{"id":7953,"date":"2021-09-28T10:04:55","date_gmt":"2021-09-28T08:04:55","guid":{"rendered":"https:\/\/www.ensec.ch\/it-security-integration\/security-analytics\/"},"modified":"2025-01-27T16:30:25","modified_gmt":"2025-01-27T15:30:25","slug":"security-analytics","status":"publish","type":"page","link":"https:\/\/www.ensec.ch\/en\/it-security-integration\/security-analytics\/","title":{"rendered":"Security Analytics"},"content":{"rendered":"<h1>Security Analytics<\/h1>\n<div>\n<p><script src=\"https:\/\/cdn.lordicon.com\/libs\/frhvbuzj\/lord-icon-2.0.2.js\"><\/script> <lord-icon src=\"https:\/\/cdn.lordicon.com\/zpxybbhl.json\" trigger=\"loop\" colors=\"primary:#54BBAB,secondary:#007EA7\" stroke=\"35\" style=\"width: 90px; height: 90px;\"> <\/lord-icon><\/p>\n<\/div>\n<div>\n<h2>Our IT security experts will be happy to advise you.<\/h2>\n<p><a href=\"\/ensec\/kontakt\/\">Call now<\/a><\/p>\n<\/div>\n<hr>\n<h2>\n<p><b>The complexity of IT operations is increasing steadily and exponentially. Purely manual management of the security infrastructure is simply no longer manageable. Proactive and artificial intelligence-based analysis tools are the answer.<\/b><\/p>\n<\/h2>\n<div>Our IT security integration for your business<\/div>\n<ul>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/network-security\/\">Network Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/content-security\/\">Content Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/application-security\/\">Application Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/cloud-security\/\">Cloud Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/infrastructure-security\/\">Infrastructure Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/ot-security\/\">OT Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-integration\/endpoint-security\/\">Endpoint Security<\/a>\n    <\/li>\n<li>\n        <a href=\"\">Security Analytics<\/a>\n    <\/li>\n<\/ul>\n<hr>\n<h2>\n<p>Recognising cyber threats at an early stage<\/p>\n<\/h2>\n<div>\n<p>Security analytics is used to recognise signs of danger before an actual threat occurs and data has possibly already been leaked or systems manipulated.<\/p>\n<\/p>\n<p>The partner solutions deployed by ensec use advanced AI-driven analyses to secure networks. These recognise cyber threats immediately and eliminate them before any actual damage can occur. And this is possible without the use of hardware.<\/p>\n<\/div>\n<h3>\n<h3>Channelling the flood of data<\/h3>\n<\/h3>\n<div>\n<p>SOC (Security Operation Centre) teams inevitably receive a huge amount of data from their IT devices, network components and security solutions. The SOC therefore needs solutions that filter the relevant data and make it available for analysis.<\/p>\n<\/p>\n<p>There are solutions that do exactly this &#8211; so-called SIEM (Security Incident and Event Management) systems collect data from a wide variety of sources. For example, log data from network or security devices and EDR (Endpoint Detection &amp; Response) solutions, which detect incidents directly on the endpoints. The data is also processed by specialised network scanners (NDR in SIEM, so-called NDR (Network Detection and Response).<\/p>\n<p>The collected data is correlated and presented in such a way that the analysts can draw the correct conclusions and ideally analyse and track an attack over the entire cycle.<\/p>\n<\/div>\n<h3>\n<h3>Supported by specialists<\/h3>\n<\/h3>\n<div>\n<p>ensec does not operate its own SOC, but works with strong and very experienced partners who offer SOC services. And we can plan and implement the SIEM, EDR and NDR components for you and make the correlated data available to your own SOC or a SOC service.<\/p>\n<p>You don&#8217;t want to operate the analysis tools yourself? Then let&#8217;s talk about our <a href=\"https:\/\/www.ensec.ch\/managed-it-security\/\">Managed Security Services<\/a>. Both solutions can also be operated for you by our specialists independently of a SOC through ensec. Based on our NDR solution, we offer a comprehensive threat monitoring service.<\/p>\n<\/div>\n<h2>Security Analytics in Detail<\/h2>\n<ul>\n<li>\n<h3>SIEM<\/h3>\n<div>\n<p>SIEM software supports IT teams in monitoring their IT infrastructure by correlating and processing data from various sources. A SIEM also supports the monitoring of user activities and compliance with security regulations.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Analytics<\/h3>\n<div>\n<p>Networks are becoming ever larger and more complex. Attackers can camouflage themselves very well in the flood of data. Modern network detection and response applications also help to recognise and fend off non-signature-based attacks by working with AI algorithms, among other things.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/it-security_05-1.jpg\" alt=\"\"><\/p>\n<h2>Threat Monitoring as a Service.<\/h2>\n<p>From a business perspective<\/p>\n<div>\n<p><strong>Managed Threat Monitoring is a service that correlates and qualifies the metadata generated by the communication of the IT infrastructure and derives any incidents from this.<\/strong><\/p>\n<p>The service itself does not prevent an IT security incident, but provides indications of such an incident and generates a concrete picture of the extent of damage in the event of an incident.<\/p>\n<p>The processes are the key to the Managed Threat Monitoring Service and must cover the areas of reporting and incident management, tailored to the customer&#8217;s circumstances.<\/p>\n<\/div>\n<p><a href=\"#8\"><\/a><\/p>\n<\/div>\n<h2>\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\/p>\n<\/h2>\n<p><p>\n        <a href=\"mailto:hello@ensec.ch\">Write to us<\/a>\n    <\/p>\n<\/p>\n<div>\n<p>Or give us a call:<\/p>\n<\/div>\n<h3><a href=\"tel:+41447111144 \">+41 44 711 11 44<\/a><\/h3>\n<p><!--more--><br \/>\n<!-- {\"name\":\"Home\",\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"120\",\"css\":\".el-section {\\n\\tbackground-image: url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ensec-hintergrund_animation.svg'), url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/background_seamap-03.png');\\n  background-repeat: no-repeat, no-repeat;\\n  background-position: center, center;\\n  background-size: cover, cover;\\n}\",\"header_transparent_noplaceholder\":true,\"id\":\"top\",\"image_position\":\"top-center\",\"image_size\":\"cover\",\"media_background\":\"#007EA7\",\"media_overlay\":\"rgba(0, 0, 0, 0.1)\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"style\":\"muted\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"video_width\":\"2560\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"2-3,1-3\",\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Security Analytics\",\"margin\":\"small\",\"margin_remove_top\":true,\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"s\",\"text_align_fallback\":\"center\",\"title_color\":\"success\",\"title_element\":\"h1\",\"title_style\":\"heading-large\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p><script src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/libs\\\/frhvbuzj\\\/lord-icon-2.0.2.js\\\"><\\\/script> <lord-icon src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/zpxybbhl.json\\\" trigger=\\\"loop\\\" colors=\\\"primary:#54BBAB,secondary:#007EA7\\\" stroke=\\\"35\\\" style=\\\"width: 90px; height: 90px;\\\"> <\\\/lord-icon><\\\/p>\",\"css\":\".el-element {\\n\\twidth: 120px;\\n    padding: 15px;\\n    border-radius: 50%;\\n    background-color:#fff;\\n    box-shadow: rgba(50, 50, 93, 0.25) 0px 50px 100px -20px, rgba(0, 0, 0, 0.3) 0px 30px 60px -30px;\\n}\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"medium\",\"position\":\"relative\",\"position_top\":\"55\",\"position_z_index\":\"1\",\"text_align\":\"center\"}},{\"type\":\"grid\",\"props\":{\"animation\":\"fade\",\"content_column_breakpoint\":\"m\",\"css\":\".el-title {\\n\\tpadding-top:10px;\\n}\\n\\n.el-item > * {\\n\\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.16) 0px 10px 36px 0px, rgba(0, 0, 0, 0.06) 0px 0px 0px 1px;\\n}\\n\\n.el-item > *:hover {\\n    box-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\\n\\n.el-item > *:hover .el-link { \\n\\tbackground-color: #003249;\\n\\tborder: solid 1px #003249;\\n\\tcolor: #fff;\\n\\tbox-shadow: rgba(0, 0, 0, 0.25) 0px 54px 55px, rgba(0, 0, 0, 0.12) 0px -12px 30px, rgba(0, 0, 0, 0.12) 0px 4px 6px, rgba(0, 0, 0, 0.17) 0px 12px 13px, rgba(0, 0, 0, 0.09) 0px -3px 5px;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":true,\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_row_align\":false,\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":false,\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_width\":\"80\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"lightbox_bg_close\":true,\"link_margin\":\"medium\",\"link_style\":\"primary\",\"link_text\":\"Read More\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_easing\":\"1\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"text_align\":\"center\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"\",\"link\":\"kontakt\\\/\",\"link_text\":\"Call now\",\"title\":\"Our IT security experts will be happy to advise you.\"}}]}]}]}],\"name\":\"Hero \\u2013\\u00a0Level 2 \\\/\\\/ CTA - animiert\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"breadcrumbs\",\"props\":{\"show_current\":true,\"show_home\":true}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}],\"props\":{\"layout\":\"3-4,1-4\"}},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"medium\",\"margin_remove_bottom\":true,\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<p><b>The complexity of IT operations is increasing steadily and exponentially. Purely manual management of the security infrastructure is simply no longer manageable. Proactive and artificial intelligence-based analysis tools are the answer.<\\\/b><\\\/p>\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"large\",\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Our IT security integration for your business\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"div\",\"title_style\":\"h5\"}},{\"type\":\"subnav\",\"props\":{\"css\":\"@media only screen and (max-width: 600px) {\\n  a.el-content, a.el-link {\\n  padding:10px 20px;\\n  }\\n}\\n\\n.el-link {\\n  padding: 20px 40px;\\n  border: solid 1px #007ea7;\\n  background-color: #fff;\\n  color: #007ea7;\\n}\\n\\n.el-link:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\\n\\n.el-content {\\n  padding: 20px 40px;\\n  border: solid 1px #007ea7;\\n  background-color: #007ea7;\\n  color: #fff;\\n}\",\"subnav_style\":\"pill\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Network Security\",\"link\":\"en\\\/it-security-integration\\\/network-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Content Security\",\"link\":\"en\\\/it-security-integration\\\/content-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Application Security\",\"link\":\"en\\\/it-security-integration\\\/application-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Cloud Security\",\"link\":\"en\\\/it-security-integration\\\/cloud-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Infrastructure Security\",\"link\":\"en\\\/it-security-integration\\\/infrastructure-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"OT Security\",\"link\":\"en\\\/it-security-integration\\\/ot-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Endpoint Security\",\"link\":\"en\\\/it-security-integration\\\/endpoint-security\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Security Analytics\"}}],\"modified\":\"2021-05-11T13:39:40.496Z\",\"name\":\"Subnav \\u2013 IT Security\"},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"remove-vertical\",\"margin_remove_top\":true},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<p>Recognising cyber threats at an early stage<\\\/p>\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h2\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Security analytics is used to recognise signs of danger before an actual threat occurs and data has possibly already been leaked or systems manipulated.<\\\/p>\\n\n\n<p><\\\/p>\\n\n\n<p>The partner solutions deployed by ensec use advanced AI-driven analyses to secure networks. These recognise cyber threats immediately and eliminate them before any actual damage can occur. And this is possible without the use of hardware.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\",\"text_color\":\"secondary\",\"text_style\":\"large\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"medium\",\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<h3>Channelling the flood of data<\\\/h3>\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>SOC (Security Operation Centre) teams inevitably receive a huge amount of data from their IT devices, network components and security solutions. The SOC therefore needs solutions that filter the relevant data and make it available for analysis.<\\\/p>\\n\n\n<p><\\\/p>\\n\n\n<p>There are solutions that do exactly this - so-called SIEM (Security Incident and Event Management) systems collect data from a wide variety of sources. For example, log data from network or security devices and EDR (Endpoint Detection &amp; Response) solutions, which detect incidents directly on the endpoints. The data is also processed by specialised network scanners (NDR in SIEM, so-called NDR (Network Detection and Response).<\\\/p>\\n\n\n<p>The collected data is correlated and presented in such a way that the analysts can draw the correct conclusions and ideally analyse and track an attack over the entire cycle.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}},{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<h3>Supported by specialists<\\\/h3>\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>ensec does not operate its own SOC, but works with strong and very experienced partners who offer SOC services. And we can plan and implement the SIEM, EDR and NDR components for you and make the correlated data available to your own SOC or a SOC service.<\\\/p>\\n\n\n<p>You don't want to operate the analysis tools yourself? Then let's talk about our <a href=\\\"https:\\\/\\\/www.ensec.ch\\\/managed-it-security\\\/\\\">Managed Security Services<\\\/a>. Both solutions can also be operated for you by our specialists independently of a SOC through ensec. Based on our NDR solution, we offer a comprehensive threat monitoring service.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]}],\"name\":\"Content \\u2013 Level 2\",\"modified\":\"2021-05-11T13:23:47.505Z\"},{\"name\":\"Services Titel\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"id\":\"services\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"padding\":\"small\",\"padding_remove_bottom\":false,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Security Analytics in Detail\",\"title_element\":\"h2\",\"title_style\":\"h1\"}}]}],\"props\":{\"width\":\"expand\"}}]},{\"name\":\"Services\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"id\":\"services\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-05.svg\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"padding\":\"large\",\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-1\"},\"children\":[{\"type\":\"grid\",\"props\":{\"animation\":\"none\",\"content_column_breakpoint\":\"m\",\"css\":\".el-item:hover {\\n\\tbox-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\\n\\n.el-item {\\n\\tcolor:#151515;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_large\":\"4\",\"grid_medium\":\"\",\"grid_parallax\":\"0\",\"grid_small\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"item_animation\":true,\"item_maxwidth\":\"xlarge\",\"lightbox_bg_close\":true,\"link_style\":\"text\",\"link_text\":\"Mehr erfahren\",\"margin\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,-80\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h2\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>SIEM software supports IT teams in monitoring their IT infrastructure by correlating and processing data from various sources. A SIEM also supports the monitoring of user activities and compliance with security regulations.<\\\/p>\",\"image\":\"\",\"title\":\"SIEM\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Networks are becoming ever larger and more complex. Attackers can camouflage themselves very well in the flood of data. Modern network detection and response applications also help to recognise and fend off non-signature-based attacks by working with AI algorithms, among other things.<\\\/p>\",\"image\":\"\",\"title\":\"Analytics\"}}]}]}],\"props\":{\"width\":\"expand\"}}]},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"top-center\",\"image_size\":\"contain\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"animation\":\"none\",\"content\":\"\n\n<p><strong>Managed Threat Monitoring is a service that correlates and qualifies the metadata generated by the communication of the IT infrastructure and derives any incidents from this.<\\\/strong><\\\/p>\\n\n\n<p>The service itself does not prevent an IT security incident, but provides indications of such an incident and generates a concrete picture of the extent of damage in the event of an incident.<\\\/p>\\n\n\n<p>The processes are the key to the Managed Threat Monitoring Service and must cover the areas of reporting and incident management, tailored to the customer's circumstances.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"medium\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/it-security_05-1.jpg\",\"image_align\":\"right\",\"image_grid_breakpoint\":\"m\",\"image_grid_column_gap\":\"large\",\"image_grid_width\":\"3-5\",\"image_height\":\"780\",\"image_link\":true,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":\"910\",\"link\":\"#8\",\"link_style\":\"text\",\"link_text\":\"\",\"margin\":\"large\",\"margin_remove_top\":false,\"meta\":\"From a business perspective\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"h4\",\"panel_padding\":\"large\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"l\",\"parallax_x\":\"220,0\",\"title\":\"Threat Monitoring as a Service.\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_link\":false,\"title_margin\":\"small\",\"title_style\":\"h2\"}}]}]}],\"name\":\"Aus Sicht des Business \\u2013 schmal\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-top: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 0 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n\\tborder-right: 0px solid #fff;\\n    padding: 0 0 0 50px;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"large\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"content\":\"\n\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\\\/p>\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-left: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 50px 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n \\tborder-left: 0px solid #fff;\\n    padding: 0 50px 0 0;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"none\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"button\",\"props\":{\"button_size\":\"large\",\"css\":\".el-content {\\n\\tfont-size: 1.3rem;\\n    padding: 15px 40px;\\n    text-transform: uppercase;\\n}\\n\\n.el-content:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"text_align\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"primary\",\"content\":\"Write to us\",\"dialog_layout\":\"modal\",\"dialog_offcanvas_flip\":true,\"icon_align\":\"left\",\"link\":\"mailto:hello@ensec.ch\"}}]},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Or give us a call:<\\\/p>\",\"margin\":\"default\",\"margin_remove_bottom\":true,\"text_align\":\"center\"}},{\"type\":\"headline\",\"props\":{\"content\":\"+41 44 711 11 44\",\"link\":\"tel:+41447111144 \",\"margin_remove_top\":true,\"text_align\":\"center\",\"title_element\":\"h3\"}}]}],\"props\":{\"column_gap\":\"collapse\",\"layout\":\"2-3,1-3\",\"row_gap\":\"collapse\"}}],\"name\":\"Call to Action\",\"modified\":\"2021-02-09T15:59:25.850Z\"}],\"version\":\"4.5.1\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Analytics Our IT security experts will be happy to advise you. Call now The complexity of IT operations is increasing steadily and exponentially. Purely manual management of the security infrastructure is simply no longer manageable. Proactive and artificial intelligence-based analysis tools are the answer. Our IT security integration for your business Network Security Content [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":7911,"menu_order":7,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7953","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/comments?post=7953"}],"version-history":[{"count":7,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7953\/revisions"}],"predecessor-version":[{"id":8286,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7953\/revisions\/8286"}],"up":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7911"}],"wp:attachment":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/media?parent=7953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}