{"id":7957,"date":"2021-05-12T08:56:52","date_gmt":"2021-05-12T06:56:52","guid":{"rendered":"https:\/\/www.ensec.ch\/partner\/"},"modified":"2025-11-20T13:11:58","modified_gmt":"2025-11-20T12:11:58","slug":"partner","status":"publish","type":"page","link":"https:\/\/www.ensec.ch\/en\/partner\/","title":{"rendered":"Partner"},"content":{"rendered":"<h1>For a smooth crossing, you need reliable partners.<\/h1>\n<div>\n<h2>In our portfolio you will find innovative and renowned security manufacturers, all tested for wind and weather.<\/h2>\n<\/div>\n<h2>We have at least one strong partner for all our areas of information security. We rely on long-term and trusting partnerships, and our employees have the highest certifications.<\/h2>\n<div>\n<p>These are our partners:<\/p>\n<\/div>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/12\/Check-Point_ensec-website.svg\" alt=\"\"><\/p>\n<p>Check Point<\/p>\n<div>\n<p>Check Point&#8217;s solutions protect customers against 5th generation cyber attacks with a leading catch rate of malware, ransomware and other threats. All controlled by the industry&#8217;s most comprehensive and intuitive Unified Security Mgmt.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/www.checkpoint.com\/\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/showcase\/check-point-software-technologies-dach\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/09\/fortinet.svg\" alt=\"\"><\/p>\n<p>Fortinet<\/p>\n<div>\n<p>Fortinet is a global leader in cybersecurity, providing a comprehensive, integrated and automated security fabric that enables customers to accelerate their digital journey.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/www.fortinet.com\/de\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/fortinet\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/12\/cato_web-2.svg\" alt=\"\"><\/p>\n<p>Cato Networks<\/p>\n<div>\n<p>With Cato, companies can securely and efficiently connect any user to any application anywhere in the world. The cloud-first architecture enables Cato to provide new functions quickly and ensure high security standards &#8211; without any effort on the part of the IT teams.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/www.catonetworks.com\/de\/\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/cato-networks\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/09\/f5.svg\" alt=\"\"><\/p>\n<p>F5 Networks<\/p>\n<div>\n<p>F5 supports applications from development through their entire lifecycle in any multi-cloud environment, enabling organisations to deliver differentiated, powerful and secure digital experiences.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/www.f5.com\/de_de\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/f5\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/10\/website_nozomi.svg\" alt=\"\"><\/p>\n<p>Nozomi Networks<\/p>\n<div>\n<p>Nozomi Networks is a global leader in OT and IoT security. Its platform provides real-time visibility, threat detection, and AI-powered analytics to protect critical infrastructure and industrial systems from cyberattacks.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/www.nozominetworks.com\/\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/nozomi-networks-sa\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/09\/tufin-1.svg\" alt=\"\"><\/p>\n<p>Tufin<\/p>\n<div>\n<p>Tufin offers a complete solution for the automated visualisation, implementation and testing of security policies in hybrid multi-vendor environments. This gives companies an overview and control of their entire network.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/www.tufin.com\/de\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/tufin-technologies\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/05\/skyhigh.svg\" alt=\"\"><\/p>\n<p>Skyhigh Security<\/p>\n<div>\n<p>The cloud security platform from Skyhigh Security (formerly McAfee Enterprise), provides 360-degree access control to your data, no matter where it is stored. Protection is also included when using, sharing and creating data.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/www.skyhighsecurity.com\/en-us\/index.html\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/skyhighsecurity\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/netscope_ensec-Homepage.svg\" alt=\"\"><\/p>\n<p>Netscope<\/p>\n<div>\n<p>Netskope, a global leader in cybersecurity, is redefining cloud, data and network security and helping organisations apply Zero Trust principles to protect their data.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/www.netskope.com\/de\/\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/netskope\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/partner-logo_silverfort_homepage-1.svg\" alt=\"\"><\/p>\n<p>Silverfort<\/p>\n<div>\n<p>Silverfort, the unified identity protection company, has developed a platform that enables modern identity security everywhere: by connecting to the silos of the corporate identity infrastructure, Silverfort unifies identity security across all on-premise and cloud environments.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/www.silverfort.com\/de\/\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/silverfort\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/Thales_ensec-homepage.svg\" alt=\"\"><\/p>\n<p>Thales<\/p>\n<div>\n<p>Thales is the world&#8217;s leading provider of data protection, access management and authentication. They support companies worldwide in simplifying security in the cloud, complying with legal requirements and reducing risks.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/www.thalesgroup.com\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/thales\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/09\/seppmail.svg\" alt=\"\"><\/p>\n<p>SeppMail<\/p>\n<div>\n<p>Since its foundation in 2001, SEPPmail has focussed on the development of pioneering and easy-to-use solutions for secure e-mail communication.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/www.seppmail.ch\/\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/seppmail-ag\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/08\/exeon_ensec-web.svg\" alt=\"\"><\/p>\n<p>Exeon Analytics<\/p>\n<div>\n<p>The Swiss cybersecurity company specialises in the protection of IT infrastructures through AI-driven security analyses. The self-learning algorithms for recognising anomalies in network activities were developed at ETH Zurich and are based on more than ten years of academic research.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/www.exeon.com\/de\/\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/exeon-analytics\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/09\/rapid.svg\" alt=\"\"><\/p>\n<p>Rapid7<\/p>\n<div>\n<p>Rapid7 moves organisations forward with the Insight Cloud, which focuses on visibility, analytics and automation. The solutions simplify complex issues and enable security gaps to be closed, harmful activities to be recognised, attacks to be investigated and warded off and processes to be automated.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/www.rapid7.com\/de\/\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/rapid7\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/09\/altipeak_rz.svg\" alt=\"\"><\/p>\n<p>Altipeak<\/p>\n<div>\n<p>The access management platform from the Swiss software manufacturer offers a wide range of authentication methods. Safewalk makes it easy to use and deploy multi-factor authentication for all use cases, user profiles, devices or mobile applications.\u00a0<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/www.altipeaksecurity.com\/\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/altipeak-security\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/09\/sentinelone_rz.svg\" alt=\"\"><\/p>\n<p>SentinelOne<\/p>\n<div>\n<p>SentinelOne provides autonomous endpoint protection through a single agent that successfully prevents, detects and responds to attacks across all major vectors. The platform saves customers time by using AI to automatically remediate threats in real time.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/de.sentinelone.com\/\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/sentinelone\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/09\/menlo.svg\" alt=\"\"><\/p>\n<p>Menlo Security<\/p>\n<div>\n<p>In 2013, security specialists founded the company Menlo Security in the USA to combat the growing threats. A new technical approach ensures that malicious code and phishing attacks do not even reach the user. This is possible thanks to browser, document and email isolation.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/www.menlosecurity.com\/\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/menlo-security\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/11\/Fudo_web.svg\" alt=\"\"><\/p>\n<p>Fudo Security<\/p>\n<div>\n<p>Fudo Security specialises in security solutions in the field of Privileged Access Management. The PAM solution combines the highest security standards with a business-orientated approach.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/fudosecurity.com\/de\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/fudosecurity\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/12\/Trellix.svg\" alt=\"\"><\/p>\n<p>Trellix<\/p>\n<div>\n<p>Trellix&#8217;s open and native XDR platform helps organisations facing today&#8217;s most advanced threats gain confidence in the protection and resilience of their operations. With an extensive partner ecosystem, they accelerate technology innovation through machine learning and automation.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/www.trellix.com\/en-us\/index.html\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/trellixsecurity\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/09\/knwobe4.svg\" alt=\"\"><\/p>\n<p>KnowBe4<\/p>\n<div>\n<p>The user awareness platform developed by KnowBe4 was developed in the fight against social engineering. Security training, including simulated phishing attacks, helps to strengthen the &#8220;human firewall&#8221;.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/www.knowbe4.de\/\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/knowbe4germany\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/12\/LocateRisk_ensec-website.svg\" alt=\"\"><\/p>\n<p>LocateRisk<\/p>\n<div>\n<p>LocateRisk ensures speed and control in the cyber security process. The non-invasive solution monitors the protection of IT infrastructures, accelerates protection and facilitates cyber risk management in the supply chain with automated IT and GDPR compliance checks of business partners.<\/p>\n<\/div>\n<\/div>\n<ul>\n<li>\n        <a href=\"https:\/\/locaterisk.com\/de\/\" target=\"_blank\" rel=\"noopener\">Website<\/a>\n    <\/li>\n<li>\n        <a href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a>\n    <\/li>\n<\/ul>\n<h2>\n<p>Would you like to find out more about our portfolio? Please contact us.<\/p>\n<\/h2>\n<p><p>\n        <a href=\"mailto:hello@ensec.ch\">Write to us<\/a>\n    <\/p>\n<\/p>\n<div>\n<p>Or give us a call:<\/p>\n<\/div>\n<h3><a href=\"tel:+41447111144 \">+41 44 711 11 44<\/a><\/h3>\n<p><!--more--><br \/>\n<!-- {\"name\":\"Home\",\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"header_transparent_noplaceholder\":true,\"height\":\"page\",\"id\":\"top\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/06\\\/ensec_sea-construction_08.jpg\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"media_overlay\":\"rgba(21, 21, 21, 0.18)\",\"padding\":\"xlarge\",\"padding_remove_bottom\":false,\"style\":\"default\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"video_width\":\"2560\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"3-5,2-5\",\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"3-5\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align\":\"center\",\"content\":\"For a smooth crossing, you need reliable partners.\",\"css\":\".el-element {\\n\\ttext-shadow: 1px 1px 5px rgba(0,0,0,0.69);\\n}\",\"margin\":\"small\",\"margin_remove_top\":true,\"text_align\":\"left\",\"text_align_breakpoint\":\"s\",\"text_align_fallback\":\"center\",\"title_element\":\"h1\",\"title_style\":\"heading-large\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"2-5\"}}]}],\"name\":\"Level 1 \\u2013\\u00a0Hero ohne Person\",\"modified\":\"2021-10-05T08:24:36.842Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"50\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-02.svg\",\"image_position\":\"top-right\",\"image_width\":\"992\",\"padding\":\"none\",\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_padding\":\"large\",\"panel_style\":\"card-primary\",\"position\":\"relative\",\"position_top\":\"-70\",\"title\":\"In our portfolio you will find innovative and renowned security manufacturers, all tested for wind and weather.\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"medium\",\"margin_remove_bottom\":true,\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"We have at least one strong partner for all our areas of information security. We rely on long-term and trusting partnerships, and our employees have the highest certifications.\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"medium\",\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>These are our partners:<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"1-4,1-4,1-4,1-4|1-2,1-2,1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>Check Point's solutions protect customers against 5th generation cyber attacks with a leading catch rate of malware, ransomware and other threats. All controlled by the industry's most comprehensive and intuitive Unified Security Mgmt.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2023\\\/12\\\/Check-Point_ensec-website.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"150\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"Check Point\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/www.checkpoint.com\\\/\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/check-point-software-technologies-dach\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>Fortinet is a global leader in cybersecurity, providing a comprehensive, integrated and automated security fabric that enables customers to accelerate their digital journey.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/09\\\/fortinet.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"135\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"Fortinet\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title\":\"\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/www.fortinet.com\\\/de\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/fortinet\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>With Cato, companies can securely and efficiently connect any user to any application anywhere in the world. The cloud-first architecture enables Cato to provide new functions quickly and ensure high security standards - without any effort on the part of the IT teams.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2022\\\/12\\\/cato_web-2.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":165,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"Cato Networks\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"remove\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/www.catonetworks.com\\\/de\\\/\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cato-networks\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"1-4,1-4,1-4,1-4|1-2,1-2,1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>F5 supports applications from development through their entire lifecycle in any multi-cloud environment, enabling organisations to deliver differentiated, powerful and secure digital experiences.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/09\\\/f5.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"135\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"F5 Networks\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/www.f5.com\\\/de_de\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/f5\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>Nozomi Networks is a global leader in OT and IoT security. Its platform provides real-time visibility, threat detection, and AI-powered analytics to protect critical infrastructure and industrial systems from cyberattacks.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2025\\\/10\\\/website_nozomi.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"135\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"Nozomi Networks\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/www.nozominetworks.com\\\/\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/nozomi-networks-sa\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>Tufin offers a complete solution for the automated visualisation, implementation and testing of security policies in hybrid multi-vendor environments. This gives companies an overview and control of their entire network.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/09\\\/tufin-1.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"135\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"Tufin\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/www.tufin.com\\\/de\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/tufin-technologies\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"1-4,1-4,1-4,1-4|1-2,1-2,1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>The cloud security platform from Skyhigh Security (formerly McAfee Enterprise), provides 360-degree access control to your data, no matter where it is stored. Protection is also included when using, sharing and creating data.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2022\\\/05\\\/skyhigh.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"135\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"Skyhigh Security\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/www.skyhighsecurity.com\\\/en-us\\\/index.html\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/skyhighsecurity\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>Netskope, a global leader in cybersecurity, is redefining cloud, data and network security and helping organisations apply Zero Trust principles to protect their data.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/netscope_ensec-Homepage.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"135\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"Netscope\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/www.netskope.com\\\/de\\\/\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netskope\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>Silverfort, the unified identity protection company, has developed a platform that enables modern identity security everywhere: by connecting to the silos of the corporate identity infrastructure, Silverfort unifies identity security across all on-premise and cloud environments.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/partner-logo_silverfort_homepage-1.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":135,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"Silverfort\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/www.silverfort.com\\\/de\\\/\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/silverfort\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"1-4,1-4,1-4,1-4|1-2,1-2,1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>Thales is the world's leading provider of data protection, access management and authentication. They support companies worldwide in simplifying security in the cloud, complying with legal requirements and reducing risks.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/Thales_ensec-homepage.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"135\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"Thales\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/www.thalesgroup.com\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/thales\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>Since its foundation in 2001, SEPPmail has focussed on the development of pioneering and easy-to-use solutions for secure e-mail communication.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/09\\\/seppmail.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"135\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"SeppMail\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/www.seppmail.ch\\\/\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/seppmail-ag\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>The Swiss cybersecurity company specialises in the protection of IT infrastructures through AI-driven security analyses. The self-learning algorithms for recognising anomalies in network activities were developed at ETH Zurich and are based on more than ten years of academic research.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2025\\\/08\\\/exeon_ensec-web.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"135\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"Exeon Analytics\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/www.exeon.com\\\/de\\\/\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/exeon-analytics\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"1-4,1-4,1-4,1-4|1-2,1-2,1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>Rapid7 moves organisations forward with the Insight Cloud, which focuses on visibility, analytics and automation. The solutions simplify complex issues and enable security gaps to be closed, harmful activities to be recognised, attacks to be investigated and warded off and processes to be automated.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/09\\\/rapid.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"135\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"Rapid7\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/www.rapid7.com\\\/de\\\/\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/rapid7\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>The access management platform from the Swiss software manufacturer offers a wide range of authentication methods. Safewalk makes it easy to use and deploy multi-factor authentication for all use cases, user profiles, devices or mobile applications.\\u00a0<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/09\\\/altipeak_rz.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"180\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"Altipeak\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/www.altipeaksecurity.com\\\/\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/altipeak-security\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>SentinelOne provides autonomous endpoint protection through a single agent that successfully prevents, detects and responds to attacks across all major vectors. The platform saves customers time by using AI to automatically remediate threats in real time.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/09\\\/sentinelone_rz.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"180\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"SentinelOne\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/de.sentinelone.com\\\/\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/sentinelone\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"1-4,1-4,1-4,1-4|1-2,1-2,1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>In 2013, security specialists founded the company Menlo Security in the USA to combat the growing threats. A new technical approach ensures that malicious code and phishing attacks do not even reach the user. This is possible thanks to browser, document and email isolation.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/09\\\/menlo.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"135\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"Menlo Security\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/www.menlosecurity.com\\\/\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/menlo-security\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>Fudo Security specialises in security solutions in the field of Privileged Access Management. The PAM solution combines the highest security standards with a business-orientated approach.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2025\\\/11\\\/Fudo_web.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"135\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"Fudo Security\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/fudosecurity.com\\\/de\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/fudosecurity\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>Trellix's open and native XDR platform helps organisations facing today's most advanced threats gain confidence in the protection and resilience of their operations. With an extensive partner ecosystem, they accelerate technology innovation through machine learning and automation.<\\\/p>\",\"content_align\":true,\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2022\\\/12\\\/Trellix.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_height\":\"20\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"135\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"maxwidth\":\"medium\",\"meta\":\"Trellix\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/www.trellix.com\\\/en-us\\\/index.html\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/trellixsecurity\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"1-4,1-4,1-4,1-4|1-2,1-2,1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>The user awareness platform developed by KnowBe4 was developed in the fight against social engineering. Security training, including simulated phishing attacks, helps to strengthen the \\\"human firewall\\\".<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/09\\\/knwobe4.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"135\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"KnowBe4\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/www.knowbe4.de\\\/\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/knowbe4germany\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"},\"children\":[{\"type\":\"panel\",\"props\":{\"content\":\"\n\n<p>LocateRisk ensures speed and control in the cyber security process. The non-invasive solution monitors the protection of IT infrastructures, accelerates protection and facilitates cyber risk management in the supply chain with automated IT and GDPR compliance checks of business partners.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2023\\\/12\\\/LocateRisk_ensec-website.svg\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"image_width\":\"135\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta\":\"LocateRisk\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}},{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Website\",\"link\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"link_target\":true}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"LinkedIn\",\"link\":\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\",\"link_target\":true}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"}},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\",\"width_small\":\"1-2\"}}]}],\"name\":\"Content\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-top: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 0 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n\\tborder-right: 0px solid #fff;\\n    padding: 0 0 0 50px;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"large\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"content\":\"\n\n<p>Would you like to find out more about our portfolio? Please contact us.<\\\/p>\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-left: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 50px 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n \\tborder-left: 0px solid #fff;\\n    padding: 0 50px 0 0;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"none\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"button\",\"props\":{\"button_size\":\"large\",\"css\":\".el-content {\\n\\tfont-size: 1.3rem;\\n    padding: 15px 40px;\\n    text-transform: uppercase;\\n}\\n\\n.el-content:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"text_align\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"primary\",\"content\":\"Write to us\",\"dialog_layout\":\"modal\",\"dialog_offcanvas_flip\":true,\"icon_align\":\"left\",\"link\":\"mailto:hello@ensec.ch\"}}]},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Or give us a call:<\\\/p>\",\"margin\":\"default\",\"margin_remove_bottom\":true,\"text_align\":\"center\"}},{\"type\":\"headline\",\"props\":{\"content\":\"+41 44 711 11 44\",\"link\":\"tel:+41447111144 \",\"margin_remove_top\":true,\"text_align\":\"center\",\"title_element\":\"h3\"}}]}],\"props\":{\"column_gap\":\"collapse\",\"layout\":\"2-3,1-3\",\"row_gap\":\"collapse\"}}],\"name\":\"Call to Action\",\"modified\":\"2021-02-09T15:59:25.850Z\"}],\"version\":\"4.5.28\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For a smooth crossing, you need reliable partners. In our portfolio you will find innovative and renowned security manufacturers, all tested for wind and weather. We have at least one strong partner for all our areas of information security. We rely on long-term and trusting partnerships, and our employees have the highest certifications. These are [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7957","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/comments?post=7957"}],"version-history":[{"count":8,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7957\/revisions"}],"predecessor-version":[{"id":9085,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7957\/revisions\/9085"}],"wp:attachment":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/media?parent=7957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}