50%;\\n    background-color:#fff;\\n    box-shadow: rgba(50, 50, 93, 0.25) 0px 50px 100px -20px, rgba(0, 0, 0, 0.3) 0px 30px 60px -30px;\\n}\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"medium\",\"position\":\"relative\",\"position_top\":\"55\",\"position_z_index\":\"1\",\"text_align\":\"center\"}},{\"type\":\"grid\",\"props\":{\"animation\":\"fade\",\"content_column_breakpoint\":\"m\",\"css\":\".el-title {\\n\\tpadding-top:10px;\\n}\\n\\n.el-item > * {\\n\\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.16) 0px 10px 36px 0px, rgba(0, 0, 0, 0.06) 0px 0px 0px 1px;\\n}\\n\\n.el-item > *:hover {\\n    box-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\\n\\n.el-item > *:hover .el-link { \\n\\tbackground-color: #003249;\\n\\tborder: solid 1px #003249;\\n\\tcolor: #fff;\\n\\tbox-shadow: rgba(0, 0, 0, 0.25) 0px 54px 55px, rgba(0, 0, 0, 0.12) 0px -12px 30px, rgba(0, 0, 0, 0.12) 0px 4px 6px, rgba(0, 0, 0, 0.17) 0px 12px 13px, rgba(0, 0, 0, 0.09) 0px -3px 5px;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":true,\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_row_align\":false,\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":false,\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_width\":\"80\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"lightbox_bg_close\":true,\"link_margin\":\"medium\",\"link_style\":\"primary\",\"link_text\":\"Read More\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_easing\":\"1\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"text_align\":\"center\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"\",\"link\":\"kontakt\\\/\",\"link_text\":\"Call now\",\"title\":\"Our IT security experts will be happy to advise you.\"}}]}]}]}],\"name\":\"Hero \\u2013\\u00a0Level 2 \\\/\\\/ CTA - animiert\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"breadcrumbs\",\"props\":{\"show_current\":true,\"show_home\":true}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}],\"props\":{\"layout\":\"3-4,1-4\"}},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"medium\",\"margin_remove_bottom\":true,\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<p>IT security products are only as good as their configuration and integration into the existing IT landscape. Specific technical expertise and an understanding of the situation of the company in question are correspondingly important. ensec offers a comprehensive range of technological consulting services, from product evaluation and integration concepts to assessments of existing setups and configurations.<\\\/p>\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"large\",\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Our IT security consulting for your business\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"div\",\"title_style\":\"h5\"}},{\"type\":\"subnav\",\"props\":{\"css\":\"@media only screen and (max-width: 600px) {\\n  a.el-content, a.el-link {\\n  padding:10px 20px;\\n  }\\n}\\n\\n.el-link {\\n  padding: 20px 40px;\\n  border: solid 1px #007ea7;\\n  background-color: #fff;\\n  color: #007ea7;\\n}\\n\\n.el-link:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\\n\\n.el-content {\\n  padding: 20px 40px;\\n  border: solid 1px #007ea7;\\n  background-color: #007ea7;\\n  color: #fff;\\n}\",\"subnav_style\":\"pill\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Security Strategy\",\"link\":\"en\\\/it-security-beratung\\\/security-strategie\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"GRC\",\"link\":\"en\\\/it-security-beratung\\\/grc\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Security Architecture\",\"link\":\"en\\\/it-security-beratung\\\/security-architektur\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Security Awareness\",\"link\":\"en\\\/it-security-beratung\\\/security-awareness\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Technology Consulting\"}}],\"modified\":\"2021-05-11T13:39:40.496Z\",\"name\":\"Subnav \\u2013 IT Security\"},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"remove-vertical\",\"margin_remove_top\":true},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<p>Without correct configuration and integration, IT gets out of hand.<\\\/p>\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h2\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>All ensec consultants and engineers could give anecdotes of companies that have bought products such as firewalls or a vulnerability scanner but never implemented them properly. There are many reasons for this, ranging from a lack of expertise and time pressure to poor project management or a lack of controls. In some cases, the companies concerned are aware of this. Quite a few, on the other hand, assume that the technology fulfils its purpose and are lulled into a false sense of security.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\",\"text_color\":\"primary\",\"text_style\":\"large\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"medium\",\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"ensec advises and implements\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>We are happy to support companies with product evaluation, integration planning or reviewing existing setups, as well as with all other questions about products and solutions in the field of IT security. A reliable study shows that tens of thousands of cyber attacks were launched against Swiss companies every month in 2020 - this is not the only figure that emphasises the importance of professionally integrated and operated security products.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"top-center\",\"image_size\":\"contain\",\"position_sticky_breakpoint\":\"m\"}}]}],\"name\":\"Content \\u2013 Level 2\",\"modified\":\"2021-05-11T13:23:47.505Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"top-center\",\"image_size\":\"contain\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"animation\":\"none\",\"content\":\"\n\n<p><strong>The purchase and operation of IT security products are associated with costs, which are usually justified by the corresponding risk minimisation.<\\\/strong><\\\/p>\\n\n\n<p>However, incorrectly or poorly implemented solutions cost money without generating the hoped-for added value and can lull employees and management into a false sense of security.<\\\/p>\\n\n\n<p>In the event of a successful attack, major material and immaterial damage such as loss of reputation can occur. For this reason, it is essential to find the right products, integrate them correctly and check the configuration from time to time.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"medium\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/11\\\/it-security_10.jpg\",\"image_align\":\"right\",\"image_grid_breakpoint\":\"m\",\"image_grid_column_gap\":\"large\",\"image_grid_width\":\"3-5\",\"image_height\":\"780\",\"image_link\":true,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":\"910\",\"link\":\"#8\",\"link_style\":\"text\",\"link_text\":\"\",\"margin\":\"large\",\"margin_remove_top\":false,\"meta\":\"From a business perspective\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"h4\",\"panel_padding\":\"large\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"l\",\"parallax_x\":\"220,0\",\"title\":\"That is why technology consulting is essential.\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_link\":false,\"title_margin\":\"small\",\"title_style\":\"h2\"}}]}]}],\"name\":\"Aus Sicht des Business \\u2013 schmal\"},{\"name\":\"Services\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"id\":\"services\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"padding\":\"small\",\"padding_remove_bottom\":false,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"GRC Services im Detail\",\"title_element\":\"h2\",\"title_style\":\"h1\"}}]}],\"props\":{\"status\":\"disabled\",\"width\":\"expand\"}}]},{\"name\":\"Services\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"id\":\"services\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-05.svg\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"padding\":\"small\",\"padding_remove_top\":false,\"status\":\"disabled\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-1\"},\"children\":[{\"type\":\"grid\",\"props\":{\"animation\":\"none\",\"content_column_breakpoint\":\"m\",\"css\":\".el-item > *:hover {\\n\\tbox-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_large\":\"4\",\"grid_medium\":\"\",\"grid_parallax\":\"0\",\"grid_small\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"item_animation\":true,\"item_maxwidth\":\"xlarge\",\"lightbox_bg_close\":true,\"link_style\":\"text\",\"link_text\":\"Mehr erfahren\",\"margin\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,-80\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h2\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Die Security Governance schafft die Voraussetzungen und einen Ordnungsrahmen f\\u00fcr eine optimale Unterst\\u00fctzung der Unternehmensziele. Was es zu beachten gilt.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/support-1.svg\",\"link\":\"it-security-services\\\/ciso-as-a-service\\\/level-3\\\/\",\"title\":\"Security Governance\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Die Informationssicherheit f\\u00fcr Unternehmen wird immer wichtiger. Ein Information Security Management System bietet Schutz. So sollte es ausgestaltet sein.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/mss-1.svg\",\"link\":\"it-security-services\\\/ciso-as-a-service\\\/level-3\\\/\",\"title\":\"Information Security Management\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Business Continuity Management stellt sicher, dass kritische Gesch\\u00e4ftsprozesse und -Daten auch in Notsituationen verf\\u00fcgbar bleiben. Was das f\\u00fcr die IT heisst.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/security-analytics-1.svg\",\"link\":\"it-security-services\\\/ciso-as-a-service\\\/level-3\\\/\",\"title\":\"Business Continuity Management\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Die rechtlichen und regulatorischen Pflichten stellen im IT-Umfeld eine wesentliche Teilmenge aller Compliance-Anforderungen dar. Das m\\u00fcssen CIOs und CCOs wissen.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/experts.svg\",\"link\":\"it-security-services\\\/ciso-as-a-service\\\/level-3\\\/\",\"title\":\"IT Compliance & Datenschutz\"}}]}]}],\"props\":{\"width\":\"expand\"}}]},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-top: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 0 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n\\tborder-right: 0px solid #fff;\\n    padding: 0 0 0 50px;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"large\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"content\":\"\n\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\\\/p>\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-left: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 50px 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n \\tborder-left: 0px solid #fff;\\n    padding: 0 50px 0 0;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"none\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"button\",\"props\":{\"button_size\":\"large\",\"css\":\".el-content {\\n\\tfont-size: 1.3rem;\\n    padding: 15px 40px;\\n    text-transform: uppercase;\\n}\\n\\n.el-content:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"text_align\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"primary\",\"content\":\"Write to us\",\"dialog_layout\":\"modal\",\"dialog_offcanvas_flip\":true,\"icon_align\":\"left\",\"link\":\"mailto:hello@ensec.ch\"}}]},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Or give us a call:<\\\/p>\",\"margin\":\"default\",\"margin_remove_bottom\":true,\"text_align\":\"center\"}},{\"type\":\"headline\",\"props\":{\"content\":\"+41 44 711 11 44\",\"link\":\"tel:+41447111144 \",\"margin_remove_top\":true,\"text_align\":\"center\",\"title_element\":\"h3\"}}]}],\"props\":{\"column_gap\":\"collapse\",\"layout\":\"2-3,1-3\",\"row_gap\":\"collapse\"}}],\"name\":\"Call to Action\",\"modified\":\"2021-02-09T15:59:25.850Z\"}],\"version\":\"4.5.1\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technology Consulting Our IT security experts will be happy to advise you. Call now IT security products are only as good as their configuration and integration into the existing IT landscape. Specific technical expertise and an understanding of the situation of the company in question are correspondingly important. ensec offers a comprehensive range of technological [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":7868,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7883","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/comments?post=7883"}],"version-history":[{"count":6,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7883\/revisions"}],"predecessor-version":[{"id":8276,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7883\/revisions\/8276"}],"up":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7868"}],"wp:attachment":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/media?parent=7883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}