{"id":7911,"date":"2024-05-13T14:30:08","date_gmt":"2024-05-13T12:30:08","guid":{"rendered":"https:\/\/www.ensec.ch\/it-security-integration\/"},"modified":"2025-01-27T13:49:14","modified_gmt":"2025-01-27T12:49:14","slug":"it-security-integration","status":"publish","type":"page","link":"https:\/\/www.ensec.ch\/en\/it-security-integration\/","title":{"rendered":"IT Security Integration"},"content":{"rendered":"<h1>\n<p>IT Security Integration<\/p>\n<\/h1>\n<div>\n<p>Risks require a watertight integration solution.<\/p>\n<\/div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/10\/it-security-beratung-1.png\" alt=\"\"><br \/>\n<img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/05\/quote.svg\" alt=\"\"><\/p>\n<div>\n<p><i>Anyone who prefers an agile speedboat to a sluggish steamer when it comes to information security is well advised to choose ensec. We offer companies a wide range of services that are fully customisable and can be put together on a modular basis.<\/i><\/p>\n<\/div>\n<h2>Security integration solutions without the Titanic effect.<\/h2>\n<hr>\n<h2>&#8220;If you want to build a ship, don&#8217;t drum up the men to gather wood, divide the work, and give orders. Instead, teach them to yearn for the vast and endless sea.&#8221;<\/h2>\n<div>\n<p>We can only agree with this wonderful quote from Antoine de Saint-Exup\u00e9ry, but we would like to add a pragmatic thought to it: Every vision ultimately requires efficient means in order to successfully achieve the big goal.<\/p>\n<p>IT security is a means to an end \u2013 used correctly, it is an essential means to realise business goals in the digital age and this is where our integration services support you.<\/p>\n<\/div>\n<h2>Highly effective tools, systematically integrated.<\/h2>\n<div>\n<p>ensec brings together tried-and-tested and efficient solutions from proven providers and integrates them into (complex) company operating environments. Customised to meet individual requirements.<\/p>\n<p>Whether it&#8217;s firewalls, XDR, EDR, IPS, application security, content security, APT protection, DLP or cloud-based solutions: Our specialists have the highest provider certifications in all areas and ensure that entrepreneurial visions can be pursued with security today and tomorrow.<\/p>\n<\/div>\n<h2>Our security services in detail<\/h2>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/06\/network-security.svg\" alt=\"\"><\/p>\n<h3>Network Security<\/h3>\n<p><a href=\"\/ensec\/en\/it-security-integration\/network-security\/\">Learn more<\/a><\/p>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/06\/content-security.svg\" alt=\"\"><\/p>\n<h3>Content Security<\/h3>\n<p><a href=\"\/ensec\/en\/it-security-integration\/content-security\/\">Learn more<\/a><\/p>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/06\/application-security.svg\" alt=\"\"><\/p>\n<h3>Application Security<\/h3>\n<p><a href=\"\/ensec\/en\/it-security-integration\/application-security\/\">Learn more<\/a><\/p>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/06\/cloud-security.svg\" alt=\"\"><\/p>\n<h3>Cloud Security<\/h3>\n<p><a href=\"\/ensec\/en\/it-security-integration\/cloud-security\/\">Learn more<\/a><\/p>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/06\/infrastructure-security.svg\" alt=\"\"><\/p>\n<h3>Infrastructure Security<\/h3>\n<p><a href=\"\/ensec\/en\/it-security-integration\/infrastructure-security\/\">Learn more<\/a><\/p>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/06\/endpoint-security.svg\" alt=\"\"><\/p>\n<h3>Endpoint Security<\/h3>\n<p><a href=\"\/ensec\/en\/it-security-integration\/endpoint-security\/\">Learn more<\/a><\/p>\n<\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/11\/Arbeiten-bei-ensec_2-scaled.jpg\" alt=\"\"><\/p>\n<h2>Companies with outdated, poorly maintained security solutions are in for a rough ride.<\/h2>\n<p>From a business perspective<\/p>\n<div>\n<p><strong>IT is changing and developing quickly and continuously. Nevertheless, it is barely able to keep up with the wishes and requirements of the business today. Similarly, attackers and their methods are constantly evolving and developing. IT security must also adapt to this pace and to ever-changing requirements: a firewall, for example, already offers some protection provided that the rules and the new, advanced options are always properly configured and maintained.<\/strong><\/p>\n<p>In today&#8217;s and tomorrow&#8217;s IT, system architectures must be open, dynamic and efficient. Only in this way can new technologies be integrated in a targeted and effortless manner over time and the development of the company successfully mastered.<\/p>\n<p>Cost-effective, agile and future-oriented system architectures are not spectacular drivers of corporate success. When well thought out and integrated, they secure networks and data centres in the background and enable the continuous digital transformation process. Future-oriented, strategically planned IT security integration solutions should not be seen as a cost factor without return on investment. They are indispensable enablers.<\/p>\n<\/div>\n<p><a href=\"#8\"><\/a><\/p>\n<\/div>\n<h2>\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\/p>\n<\/h2>\n<p><p>\n        <a href=\"mailto:hello@ensec.ch\">Write to us<\/a>\n    <\/p>\n<\/p>\n<div>\n<p>Or give us a call:<\/p>\n<\/div>\n<h3><a href=\"tel:+41447111144 \">+41 44 711 11 44<\/a><\/h3>\n<p><!--more--><br \/>\n<!-- {\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"animation\":\"slide-right-medium\",\"animation_delay\":\"60\",\"css\":\"@media (min-width: 960px) {\\n\\t.uk-position-cover, video {\\n    \\tmargin-left:60%;\\n\\t\\twidth:40%;\\n\\t}\\n    \\n    .uk-position-cover {\\n    \\tdisplay:none;\\n    }\\n    \\n    video {\\n    \\tpadding:390px 40px 15% 0;   \\n    }\\n\\n    .el-section {\\n        padding-top:180px;\\n    \\tbackground-image: url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg');\\n  \\t\\tbackground-repeat: no-repeat;\\n  \\t\\tbackground-position: top calc(50% + 5%);\\n  \\t\\tbackground-size: 100% auto;\\n  \\t\\tmargin: 0;\\n    }\\n}\",\"header_transparent\":false,\"header_transparent_noplaceholder\":true,\"header_transparent_text_color\":\"dark\",\"height\":\"viewport\",\"height_offset_top\":true,\"height_viewport\":60,\"image_position\":\"center-center\",\"image_size\":\"cover\",\"media_overlay\":\"rgba(0, 45, 66, 0.69)\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"bottom\",\"video\":\"wp-content\\\/uploads\\\/2024\\\/05\\\/GettyImages-1286759820.mp4\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"image_size\":\"width-1-1\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"1-1\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align\":\"center\",\"content\":\"\n\n<p>IT Security Integration<\\\/p>\",\"css\":\"@media (min-width: 960px) {\\n\\t.el-element {\\n\\t\\twidth:46%;\\n        font-size:6rem;\\n        font-weight:bold;\\n\\t}\\n}\\n\\n@media (max-width: 960px) {\\n\\t.el-element {\\n\\t\\tcolor:#fff;\\n        font-weight:bold;\\n\\t}\\n}\",\"margin\":\"medium\",\"margin_remove_top\":true,\"text_align\":\"left\",\"title_element\":\"h1\",\"title_style\":\"heading-xlarge\"},\"name\":\"Seitentitel\"},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Risks require a watertight integration solution.<\\\/p>\",\"css\":\"@media (max-width: 960px) {\\n    .el-element {\\n    \\tcolor:#fff;\\n    }\\n}\",\"margin\":\"large\",\"margin_remove_bottom\":true,\"margin_remove_top\":true,\"maxwidth\":\"xlarge\",\"text_style\":\"lead\"}},{\"type\":\"image\",\"props\":{\"css\":\".el-element {\\n\\tmargin-bottom:-33px !important;\\n}\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/10\\\/it-security-beratung-1.png\",\"image_svg_color\":\"emphasis\",\"image_width\":550,\"margin\":\"default\",\"margin_remove_top\":true,\"position\":\"relative\",\"position_z_index\":\"1\"}}]}]},{\"type\":\"row\",\"props\":{\"css\":\".uk-card-primary {\\n    \\tborder-radius:5px;\\n\\t\\tpadding:60px 60px 50px 50px;\\n}\\n\\n@media (min-width: 960px) {\\n    .uk-card-primary {\\n    \\tborder-radius:5px;\\n\\t\\tpadding:100px 240px 100px 80px;\\n\\t}\\n}\\n\\n\",\"row_gap\":\"collapse\"},\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".uk-card-primary {\\n\\tbox-shadow: rgba(17, 17, 26, 0.1) 0px 8px 24px, rgba(17, 17, 26, 0.1) 0px 16px 56px, rgba(17, 17, 26, 0.1) 0px 24px 80px;\\n}\",\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"style\":\"card-primary\"},\"children\":[{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/quote.svg\",\"image_svg_color\":\"emphasis\",\"image_width\":60,\"margin\":\"default\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p><i>Anyone who prefers an agile speedboat to a sluggish steamer when it comes to information security is well advised to choose ensec. We offer companies a wide range of services that are fully customisable and can be put together on a modular basis.<\\\/i><\\\/p>\",\"margin\":\"\",\"text_style\":\"lead\"}}]}]}],\"name\":\"Hero\"},{\"name\":\"Intro\",\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"60\",\"css\":\"@media (max-width: 960px) {\\n    .el-section {\\n\\t\\tmargin-top:60px;\\n\\t}\\n}\\n\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"padding_remove_top\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"parallax\",\"content\":\"Security integration solutions without the Titanic effect.\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_end\":\"70vh + 70%\",\"parallax_opacity\":\"0.3,1\",\"parallax_y\":\"30,0\",\"text_align\":\"left\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}},{\"type\":\"divider\",\"props\":{\"css\":\".el-element {\\n\\tmax-width:50%;\\n}\",\"divider_element\":\"hr\",\"margin\":\"medium\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"}}],\"props\":{\"layout\":\"2-3,1-3\"}},{\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\",\"margin\":\"large\",\"row_gap\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\\\"If you want to build a ship, don't drum up the men to gather wood, divide the work, and give orders. Instead, teach them to yearn for the vast and endless sea.\\\"\",\"title_element\":\"h2\",\"title_style\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"column_divider\":false,\"content\":\"\n\n<p>We can only agree with this wonderful quote from Antoine de Saint-Exup\\u00e9ry, but we would like to add a pragmatic thought to it: Every vision ultimately requires efficient means in order to successfully achieve the big goal.<\\\/p>\\n\n\n<p>IT security is a means to an end \\u2013 used correctly, it is an essential means to realise business goals in the digital age and this is where our integration services support you.<\\\/p>\",\"margin\":\"\",\"text_align\":\"left\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Highly effective tools, systematically integrated.\",\"title_element\":\"h2\",\"title_style\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"column_divider\":false,\"content\":\"\n\n<p>ensec brings together tried-and-tested and efficient solutions from proven providers and integrates them into (complex) company operating environments. Customised to meet individual requirements.<\\\/p>\\n\n\n<p>Whether it's firewalls, XDR, EDR, IPS, application security, content security, APT protection, DLP or cloud-based solutions: Our specialists have the highest provider certifications in all areas and ensure that entrepreneurial visions can be pursued with security today and tomorrow.<\\\/p>\",\"margin\":\"\",\"text_align\":\"left\"}}]}]}]},{\"type\":\"section\",\"props\":{\"animation\":\"slide-left-medium\",\"animation_delay\":\"100\",\"css\":\".el-section {\\n        background-color:#002d42;\\n}\\n\\n@media (min-width: 960px) {\\n    .el-section {\\n\\t\\tmargin:0 40px 0 40px;\\n        border-radius:5px;\\n\\t}\\n}\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_parallax_bgy\":\"150,\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"padding\":\"large\",\"style\":\"muted\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"1-3,2-3\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Our security services in detail\",\"maxwidth_breakpoint\":\"m\",\"title_color\":\"warning\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"css\":\".uk-card-primary {\\n\\tborder-radius:5px;\\n}\\n\\n.el-item:hover .uk-card-primary {\\n    background-color:#007ea7;\\n\\tbox-shadow: rgba(0, 126, 167, 0.4) 0px 8px 24px, rgba(0, 126, 167, 0.4) 0px 16px 56px, rgba(0, 126, 167, 0.4) 0px 24px 80px;\\n    transition: background-color 0.5s, box-shadow 0.5s;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_parallax\":\"0\",\"grid_small\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"item_animation\":true,\"item_maxwidth\":\"xlarge\",\"lightbox_bg_close\":true,\"link_style\":\"text\",\"link_text\":\"Learn more\",\"margin\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,-80\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h2\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/06\\\/network-security.svg\",\"link\":\"en\\\/it-security-integration\\\/network-security\\\/\",\"title\":\"Network Security\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/06\\\/content-security.svg\",\"link\":\"en\\\/it-security-integration\\\/content-security\\\/\",\"title\":\"Content Security\"}}]}]}]},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-1\"},\"children\":[{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"css\":\".uk-card-primary {\\n\\tborder-radius:5px;\\n}\\n\\n.el-item:hover .uk-card-primary {\\n    background-color:#007ea7;\\n\\tbox-shadow: rgba(0, 126, 167, 0.4) 0px 8px 24px, rgba(0, 126, 167, 0.4) 0px 16px 56px, rgba(0, 126, 167, 0.4) 0px 24px 80px;\\n    transition: background-color 0.5s, box-shadow 0.5s;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"3\",\"grid_parallax\":\"0\",\"grid_small\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"item_animation\":true,\"item_maxwidth\":\"xlarge\",\"lightbox_bg_close\":true,\"link_style\":\"text\",\"link_text\":\"Learn more\",\"margin\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,-80\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h2\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/06\\\/application-security.svg\",\"link\":\"en\\\/it-security-integration\\\/application-security\\\/\",\"title\":\"Application Security\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/06\\\/cloud-security.svg\",\"link\":\"en\\\/it-security-integration\\\/cloud-security\\\/\",\"title\":\"Cloud Security\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/06\\\/infrastructure-security.svg\",\"link\":\"en\\\/it-security-integration\\\/infrastructure-security\\\/\",\"title\":\"Infrastructure Security\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/06\\\/endpoint-security.svg\",\"link\":\"en\\\/it-security-integration\\\/endpoint-security\\\/\",\"title\":\"Endpoint Security\"}}]}]}]}],\"name\":\"Services\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"top-center\",\"image_size\":\"contain\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"animation\":\"none\",\"content\":\"\n\n<p><strong>IT is changing and developing quickly and continuously. Nevertheless, it is barely able to keep up with the wishes and requirements of the business today. Similarly, attackers and their methods are constantly evolving and developing. IT security must also adapt to this pace and to ever-changing requirements: a firewall, for example, already offers some protection provided that the rules and the new, advanced options are always properly configured and maintained.<\\\/strong><\\\/p>\\n\n\n<p>In today's and tomorrow's IT, system architectures must be open, dynamic and efficient. Only in this way can new technologies be integrated in a targeted and effortless manner over time and the development of the company successfully mastered.<\\\/p>\\n\n\n<p>Cost-effective, agile and future-oriented system architectures are not spectacular drivers of corporate success. When well thought out and integrated, they secure networks and data centres in the background and enable the continuous digital transformation process. Future-oriented, strategically planned IT security integration solutions should not be seen as a cost factor without return on investment. They are indispensable enablers.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"medium\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/11\\\/Arbeiten-bei-ensec_2-scaled.jpg\",\"image_align\":\"right\",\"image_grid_breakpoint\":\"m\",\"image_grid_column_gap\":\"large\",\"image_grid_width\":\"3-5\",\"image_height\":\"780\",\"image_link\":true,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":\"910\",\"link\":\"#8\",\"link_style\":\"text\",\"link_text\":\"\",\"margin\":\"large\",\"margin_remove_top\":false,\"meta\":\"From a business perspective\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"h4\",\"panel_padding\":\"large\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"l\",\"parallax_x\":\"220,0\",\"title\":\"Companies with outdated, poorly maintained security solutions are in for a rough ride.\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_link\":false,\"title_margin\":\"small\",\"title_style\":\"h2\"}}]}]}],\"name\":\"Aus Sicht des Business \\u2013 schmal\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_top\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-top: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 0 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n\\tborder-right: 0px solid #fff;\\n    padding: 0 0 0 50px;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"large\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"content\":\"\n\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\\\/p>\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\",\"title_style\":\"h1\"}}]},{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-left: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 50px 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n \\tborder-left: 0px solid #fff;\\n    padding: 0 50px 0 0;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"none\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"button\",\"props\":{\"button_size\":\"large\",\"css\":\".el-content {\\n\\tfont-size: 1.3rem;\\n    padding: 15px 40px;\\n    text-transform: uppercase;\\n}\\n\\n.el-content:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"text_align\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"primary\",\"content\":\"Write to us\",\"dialog_layout\":\"modal\",\"dialog_offcanvas_flip\":true,\"icon_align\":\"left\",\"link\":\"mailto:hello@ensec.ch\"}}]},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Or give us a call:<\\\/p>\",\"margin\":\"default\",\"margin_remove_bottom\":true,\"text_align\":\"center\"}},{\"type\":\"headline\",\"props\":{\"content\":\"+41 44 711 11 44\",\"link\":\"tel:+41447111144 \",\"margin_remove_top\":true,\"text_align\":\"center\",\"title_element\":\"h3\"}}]}],\"props\":{\"column_gap\":\"collapse\",\"layout\":\"2-3,1-3\",\"row_gap\":\"collapse\"}}],\"name\":\"ensec \\u2013 Call to action\"}],\"version\":\"4.5.1\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT Security Integration Risks require a watertight integration solution. Anyone who prefers an agile speedboat to a sluggish steamer when it comes to information security is well advised to choose ensec. We offer companies a wide range of services that are fully customisable and can be put together on a modular basis. Security integration solutions [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7911","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/comments?post=7911"}],"version-history":[{"count":8,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7911\/revisions"}],"predecessor-version":[{"id":8244,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7911\/revisions\/8244"}],"wp:attachment":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/media?parent=7911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}