{"id":7924,"date":"2021-09-03T11:22:51","date_gmt":"2021-09-03T09:22:51","guid":{"rendered":"https:\/\/www.ensec.ch\/it-security-integration\/content-security\/"},"modified":"2025-01-27T16:14:26","modified_gmt":"2025-01-27T15:14:26","slug":"content-security","status":"publish","type":"page","link":"https:\/\/www.ensec.ch\/en\/it-security-integration\/content-security\/","title":{"rendered":"Content Security"},"content":{"rendered":"<h1>Content Security<\/h1>\n<div>\n<p><script src=\"https:\/\/cdn.lordicon.com\/libs\/frhvbuzj\/lord-icon-2.0.2.js\"><\/script> <lord-icon src=\"https:\/\/cdn.lordicon.com\/zpxybbhl.json\" trigger=\"loop\" colors=\"primary:#54BBAB,secondary:#007EA7\" stroke=\"35\" style=\"width: 90px; height: 90px;\"> <\/lord-icon><\/p>\n<\/div>\n<div>\n<h2>Our IT security experts will be happy to advise you.<\/h2>\n<p><a href=\"\/ensec\/kontakt\/\">Call now<\/a><\/p>\n<\/div>\n<hr>\n<h2>\n<p><b>Are you losing sleep over your staff&#8217;s unrestricted Internet access? Let&#8217;s talk about content security: Whether it&#8217;s emails or website access, our solution keeps malware out. Our expertise in handling the solution ensures secure data traffic without making life difficult for users.<\/b><\/p>\n<\/h2>\n<div>Our IT security integration for your business<\/div>\n<ul>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/network-security\/\">Network Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\">Content Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/application-security\/\">Application Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/cloud-security\/\">Cloud Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/infrastructure-security\/\">Infrastructure Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/ot-security\/\">OT Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/endpoint-security\/\">Endpoint Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/security-analytics\/\">Security Analytics<\/a>\n    <\/li>\n<\/ul>\n<hr>\n<h2><b>Keep dangerous Internet content outside<\/b><\/h2>\n<div>\n<p>Wouldn&#8217;t it be great if your workforce could access any website without any negative consequences for information security? Whether it&#8217;s a site full of legitimate content or a malware sinkhole that employees have been lured to by a convincing phishing message?<\/p>\n<\/div>\n<div>\n<p>In fact, this is feasible: The web security solution favoured by ensec switches between your users&#8217; browsers and the websites they access. The intermediary system retrieves the desired content, renders it and only sends the screen content to your users&#8217; browsers &#8211; but not active content or even downloads. The latter only find their way to the end users&#8217; computers after they have been dynamically scanned for malware in a sandbox environment. No end device executes unchecked code.<\/p>\n<\/div>\n<h3>\n<p>Simple principle, tricky configuration<\/p>\n<\/h3>\n<div>\n<p>Admittedly, the principle behind our preferred solution for isolation sounds simple. And in practice, it is. This is because we configure the solution in such a way that it remains as invisible as possible and is therefore accepted. After all, an information security component is only ever effective if it does not hinder users in their work.<\/p>\n<p>ensec has experience in designing the solution, customised sizing and implementing the software. You benefit from this expertise because you can put a protection component into operation that works straight away. Regardless of whether you need to serve several hundred or &#8211; like our largest content security customer to date &#8211; several thousand users.<\/p>\n<p>We not only complete the proof of concept with you and a selected group of users. We also carry out a pilot phase with 50 or 100 users and help you to adapt your internal processes (for example, helpdesk or engineering). Our specialists will also work with you before implementation to determine how the isolation solution evaluates files to be downloaded, when it only warns and when it prevents downloads.<\/p>\n<\/div>\n<h3>Email encryption &#8211; without user intervention<\/h3>\n<div>\n<p>Just as with web isolation, the same applies to securing email communication &#8211; it&#8217;s best if users don&#8217;t even notice that their messages are being encrypted and decrypted. The content security solution should handle encryption automatically in the background if required. And this is exactly what you achieve with our preferred solution. Our experts work with you to develop the criteria that the solution uses to decide whether a message should be sent encrypted or in plain text.<\/p>\n<p>It doesn&#8217;t matter whether the recipients have an S\/MIME certificate or a PGP key &#8211; they can read and reply to the encrypted messages in either case. The system independently searches for the secure transport route to the recipient. Our solution also takes care of the tiresome issue of certificate management from an IT perspective. The software can be connected to a public key infrastructure (PKI) and then manages all user certificates itself. Expired certificates on end devices are therefore a thing of the past.<\/p>\n<\/div>\n<h3>Do you want to do it yourself, or should we?<\/h3>\n<div>\n<p>Do you see a need for a content security solution? But don&#8217;t (currently) have the human resources to operate it? Then let&#8217;s talk about a <a href=\"https:\/\/www.ensec.ch\/en\/managed-it-security\/\">managed security service<\/a>. In this case, we not only design and integrate the solution, we also operate it for you &#8211; in your own data centre. Ideally, we will also take over the operation of your web gateway, as the two components need to work closely together to maximise the effect.<\/p>\n<\/div>\n<h2>Content Security in detail<\/h2>\n<ul>\n<li>\n<h3>E-Mail Security<\/h3>\n<div>\n<p>Email is considered the number one gateway for cyber attacks. In addition to the continued importance of eliminating classic attack methods, email security should also be able to protect against zero-day attacks, even with cloud-based services such as O365.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Web Isolation<\/h3>\n<div>\n<p>Browser isolation protects your network and endpoint from web-based threats such as malware by running web activity in an isolated environment.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Sandboxing<\/h3>\n<div>\n<p>Sandboxing counteracts zero-day attacks by testing files and URLs in a virtual environment. Cloud-based sandbox solutions also help to maintain network performance and save costs at the same time.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Data Transfer<\/h3>\n<div>\n<p>Secure data exchange is a must for every company. This requires solutions that ensure the integrity and authenticity of data and enable secure transfer both internally and externally.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>E-Mail Encryption<\/h3>\n<div>\n<p>To prevent the content of emails from being read or even manipulated, emails with sensitive data should at least be encrypted. Simple integration into the existing system architecture must be taken into account when evaluating such a solution.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/11\/it-security_14.jpg\" alt=\"\"><\/p>\n<h2>Only sensible investments also bring more security.<\/h2>\n<p>From a business perspective<\/p>\n<div>\n<p><b>The solutions described for filtering and isolating web traffic sound too tempting. Which IT organisation doesn&#8217;t prick up its ears when &#8220;secure surfing&#8221; is promised?<\/b><\/p>\n<\/p>\n<p>However, we would like to warn against making hasty decisions: do not purchase a solution without knowing the specifics of sizing and configuration.<\/p>\n<p>ensec ensures that you don&#8217;t burn your budget in vain. We integrate the content security solution &#8211; be it a simple URL filter on the firewall gateway, a stand-alone and granularly configurable URL filter solution for up to several thousand users or a combination of these with an isolation component for a general increase in security and, of course, any other security solution &#8211; into your infrastructure in such a way that your investment can bear fruit. In this case: to enable &#8220;secure surfing&#8221;.<\/p>\n<\/div>\n<p><a href=\"#8\"><\/a><\/p>\n<\/div>\n<h2>\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\/p>\n<\/h2>\n<p><p>\n        <a href=\"mailto:hello@ensec.ch\">Write to us<\/a>\n    <\/p>\n<\/p>\n<div>\n<p>Or give us a call:<\/p>\n<\/div>\n<h3><a href=\"tel:+41447111144 \">+41 44 711 11 44<\/a><\/h3>\n<p><!--more--><br \/>\n<!-- {\"name\":\"Home\",\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"120\",\"css\":\".el-section {\\n\\tbackground-image: url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ensec-hintergrund_animation.svg'), url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/background_seamap-03.png');\\n  background-repeat: no-repeat, no-repeat;\\n  background-position: center, center;\\n  background-size: cover, cover;\\n}\",\"header_transparent_noplaceholder\":true,\"id\":\"top\",\"image_position\":\"top-center\",\"image_size\":\"cover\",\"media_background\":\"#007EA7\",\"media_overlay\":\"rgba(0, 0, 0, 0.1)\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"style\":\"muted\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"video_width\":\"2560\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"2-3,1-3\",\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Content Security\",\"margin\":\"small\",\"margin_remove_top\":true,\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"s\",\"text_align_fallback\":\"center\",\"title_color\":\"success\",\"title_element\":\"h1\",\"title_style\":\"heading-large\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p><script src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/libs\\\/frhvbuzj\\\/lord-icon-2.0.2.js\\\"><\\\/script> <lord-icon src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/zpxybbhl.json\\\" trigger=\\\"loop\\\" colors=\\\"primary:#54BBAB,secondary:#007EA7\\\" stroke=\\\"35\\\" style=\\\"width: 90px; height: 90px;\\\"> <\\\/lord-icon><\\\/p>\",\"css\":\".el-element {\\n\\twidth: 120px;\\n    padding: 15px;\\n    border-radius: 50%;\\n    background-color:#fff;\\n    box-shadow: rgba(50, 50, 93, 0.25) 0px 50px 100px -20px, rgba(0, 0, 0, 0.3) 0px 30px 60px -30px;\\n}\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"medium\",\"position\":\"relative\",\"position_top\":\"55\",\"position_z_index\":\"1\",\"text_align\":\"center\"}},{\"type\":\"grid\",\"props\":{\"animation\":\"fade\",\"content_column_breakpoint\":\"m\",\"css\":\".el-title {\\n\\tpadding-top:10px;\\n}\\n\\n.el-item > * {\\n\\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.16) 0px 10px 36px 0px, rgba(0, 0, 0, 0.06) 0px 0px 0px 1px;\\n}\\n\\n.el-item > *:hover {\\n    box-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\\n\\n.el-item > *:hover .el-link { \\n\\tbackground-color: #003249;\\n\\tborder: solid 1px #003249;\\n\\tcolor: #fff;\\n\\tbox-shadow: rgba(0, 0, 0, 0.25) 0px 54px 55px, rgba(0, 0, 0, 0.12) 0px -12px 30px, rgba(0, 0, 0, 0.12) 0px 4px 6px, rgba(0, 0, 0, 0.17) 0px 12px 13px, rgba(0, 0, 0, 0.09) 0px -3px 5px;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":true,\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_row_align\":false,\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":false,\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_width\":\"80\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"lightbox_bg_close\":true,\"link_margin\":\"medium\",\"link_style\":\"primary\",\"link_text\":\"Read More\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_easing\":\"1\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"text_align\":\"center\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"\",\"link\":\"kontakt\\\/\",\"link_text\":\"Call now\",\"title\":\"Our IT security experts will be happy to advise you.\"}}]}]}]}],\"name\":\"Hero \\u2013\\u00a0Level 2 \\\/\\\/ CTA - animiert\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"breadcrumbs\",\"props\":{\"show_current\":true,\"show_home\":true}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}],\"props\":{\"layout\":\"3-4,1-4\"}},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"medium\",\"margin_remove_bottom\":true,\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<p><b>Are you losing sleep over your staff's unrestricted Internet access? Let's talk about content security: Whether it's emails or website access, our solution keeps malware out. Our expertise in handling the solution ensures secure data traffic without making life difficult for users.<\\\/b><\\\/p>\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"large\",\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Our IT security integration for your business\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"div\",\"title_style\":\"h5\"}},{\"type\":\"subnav\",\"props\":{\"css\":\"@media only screen and (max-width: 600px) {\\n  a.el-content, a.el-link {\\n  padding:10px 20px;\\n  }\\n}\\n\\n.el-link {\\n  padding: 20px 40px;\\n  border: solid 1px #007ea7;\\n  background-color: #fff;\\n  color: #007ea7;\\n}\\n\\n.el-link:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\\n\\n.el-content {\\n  padding: 20px 40px;\\n  border: solid 1px #007ea7;\\n  background-color: #007ea7;\\n  color: #fff;\\n}\",\"subnav_style\":\"pill\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Network Security\",\"link\":\"en\\\/it-security-integration\\\/network-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Content Security\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Application Security\",\"link\":\"en\\\/it-security-integration\\\/application-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Cloud Security\",\"link\":\"en\\\/it-security-integration\\\/cloud-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Infrastructure Security\",\"link\":\"en\\\/it-security-integration\\\/infrastructure-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"OT Security\",\"link\":\"en\\\/it-security-integration\\\/ot-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Endpoint Security\",\"link\":\"en\\\/it-security-integration\\\/endpoint-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Security Analytics\",\"link\":\"en\\\/it-security-integration\\\/security-analytics\\\/\"}}],\"modified\":\"2021-05-11T13:39:40.496Z\",\"name\":\"Subnav \\u2013 IT Security\"},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"remove-vertical\",\"margin_remove_top\":true},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"<b>Keep dangerous Internet content outside<\\\/b>\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h2\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Wouldn't it be great if your workforce could access any website without any negative consequences for information security? Whether it's a site full of legitimate content or a malware sinkhole that employees have been lured to by a convincing phishing message?<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\",\"text_color\":\"primary\",\"text_style\":\"large\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>In fact, this is feasible: The web security solution favoured by ensec switches between your users' browsers and the websites they access. The intermediary system retrieves the desired content, renders it and only sends the screen content to your users' browsers - but not active content or even downloads. The latter only find their way to the end users' computers after they have been dynamically scanned for malware in a sandbox environment. No end device executes unchecked code.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"medium\",\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<p>Simple principle, tricky configuration<\\\/p>\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Admittedly, the principle behind our preferred solution for isolation sounds simple. And in practice, it is. This is because we configure the solution in such a way that it remains as invisible as possible and is therefore accepted. After all, an information security component is only ever effective if it does not hinder users in their work.<\\\/p>\\n\n\n<p>ensec has experience in designing the solution, customised sizing and implementing the software. You benefit from this expertise because you can put a protection component into operation that works straight away. Regardless of whether you need to serve several hundred or - like our largest content security customer to date - several thousand users.<\\\/p>\\n\n\n<p>We not only complete the proof of concept with you and a selected group of users. We also carry out a pilot phase with 50 or 100 users and help you to adapt your internal processes (for example, helpdesk or engineering). Our specialists will also work with you before implementation to determine how the isolation solution evaluates files to be downloaded, when it only warns and when it prevents downloads.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}},{\"type\":\"headline\",\"props\":{\"content\":\"Email encryption - without user intervention\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Just as with web isolation, the same applies to securing email communication - it's best if users don't even notice that their messages are being encrypted and decrypted. The content security solution should handle encryption automatically in the background if required. And this is exactly what you achieve with our preferred solution. Our experts work with you to develop the criteria that the solution uses to decide whether a message should be sent encrypted or in plain text.<\\\/p>\\n\n\n<p>It doesn't matter whether the recipients have an S\\\/MIME certificate or a PGP key - they can read and reply to the encrypted messages in either case. The system independently searches for the secure transport route to the recipient. Our solution also takes care of the tiresome issue of certificate management from an IT perspective. The software can be connected to a public key infrastructure (PKI) and then manages all user certificates itself. Expired certificates on end devices are therefore a thing of the past.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}},{\"type\":\"headline\",\"props\":{\"content\":\"Do you want to do it yourself, or should we?\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Do you see a need for a content security solution? But don't (currently) have the human resources to operate it? Then let's talk about a <a href=\\\"https:\\\/\\\/www.ensec.ch\\\/en\\\/managed-it-security\\\/\\\">managed security service<\\\/a>. In this case, we not only design and integrate the solution, we also operate it for you - in your own data centre. Ideally, we will also take over the operation of your web gateway, as the two components need to work closely together to maximise the effect.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]}],\"name\":\"Content \\u2013 Level 2\",\"modified\":\"2021-05-11T13:23:47.505Z\"},{\"name\":\"Services Titel\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"id\":\"services\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"padding\":\"small\",\"padding_remove_bottom\":false,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Content Security in detail\",\"title_element\":\"h2\",\"title_style\":\"h1\"}}]}],\"props\":{\"width\":\"expand\"}}]},{\"name\":\"Services\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"id\":\"services\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-05.svg\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"padding\":\"large\",\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-1\"},\"children\":[{\"type\":\"grid\",\"props\":{\"animation\":\"none\",\"content_column_breakpoint\":\"m\",\"css\":\".el-item:hover {\\n\\tbox-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\\n\\n.el-item {\\n\\tcolor:#151515;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_large\":\"4\",\"grid_medium\":\"\",\"grid_parallax\":\"0\",\"grid_small\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"item_animation\":true,\"item_maxwidth\":\"xlarge\",\"lightbox_bg_close\":true,\"link_style\":\"text\",\"link_text\":\"Mehr erfahren\",\"margin\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,-80\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h2\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Email is considered the number one gateway for cyber attacks. In addition to the continued importance of eliminating classic attack methods, email security should also be able to protect against zero-day attacks, even with cloud-based services such as O365.<\\\/p>\",\"image\":\"\",\"title\":\"E-Mail Security\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Browser isolation protects your network and endpoint from web-based threats such as malware by running web activity in an isolated environment.<\\\/p>\",\"image\":\"\",\"title\":\"Web Isolation\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Sandboxing counteracts zero-day attacks by testing files and URLs in a virtual environment. Cloud-based sandbox solutions also help to maintain network performance and save costs at the same time.<\\\/p>\",\"image\":\"\",\"title\":\"Sandboxing\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Secure data exchange is a must for every company. This requires solutions that ensure the integrity and authenticity of data and enable secure transfer both internally and externally.<\\\/p>\",\"image\":\"\",\"title\":\"Data Transfer\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>To prevent the content of emails from being read or even manipulated, emails with sensitive data should at least be encrypted. Simple integration into the existing system architecture must be taken into account when evaluating such a solution.<\\\/p>\",\"image\":\"\",\"title\":\"E-Mail Encryption\"}}]}]}],\"props\":{\"width\":\"expand\"}}]},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"top-center\",\"image_size\":\"contain\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"animation\":\"none\",\"content\":\"\n\n<p><b>The solutions described for filtering and isolating web traffic sound too tempting. Which IT organisation doesn't prick up its ears when \\\"secure surfing\\\" is promised?<\\\/b><\\\/p>\\n\n\n<p><\\\/p>\\n\n\n<p>However, we would like to warn against making hasty decisions: do not purchase a solution without knowing the specifics of sizing and configuration.<\\\/p>\\n\\n\n\n<p>ensec ensures that you don't burn your budget in vain. We integrate the content security solution - be it a simple URL filter on the firewall gateway, a stand-alone and granularly configurable URL filter solution for up to several thousand users or a combination of these with an isolation component for a general increase in security and, of course, any other security solution - into your infrastructure in such a way that your investment can bear fruit. In this case: to enable \\\"secure surfing\\\".<\\\/p>\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"medium\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/11\\\/it-security_14.jpg\",\"image_align\":\"right\",\"image_grid_breakpoint\":\"m\",\"image_grid_column_gap\":\"large\",\"image_grid_width\":\"3-5\",\"image_height\":\"780\",\"image_link\":true,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":\"910\",\"link\":\"#8\",\"link_style\":\"text\",\"link_text\":\"\",\"margin\":\"large\",\"margin_remove_top\":false,\"meta\":\"From a business perspective\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"h4\",\"panel_padding\":\"large\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"l\",\"parallax_x\":\"220,0\",\"title\":\"Only sensible investments also bring more security.\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_link\":false,\"title_margin\":\"small\",\"title_style\":\"h2\"}}]}]}],\"name\":\"Aus Sicht des Business \\u2013 schmal\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-top: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 0 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n\\tborder-right: 0px solid #fff;\\n    padding: 0 0 0 50px;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"large\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"content\":\"\n\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\\\/p>\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-left: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 50px 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n \\tborder-left: 0px solid #fff;\\n    padding: 0 50px 0 0;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"none\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"button\",\"props\":{\"button_size\":\"large\",\"css\":\".el-content {\\n\\tfont-size: 1.3rem;\\n    padding: 15px 40px;\\n    text-transform: uppercase;\\n}\\n\\n.el-content:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"text_align\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"primary\",\"content\":\"Write to us\",\"dialog_layout\":\"modal\",\"dialog_offcanvas_flip\":true,\"icon_align\":\"left\",\"link\":\"mailto:hello@ensec.ch\"}}]},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Or give us a call:<\\\/p>\",\"margin\":\"default\",\"margin_remove_bottom\":true,\"text_align\":\"center\"}},{\"type\":\"headline\",\"props\":{\"content\":\"+41 44 711 11 44\",\"link\":\"tel:+41447111144 \",\"margin_remove_top\":true,\"text_align\":\"center\",\"title_element\":\"h3\"}}]}],\"props\":{\"column_gap\":\"collapse\",\"layout\":\"2-3,1-3\",\"row_gap\":\"collapse\"}}],\"name\":\"Call to Action\",\"modified\":\"2021-02-09T15:59:25.850Z\"}],\"version\":\"4.5.1\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Content Security Our IT security experts will be happy to advise you. Call now Are you losing sleep over your staff&#8217;s unrestricted Internet access? Let&#8217;s talk about content security: Whether it&#8217;s emails or website access, our solution keeps malware out. Our expertise in handling the solution ensures secure data traffic without making life difficult for [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":7911,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7924","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/comments?post=7924"}],"version-history":[{"count":9,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7924\/revisions"}],"predecessor-version":[{"id":8279,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7924\/revisions\/8279"}],"up":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7911"}],"wp:attachment":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/media?parent=7924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}