{"id":24542,"date":"2023-09-27T16:23:32","date_gmt":"2023-09-27T14:23:32","guid":{"rendered":"https:\/\/enginsight.com\/?page_id=24542"},"modified":"2025-12-03T10:51:11","modified_gmt":"2025-12-03T09:51:11","slug":"siem","status":"publish","type":"page","link":"https:\/\/enginsight.com\/de\/siem\/","title":{"rendered":"SIEM"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"24542\" class=\"elementor elementor-24542\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2360d2ad elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"2360d2ad\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2c2fcac0\" data-id=\"2c2fcac0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section data-gradient='{\"angle\":-45,\"colors\":[{\"_id\":\"81bc933\",\"premium_gradient_colors\":\"#283AB8\"},{\"_id\":\"3ebcf24\",\"premium_gradient_colors\":\"#8D379E\"},{\"_id\":\"64cb559\",\"premium_gradient_colors\":\"#F13484\"},{\"_id\":\"88a4e48\",\"premium_gradient_colors\":\"#FF605D\"}]}' class=\"elementor-section elementor-inner-section elementor-element elementor-element-3ce4fefd premium-gradient-yes elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3ce4fefd\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"video\",\"background_video_link\":\"https:\\\/\\\/enginsight.com\\\/wp-content\\\/uploads\\\/SIEM-Header-Video.mov\",\"shape_divider_bottom\":\"curve-asymmetrical\",\"shape_divider_bottom_negative\":\"yes\",\"background_play_on_mobile\":\"yes\"}'>\n\t\t\t\t\t\t\t\t<div class=\"elementor-background-video-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M615.2,96.7C240.2,97.8,0,18.9,0,0v100h1000V0C1000,19.2,989.8,96,615.2,96.7z\"><\/path>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-381b4549\" data-id=\"381b4549\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-424b59c1 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"424b59c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">SECURITY INFORMATION AND EVENT MANAGEMENT <\/span><span class=\"premium-dual-header-second-header \">SIEM-System von Enginsight<\/span><\/h1> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9233ed5 elementor-widget elementor-widget-heading\" data-id=\"9233ed5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ihre SIEMphonie zum Schutz vor Cyberangriffen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a498c85 elementor-widget elementor-widget-text-editor\" data-id=\"a498c85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\"><strong>Aktive Sicherheit statt nur reaktives Logging:<\/strong> Wie bei einer guten Symphonie spielen im Enginsight SIEM verschiedene Softwarekomponenten zusammen, um Ihnen Angriffserkennung und-behebung in beinahe Echtzeit zu erm&#xF6;glichen &#x2013; &#xFC;ber alle Datenquellen hinweg.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63f5c446 elementor-align-left elementor-mobile-align-left elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-global elementor-global-23749 elementor-widget-button\" data-id=\"63f5c446\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/enginsight.com\/de\/demo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Termin anfragen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c899459\" data-id=\"c899459\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4280353f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4280353f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1dffc57d\" data-id=\"1dffc57d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e86f4b3 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"e86f4b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\"> <\/span><span class=\"premium-dual-header-second-header \">Ihr SIEM Tool f&#xFC;r Angriffserkennung und -abwehr aus einem Guss<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f7c4e9 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"0f7c4e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b161791 elementor-widget elementor-widget-text-editor\" data-id=\"5b161791\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p style=\"font-weight: 400;\">Machen Sie unser Security Information and Event Management zu Ihrer pers&#xF6;nlichen Schaltzentrale f&#xFC;r mehr Sicherheit in Ihrer Organisation. Analysieren Sie Logs in Echtzeit, behalten Sie den Netzwerkverkehr im Blick und haben Sie ein wachsames Auge auf die Aktivit&#xE4;ten aller User und Anwendungen. Rund um die Uhr.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-77c85094 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"77c85094\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2c5879ae\" data-id=\"2c5879ae\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d95d99 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"3d95d99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">LOGS ZENTRAL VERWALTEN <\/span><span class=\"premium-dual-header-second-header \">Benutzerfreundliches Log-Management<\/span><\/h3> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dedc14a elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"dedc14a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Sammlung, Normalisierung und Indexierung aller Rohdaten in einem zentralen Data Lake<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Strukturierter &#xDC;berblick &#xFC;ber alle Log-Eintr&#xE4;ge nach zeitlichem Eingang<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Erstellung individueller Log-Ansichten und Event-Streams mithilfe vordefinierter oder benutzerspezifischer Filteroptionen<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1b20e5ee\" data-id=\"1b20e5ee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49d7cc7 elementor-widget elementor-widget-image\" data-id=\"49d7cc7\" data-element_type=\"widget\" data-e-type=\"widget\" alt=\"Schwachstellen und Sicherheitsl&#xFC;cken im Dashboard anzeigen\" title=\"Schwachstellen und Sicherheitsl&#xFC;cken im Dashboard anzeigen\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"477\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_Data-Lake-1024x611.png\" class=\"attachment-large size-large wp-image-36482\" alt=\"Enginsight SIEM - Sammlung, Normalisierung und Indexierung aller Rohdaten in einem zentralen Data Lake&#x200B;\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_Data-Lake-1024x611.png 1024w, https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_Data-Lake-300x179.png 300w, https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_Data-Lake-768x459.png 768w, https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_Data-Lake.png 1365w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e566a75 elementor-widget elementor-widget-html\" data-id=\"e566a75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div>\n        <script src=\"https:\/\/js.storylane.io\/js\/v1\/storylane.js\"><\/script>\n        <button style=\"z-index:999999;padding:7px 15px;border-width:2px;border-style:solid;border-radius:8px;font-weight:600;font-size:18px;height:39px;width:200px;line-height:1.2;filter:drop-shadow(0px 0px 15px rgba(26, 19, 72, 0.25));font-family:Poppins, Arial, sans-serif;white-space:nowrap;overflow:hidden;text-overflow:ellipsis;cursor:pointer;background:#e91e61;border-color:#FFFFFF;color:#FFFFFF\" onclick=\"Storylane.Play({type: 'popup', demo_type: 'image', width: 1264, height: 866, scale: '0.95', demo_url: 'https:\/\/app.storylane.io\/demo\/kncdf0612vpp', padding_bottom: 'calc(68.51% + 27px)'})\">Interaktive Demo<\/button>\n      <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c24b8b7 elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c24b8b7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6f0ccaaa\" data-id=\"6f0ccaaa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e5905e elementor-widget elementor-widget-image\" data-id=\"7e5905e\" data-element_type=\"widget\" data-e-type=\"widget\" alt=\"CVE Schwachstellen finden und fixen\" title=\"CVE Schwachstellen finden und fixen\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"482\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_KI-Analyse-1024x617.png\" class=\"attachment-large size-large wp-image-36483\" alt=\"Enginsight SIEM \u2013 KI-gest\u00fctzte Anomalie-Erkennung\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_KI-Analyse-1024x617.png 1024w, https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_KI-Analyse-300x181.png 300w, https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_KI-Analyse-768x463.png 768w, https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_KI-Analyse.png 1352w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbe30f3 elementor-widget elementor-widget-html\" data-id=\"fbe30f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div>\n        <script src=\"https:\/\/js.storylane.io\/js\/v1\/storylane.js\"><\/script>\n        <button style=\"z-index:999999;padding:7px 15px;border-width:2px;border-style:solid;border-radius:8px;font-weight:600;font-size:18px;height:39px;width:200px;line-height:1.2;filter:drop-shadow(0px 0px 15px rgba(26, 19, 72, 0.25));font-family:Poppins, Arial, sans-serif;white-space:nowrap;overflow:hidden;text-overflow:ellipsis;cursor:pointer;background:#e61e61;border-color:#FFFFFF;color:#FFFFFF\" onclick=\"Storylane.Play({type: 'popup', demo_type: 'image', width: 1264, height: 866, scale: '0.95', demo_url: 'https:\/\/app.storylane.io\/demo\/yiwoscwykbo9', padding_bottom: 'calc(68.51% + 27px)'})\">Interaktive Demo<\/button>\n      <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-76759bdb\" data-id=\"76759bdb\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a58d99 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"1a58d99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">KI-ANALYSE NUTZEN <\/span><span class=\"premium-dual-header-second-header \">KI-gest\u00fctzte Anomalie-Erkennung<\/span><\/h3> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f92c73b elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"f92c73b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Vergleich historischer Datenstr\u00f6me mit aktuellen Aktivit\u00e4ten in beinahe Echtzeit <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Erkennung von zeitreihenbasierten Mustern und Anomalien, die auf potenzielle Sicherheitsrisiken hindeuten k\u00f6nnen<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Messbare Verk\u00fcrzung der Zeit zwischen der Erkennung und Behebung von Sicherheitsvorf\u00e4llen<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4b606218 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4b606218\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-34280234\" data-id=\"34280234\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8e05140 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"8e05140\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">ANGRIFFSABWEHR VEREINFACHEN <\/span><span class=\"premium-dual-header-second-header \">Automatisierte Security Orchestration (SOAR)<\/span><\/h3> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8b91ae elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a8b91ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Event-Streams nach Bedarf filtern und ma\u00dfgeschneiderte Bedingungen f\u00fcr die Risikoklassifizierung hinzuf\u00fcgen <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Mit wenigen Klicks benutzerdefinierte Playbooks erstellen und so automatisiert auf bestimmte Angriffsszenarien reagieren (Beta)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Eigene KI-Prompts schreiben, um sicherheitsrelevante Aktivit\u00e4ten gezielt analysieren zu lassen (Beta)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-523b28cc\" data-id=\"523b28cc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a74bb6d elementor-widget elementor-widget-image\" data-id=\"a74bb6d\" data-element_type=\"widget\" data-e-type=\"widget\" alt=\"Schwachstellen und Sicherheitsl\u00fccken im Dashboard anzeigen\" title=\"Schwachstellen und Sicherheitsl\u00fccken im Dashboard anzeigen\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"479\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_Playbook-1024x613.png\" class=\"attachment-large size-large wp-image-36484\" alt=\"Enginsight SIEM \u2013 Automatisierte Security Orchestration (SOAR) mit Playbooks\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_Playbook-1024x613.png 1024w, https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_Playbook-300x179.png 300w, https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_Playbook-768x459.png 768w, https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_Playbook.png 1359w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24ce49a elementor-widget elementor-widget-html\" data-id=\"24ce49a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div>\n        <script src=\"https:\/\/js.storylane.io\/js\/v1\/storylane.js\"><\/script>\n        <button style=\"z-index:999999;padding:7px 15px;border-width:2px;border-style:solid;border-radius:8px;font-weight:600;font-size:18px;height:39px;width:200px;line-height:1.2;filter:drop-shadow(0px 0px 15px rgba(26, 19, 72, 0.25));font-family:Poppins, Arial, sans-serif;white-space:nowrap;overflow:hidden;text-overflow:ellipsis;cursor:pointer;background:#e61e61;border-color:#FFFFFF;color:#FFFFFF\" onclick=\"Storylane.Play({type: 'popup', demo_type: 'image', width: 1264, height: 864, scale: '0.95', demo_url: 'https:\/\/app.storylane.io\/demo\/bmpml4o65p4e', padding_bottom: 'calc(68.35% + 27px)'})\">Interaktive Demo<\/button>\n      <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9c969d3 elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9c969d3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0d7c06e\" data-id=\"0d7c06e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-155d07d elementor-widget elementor-widget-image\" data-id=\"155d07d\" data-element_type=\"widget\" data-e-type=\"widget\" alt=\"CVE Schwachstellen finden und fixen\" title=\"CVE Schwachstellen finden und fixen\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"480\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_Dashboard-1024x615.png\" class=\"attachment-large size-large wp-image-36485\" alt=\"Enginsight SIEM \u2013 Benutzerspezifische Dashboards\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_Dashboard-1024x615.png 1024w, https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_Dashboard-300x180.png 300w, https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_Dashboard-768x461.png 768w, https:\/\/enginsight.com\/wp-content\/uploads\/Screenshot_SIEM_Dashboard.png 1357w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb0cc57 elementor-widget elementor-widget-html\" data-id=\"eb0cc57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div>\n        <script src=\"https:\/\/js.storylane.io\/js\/v1\/storylane.js\"><\/script>\n        <button style=\"z-index:999999;padding:7px 15px;border-width:2px;border-style:solid;border-radius:8px;font-weight:600;font-size:18px;height:39px;width:200px;line-height:1.2;filter:drop-shadow(0px 0px 15px rgba(26, 19, 72, 0.25));font-family:Poppins, Arial, sans-serif;white-space:nowrap;overflow:hidden;text-overflow:ellipsis;cursor:pointer;background:#e61e61;border-color:#FFFFFF;color:#FFFFFF\" onclick=\"Storylane.Play({type: 'popup', demo_type: 'image', width: 1264, height: 866, scale: '0.95', demo_url: 'https:\/\/app.storylane.io\/demo\/yiwoscwykbo9', padding_bottom: 'calc(68.51% + 27px)'})\">Interaktive Demo<\/button>\n      <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-498b2fc\" data-id=\"498b2fc\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4d8503 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"a4d8503\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">LIVE-\u00dcBERSICHTEN ERSTELLEN <\/span><span class=\"premium-dual-header-second-header \">Benutzerspezifische Dashboards<\/span><\/h3> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da4ea1f elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"da4ea1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Individuelle Ansichten bestimmter Daten oder Events aus Ihren Logs mithilfe vordefinierter Widgets gestalten<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Mehrere Dashboards f\u00fcr unterschiedliche Szenarien erstellen und anzeigen lassen<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">\tLinien- Balken, Kreisdiagramme und Weltkarten auch im Darkmode f\u00fcr Ihr Security Operation Center nutzen<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b31b6d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1b31b6d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-455147d\" data-id=\"455147d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4d1d9f premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"a4d1d9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">COMPLIANCE UND REGULATORISCHE ANFORDERUNGEN EINHALTEN <\/span><span class=\"premium-dual-header-second-header \">Umfassendes Risikomanagement f\u00fcr Ihr Unternehmen mit der Enginsight SIEM Software<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7906bbc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7906bbc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-20e77ac\" data-id=\"20e77ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd2bd85 elementor-widget elementor-widget-image\" data-id=\"dd2bd85\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"537\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/Cyberwar-fighter-enginsight-2.jpg\" class=\"attachment-full size-full wp-image-23791\" alt=\"Cyberwar-fighter-enginsight\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/Cyberwar-fighter-enginsight-2.jpg 800w, https:\/\/enginsight.com\/wp-content\/uploads\/Cyberwar-fighter-enginsight-2-300x201.jpg 300w, https:\/\/enginsight.com\/wp-content\/uploads\/Cyberwar-fighter-enginsight-2-768x516.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25c4a7f elementor-widget elementor-widget-heading\" data-id=\"25c4a7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Compliance gewahrt<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b6fab2 elementor-widget elementor-widget-text-editor\" data-id=\"4b6fab2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\">Erkennen und beheben Sie m\u00f6gliche Bedrohungen und tats\u00e4chliche Sicherheitsvorf\u00e4lle in beinahe Echtzeit. Mit unserem SIEM-System behalten Sie jederzeit den vollen Durchblick und tragen so ma\u00dfgeblich dazu bei, die Sicherheitsrichtlinien Ihres Unternehmens zu wahren.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-bdc8f9a\" data-id=\"bdc8f9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f86d734 elementor-widget elementor-widget-image\" data-id=\"f86d734\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"556\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/enginsight-dsgvo-konform.jpg\" class=\"attachment-full size-full wp-image-24607\" alt=\"enginsight-dsgvo-konform\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/enginsight-dsgvo-konform.jpg 800w, https:\/\/enginsight.com\/wp-content\/uploads\/enginsight-dsgvo-konform-300x209.jpg 300w, https:\/\/enginsight.com\/wp-content\/uploads\/enginsight-dsgvo-konform-768x534.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b07404 elementor-widget elementor-widget-heading\" data-id=\"7b07404\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">EU-DSGVO konform<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc377c0 elementor-widget elementor-widget-text-editor\" data-id=\"dc377c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\">Sch\u00fctzen Sie sensible Daten in Ihren Logs durch Obfuskation (Verschleierung) und definieren Sie Zust\u00e4ndigkeiten und individuelle Nutzerrechte. So stellen Sie sicher, dass sch\u00fctzenswerte Daten auch wirklich nur nach dem Need-to-Know-Prinzip zug\u00e4nglich sind.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-1cd31b7\" data-id=\"1cd31b7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a3c228c elementor-widget elementor-widget-image\" data-id=\"a3c228c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"556\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/Enginsight-Normen-Security-1.jpg\" class=\"attachment-large size-large wp-image-24602\" alt=\"Enginsight-Normen-Security\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/Enginsight-Normen-Security-1.jpg 800w, https:\/\/enginsight.com\/wp-content\/uploads\/Enginsight-Normen-Security-1-300x209.jpg 300w, https:\/\/enginsight.com\/wp-content\/uploads\/Enginsight-Normen-Security-1-768x534.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9c6b62 elementor-widget elementor-widget-heading\" data-id=\"a9c6b62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">KRITIS und NIS2-ready<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09cac80 elementor-widget elementor-widget-text-editor\" data-id=\"09cac80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\">Identify, Attack, Detect, React und Improve: Mit der All-in-One Security-Plattform von Enginsight erf\u00fcllen Sie gesetzliche und branchenspezifische Normen wie die technischen Cybersecurity-Anforderungen f\u00fcr KRITIS \u2013 und zuk\u00fcnftig auch NIS2 \u2013 schon heute.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-758a549b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"758a549b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-43aa3684\" data-id=\"43aa3684\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-703358f1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"703358f1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-47428efb\" data-id=\"47428efb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7dd95f0 elementor-widget elementor-widget-heading\" data-id=\"7dd95f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Fortlaufende \u00dcberwachung und Dokumentation Ihrer IT-Sicherheit.<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-481c1d86\" data-id=\"481c1d86\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-31e8e248 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"31e8e248\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\">Enginsight kombiniert die wichtigsten Security-Funktionen wie z. B. Schwachstellenmanagement, Intrusion Detection, Datenintegrit\u00e4tsmonitoring oder Mikrosegmentierung mit den Funktionen eines SIEM-Systems. Damit schaffen wir nicht nur reaktive Logs, sondern proaktive IT-Sicherheit f\u00fcr alle IT-Umgebungen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-613cfc6b\" data-id=\"613cfc6b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-215415ea elementor-widget elementor-widget-image\" data-id=\"215415ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/made-in-germany-enginsight-1-q0quox5caqcf4tmqfjum7o1lb6c6kr8877smn0rsh4.png\" title=\"made-in-germany-enginsight\" alt=\"made-in-germany-enginsight\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e2800d6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2e2800d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7d2d9d8b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7d2d9d8b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-7571c80e\" data-id=\"7571c80e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-23585963 elementor-widget elementor-widget-image-carousel\" data-id=\"23585963\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;4&quot;,&quot;navigation&quot;:&quot;none&quot;,&quot;lazyload&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;no&quot;,&quot;pause_on_interaction&quot;:&quot;no&quot;,&quot;autoplay_speed&quot;:0,&quot;speed&quot;:10000,&quot;autoplay&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Bild Karussell\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/ZapfCreation-sw-1-q094tsonfus5sokb027hqfs8bt79dwl2xaszo56134.png\" alt=\"ZapfCreation-sw\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/G-DATA-Logo-TIGS-2017-RGB-pwdtje60w4w3cy3jjnmft7c5795ouezzvrw57b1szk.jpg\" alt=\"G DATA Logo\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/Logo_Teilnehmer_Web-200x83xc-pct68u26be1yvetevoin98h7fcwr2zqt3rxdx18nwg.png\" alt=\"Allianz_fuer_Cybersicherheit_Enginsight\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/402px-Logo_TSG_Hoffenheim.svg-q9cihbab4cxicz309g1m8gy9j7r3dtqitqbg6prncw.png\" alt=\"Logo der TSG Hoffenheim\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/schaefer-holding-logo-2-q4y2lklcscaz3kij4pnp9qm9gj79gm72wdfu1n1s74.jpg\" alt=\"schaefer-holding--logo\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/TuevIT-q9cjpvst6jxyvccd07lryq23jy2nd5obybxae1ombk.png\" alt=\"TuevIT\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/Bildungsministerium-q0947e74k045393rtdllb3aqn7mbxlnduf2dwqdtds.jpg\" alt=\"Bildungsministerium\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/lvv-orvd89v9ad0zrxv9vpg3t9im4r5jf672cjj4auvx8g.jpg\" alt=\"lvv\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/langeoog-orvdagtp8g12v6ol2nkrmplc14cddqwinebwm3mups.jpg\" alt=\"langeoog\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 von 10\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/hanseyachts-orvd9rg23x2c5ppg6ulu9dzvzptglx3rjwpsnmohds.jpg\" alt=\"hanseyachts\" \/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a9f4d9b elementor-widget elementor-widget-spacer\" data-id=\"4a9f4d9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-64caba94 elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"64caba94\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ccf4adb\" data-id=\"ccf4adb\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2dacb2eb elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"2dacb2eb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6440a870\" data-id=\"6440a870\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2006b277 premium-video__glow-none elementor-widget elementor-widget-premium-addon-video-box\" data-id=\"2006b277\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_video_box_video_type&quot;:&quot;youtube&quot;,&quot;aspect_ratio&quot;:&quot;169&quot;,&quot;video_lightbox_style&quot;:&quot;elementor&quot;}\" data-widget_type=\"premium-addon-video-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t\t\n\t\t\t\t\t<div data-lightbox=\"{&quot;type&quot;:&quot;elementor&quot;}\" id=\"premium-video-box-container-2006b277\" class=\"premium-video-box-container\" data-overlay=\"true\" data-type=\"youtube\" data-thumbnail=\"1\" data-hover=\"zoomin\">\n\t\t\t\t<div  >\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"premium-video-box-inner-wrap\" data-video-animation=\" animated-\" data-delay-animation=\"\">\n\t\t\t\t\t\t<div data-elementor-open-lightbox=\"yes\" data-elementor-lightbox=\"{&quot;type&quot;:&quot;video&quot;,&quot;videoType&quot;:&quot;youtube&quot;,&quot;url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/embed\\\/Im3CS_4g8tA?feature=oembed&amp;rel=0&amp;mute=0&amp;loop=0&amp;controls=1&amp;playsinline=0&amp;cc_load_policy=0&quot;,&quot;modalOptions&quot;:{&quot;id&quot;:&quot;elementor-lightbox-2006b277&quot;,&quot;entranceAnimation&quot;:&quot;&quot;,&quot;entranceAnimation_tablet&quot;:&quot;&quot;,&quot;entranceAnimation_mobile&quot;:&quot;&quot;,&quot;videoAspectRatio&quot;:&quot;169&quot;}}\" class=\"premium-video-box-video-container\">\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div style=\"background-image:url(&#039;https:\/\/enginsight.com\/wp-content\/uploads\/enginsight-partnerevent-2023.jpg&#039;)\" class=\"premium-video-box-image-container zoomin\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-video-box-play-icon-container\">\n\t\t\t\t\t\t\t\t<i class=\"premium-video-box-play-icon fas fa-play\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-video-box-description-container\">\n\t\t\t\t\t\t\t\t<p class=\"premium-video-box-text\">\n\t\t\t\t\t\t\t\t\t<span >\n\t\t\t\t\t\t\t\t\t\tReferenzvideo\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-inner-column elementor-element elementor-element-2f32f480\" data-id=\"2f32f480\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-deee0ac elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default\" data-id=\"deee0ac\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-670055af\" data-id=\"670055af\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3eb3cf10 elementor-widget elementor-widget-text-editor\" data-id=\"3eb3cf10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div data-id=\"2227ecd9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<h2>Machen Sie IT-Security zu einem Teil Ihrer DNA<\/h2>\n<\/div>\n<div data-id=\"7504f8e0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div><span style=\"color: #e91e63;\">ES GEHT NICHT NUR UM IT-SICHERHEIT, SONDERN UM BETRIEBSF\u00c4HIGKEIT UND AUSFALLSICHERHEIT<\/span><\/div>\n<div><span>F\u00fcr ein effektives Risikomanagement braucht es eine kontinuierliche Zustandskontrolle in Kombination mit pr\u00e4ventiven Ma\u00dfnahmen sowie eine Datengrundlage f\u00fcr forensische Analysen.<\/span>\n\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e062d2a elementor-section-height-min-height elementor-section-boxed elementor-section-height-default\" data-id=\"e062d2a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5776d01d\" data-id=\"5776d01d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4621ea39 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default\" data-id=\"4621ea39\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2786a6e5\" data-id=\"2786a6e5\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-70eac18 elementor-widget elementor-widget-counter\" data-id=\"70eac18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">abgesicherte Systeme durch Enginsight im deutschen Mittelstand und \u00f6ffentlichen Sektor<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\">&gt;<\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"20000\" data-from-value=\"0\" data-delimiter=\".\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\"><\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-inner-column elementor-element elementor-element-2b0323c8\" data-id=\"2b0323c8\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-15954fb0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"15954fb0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2a7b2b7b\" data-id=\"2a7b2b7b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-64234815 elementor--star-style-star_fontawesome elementor-widget elementor-widget-reviews\" data-id=\"64234815\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;slides_per_view&quot;:&quot;1&quot;,&quot;speed&quot;:500,&quot;space_between&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]}}\" data-widget_type=\"reviews.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t\t\t<div class=\"elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Slider\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-fd13e6e\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial__header\">\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">Sch\u00e4fer Holding GmbH<\/span><div class=\"elementor-star-rating\"><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><\/div><span class=\"elementor-testimonial__title\">Marcel Pasternak, Prozessmanager<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\" aria-label=\"Weiterlesen\"><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__content\">\n\t\t\t\t\t<div class=\"elementor-testimonial__text\">\n\t\t\t\t\t\t\"Enginsight rettete unsere TISAX-Zertifizierung.\"\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-a1bf9aa\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial__header\">\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">S\u00f6mmerdaer Energieversorgung GmbH<\/span><div class=\"elementor-star-rating\"><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><\/div><span class=\"elementor-testimonial__title\">Mario Haller, Administrator<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\" aria-label=\"Weiterlesen\"><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__content\">\n\t\t\t\t\t<div class=\"elementor-testimonial__text\">\n\t\t\t\t\t\t\u201eIm Tagesgesch\u00e4ft besteht immer die Gefahr, dass Ereignisse oder Sicherheitsl\u00fccken durchrutschen, weil wir in der IT-Abteilung nicht die Zeit haben, die Systeme manuell bis in die Tiefe zu untersuchen. Mit Enginsight habe ich eine Ampel, die mir sagt: Vorsicht, da ist was! Und dann kann ich mich drum k\u00fcmmern. F\u00fcr mich ist Enginsight deshalb zu einem Leitsystem geworden, das mir \u00fcber die Stra\u00dfe hilft.\u201c\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-5f60aa7\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial__header\">\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\"> ISO Schmiede GmbH<\/span><div class=\"elementor-star-rating\"><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><\/div><span class=\"elementor-testimonial__title\">Steven L\u00f6ffler, Externer Auditor<\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\" aria-label=\"Weiterlesen\"><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__content\">\n\t\t\t\t\t<div class=\"elementor-testimonial__text\">\n\t\t\t\t\t\t\u201eBei der Implementierung und dem weiteren Betrieb eines Managementsystems nimmt Enginsight einen gro\u00dfen Stellenwert ein. Die L\u00f6sung der Enginsight im Bereich Pentesting bietet eine zielf\u00fchrende M\u00f6glichkeit, Schwachstellen fr\u00fchzeitig zu erkennen und entsprechende Gefahren im Keim ersticken zu k\u00f6nnen.\"\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial elementor-repeater-item-e9aa4a3\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial__header\">\n\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">MVS Wilke<\/span><div class=\"elementor-star-rating\"><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><i class=\"elementor-star-full\">&#xE934;<\/i><\/div><span class=\"elementor-testimonial__title\">Klaus Wilke, Gesch\u00e4ftsf\u00fchrer <\/span><\/cite>\t\t\t\t\t<div class=\"elementor-testimonial__icon elementor-icon elementor-icon-\" aria-label=\"Weiterlesen\"><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__content\">\n\t\t\t\t\t<div class=\"elementor-testimonial__text\">\n\t\t\t\t\t\t\u201eEnginsight ist einfach die sympathischste L\u00f6sung zur Angriffserkennung und -abwehr. Ich war von Anfang an begeistert davon. Intuitiv bedienbar, ressourcenschonend durch Automationen und managementtauglich reportbar, macht die Software einfach alle gl\u00fccklich: IT-Admins, Gesch\u00e4ftsf\u00fchrer und Auditoren. Love it.\u201c\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-feb4e97 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"feb4e97\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2a3886d\" data-id=\"2a3886d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2fb4e78d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"2fb4e78d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-56356a82\" data-id=\"56356a82\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7d539769 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7d539769\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-38d357f3\" data-id=\"38d357f3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-554a3be1 elementor-widget elementor-widget-image\" data-id=\"554a3be1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"795\" height=\"1024\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-795x1024.png\" class=\"attachment-large size-large wp-image-21749\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-795x1024.png 795w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-233x300.png 233w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-768x989.png 768w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-1193x1536.png 1193w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-1590x2048.png 1590w\" sizes=\"(max-width: 795px) 100vw, 795px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Mario Jandeck, CEO Enginsight GmbH<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b37916c elementor-widget elementor-widget-html\" data-id=\"b37916c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- ProvenExpert Bewertungssiegel -->\r\n<a href=\"https:\/\/www.provenexpert.com\/enginsight\/?utm_source=Widget&amp;utm_medium=Widget&amp;utm_campaign=Widget\" title=\"Kundenbewertungen &amp; Erfahrungen zu Enginsight. Mehr Infos anzeigen.\" target=\"_blank\" style=\"text-decoration:none;\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/images.provenexpert.com\/73\/1e\/036d71c53e8e46a6fca13e08d3e4\/widget_square_190_de_0.png\" alt=\"Erfahrungen &amp; Bewertungen zu Enginsight\" width=\"190\" height=\"190\" style=\"border:0\" \/><\/a>\r\n<!-- ProvenExpert Bewertungssiegel -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1d0f061f\" data-id=\"1d0f061f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4825a74c elementor-widget elementor-widget-heading\" data-id=\"4825a74c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">FAQ zum SIEM von Enginsight<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d157ca elementor-widget elementor-widget-toggle\" data-id=\"8d157ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1471\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1471\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Was ist das Enginsight SIEM?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1471\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1471\"><p style=\"font-weight: 400;\">Das Enginsight SIEM (Security Information and Event Management) ist Teil der Enginsight Security Plattform. Es ist eine leistungsstarke Softwarel\u00f6sung, die umfassende Sicherheitsinformationen aus verschiedenen Quellen sammelt, analysiert und in Echtzeit oder historisch darstellt.<\/p><p style=\"font-weight: 400;\">Von der Erfassung von Log-Daten bis hin zur KI-gest\u00fctzten Erkennung verd\u00e4chtiger Aktivit\u00e4ten erm\u00f6glicht Ihnen das SIEM eine proaktive Herangehensweise an Sicherheits\u00fcberwachung und -management.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1472\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1472\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Was kostet das SIEM von Enginsight?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1472\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1472\"><p style=\"font-weight: 400;\">Die SIEM-Software ist ein Add-on zu Ihrer bestehenden Enginsight-Lizenz. Voraussetzung ist die aktive Nutzung einer On-Premises-Installation von Enginsight. F\u00fcr den \u00f6ffentlichen Bereich (KRITIS, Public-Sektor) gelten gesonderte Bestimmungen.<\/p><p><span style=\"font-weight: 400;\">Sprechen Sie uns gerne f\u00fcr ein individuelles Angebot an.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1473\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1473\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Welche technischen Anforderungen hat das Enginsight SIEM?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1473\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1473\"><p style=\"font-weight: 400;\">In unserer <a href=\"https:\/\/docs.enginsight.com\/docs\/on-premises\/installationsanleitung\/siem\">Dokumentation<\/a> finden Sie alle Systemanforderungen an das SIEM-System inklusive einer ausf\u00fchrlichen Installationsanleitung.<\/p><p><span style=\"font-weight: 400;\">Gerne \u00fcbernehmen wir oder unsere erfahrenen Partner die Installation und Einrichtung. Sprechen Sie uns einfach an.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1474\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1474\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Kann ich meine Third-Party-Systeme ans Enginsight SIEM-System anbinden?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1474\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1474\"><p style=\"font-weight: 400;\">Ja! Viele Third-Party-Systeme, z.B. Firewalls verschiedener Hersteller, sind bereits automatisch als Datenquelle an unser SIEM angebunden. So k\u00f6nnen Sie direkt mit der Loganalyse loslegen.<\/p><p style=\"font-weight: 400;\">Sollte Ihre Appliance noch nicht dazugeh\u00f6ren, sprechen Sie uns einfach an \u2013 wir helfen Ihnen gerne dabei, Ihre Datenquellen ins Enginsight SIEM zu integrieren.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1475\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1475\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Setzt das Enginsight SIEM KI ein?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1475\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1475\"><p style=\"font-weight: 400;\">Ja, unser SIEM nutzt auch KI-gest\u00fctzte Aktionen und Machine Learning, um automatisiert zeitreihenbasierte Muster und Anomalien in Ereignis-Streams zu erkennen und entsprechende Alarme auszul\u00f6sen.<\/p><p style=\"font-weight: 400;\">Im Kontext der Enginsight Playbooks unterst\u00fctzen KI-Modelle die zielgerichtete Analyse und Filterung von Logs. Zudem k\u00f6nnen Sie sich mithilfe selbst verfasster Prompts beispielsweise Zusammenfassungen des entsprechenden kritischen Ereignisses geben lassen oder Bedingungen f\u00fcr bestimmte Reaktionen definieren (Beta).<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1476\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1476\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Was sind Playbooks bei Enginsight?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1476\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1476\"><p style=\"font-weight: 400;\">Playbooks sind Teil des Security Orchestration, Automation, and Response (SOAR)-Features unseres SIEM. Sie helfen Ihnen, automatisch auf kritische Sicherheitsereignisse zu reagieren, indem sie die Filterung von Logs automatisieren, relevante Daten strukturieren und die pr\u00e4zise Steuerung auch komplexer Reaktionsprozesse erm\u00f6glichen.<\/p><p style=\"font-weight: 400;\">Jedes Playbook wird visuell als Flussdiagramm dargestellt\u2026<\/p><ul><li>\u2026 mit einem klar definierten Startpunkt (ein spezifisches Sicherheitsereignis wie z.B. ein Brute-Force-Angriff),<\/li><li>\u2026 bestimmten Bedingungen, die zutreffen m\u00fcssen, um dazugeh\u00f6rige Reaktionen auszul\u00f6sen (erfolgt der Angriff beispielsweise auf ein Testsystem oder auf ein Produktivsystem?),<\/li><li>\u2026 und den Reaktionen selbst (z.B. das Versenden einer Benachrichtigung an den jeweils Verantwortlichen).<\/li><\/ul><p style=\"font-weight: 400;\">So stellen Playbooks sicher, dass sicherheitsrelevante Ereignisse nicht nur erkannt werden, sondern auch zielgerichtet darauf reagiert wird.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1477\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-1477\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Was macht ein SIEM-System? <\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1477\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-1477\"><p style=\"font-weight: 400;\">Ein SIEM-System sammelt Log- und Event-Daten aus den verschiedensten Quellen innerhalb einer Netzwerkinfrastruktur, einschlie\u00dflich Server, Ger\u00e4te und Anwendungen. Durch die Integration von Kontextinformationen \u00fcber Benutzer oder Assets erm\u00f6glicht eine SIEM-L\u00f6sung einen ganzheitlichen \u00dcberblick \u00fcber das, was im Netzwerk passiert.<\/p><p style=\"font-weight: 400;\">Die gesammelten Daten werden durch das SIEM-System konsolidiert und einer eingehenden Analyse unterzogen. So k\u00f6nnen Abweichungen von der Norm identifiziert und m\u00f6gliche Cyberangriffe proaktiv entdeckt und abgewehrt werden.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1478\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-1478\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Warum ein SIEM-System? <\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1478\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-1478\"><p style=\"font-weight: 400;\">Die Notwendigkeit eines SIEM-Systems ergibt sich aus der F\u00e4higkeit, Muster und anomales Verhalten zu erkennen. Selbst wenn ein einzelnes Ereignis noch keine Alarmglocken ausl\u00f6st, kann das SIEM-Tool durch die Korrelation mehrerer Ereignisse, die ansonsten unbemerkt bleiben w\u00fcrden, potenzielle Bedrohungen aufdecken.<\/p><p style=\"font-weight: 400;\">Das System ist darauf ausgelegt, eine umfassende Sicherheitsanalyse durchzuf\u00fchren und bei Bedarf entsprechende Benachrichtigungen auszul\u00f6sen.<\/p><p style=\"font-weight: 400;\">Auch die Einhaltung von Compliance-Anforderungen eines Unternehmens kann mithilfe eines SIEM-Systems \u00fcberpr\u00fcft und mittels Logging und Berichterstellung nachgewiesen werden.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"Was ist das Enginsight SIEM?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p style=\\\"font-weight: 400;\\\">Das Enginsight SIEM (Security Information and Event Management) ist Teil der Enginsight Security Plattform. Es ist eine leistungsstarke Softwarel\\u00f6sung, die umfassende Sicherheitsinformationen aus verschiedenen Quellen sammelt, analysiert und in Echtzeit oder historisch darstellt.<\\\/p><p style=\\\"font-weight: 400;\\\">Von der Erfassung von Log-Daten bis hin zur KI-gest\\u00fctzten Erkennung verd\\u00e4chtiger Aktivit\\u00e4ten erm\\u00f6glicht Ihnen das SIEM eine proaktive Herangehensweise an Sicherheits\\u00fcberwachung und -management.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Was kostet das SIEM von Enginsight?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p style=\\\"font-weight: 400;\\\">Die SIEM-Software ist ein Add-on zu Ihrer bestehenden Enginsight-Lizenz. Voraussetzung ist die aktive Nutzung einer On-Premises-Installation von Enginsight. F\\u00fcr den \\u00f6ffentlichen Bereich (KRITIS, Public-Sektor) gelten gesonderte Bestimmungen.<\\\/p><p><span style=\\\"font-weight: 400;\\\">Sprechen Sie uns gerne f\\u00fcr ein individuelles Angebot an.<\\\/span><\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Welche technischen Anforderungen hat das Enginsight SIEM?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p style=\\\"font-weight: 400;\\\">In unserer <a href=\\\"https:\\\/\\\/docs.enginsight.com\\\/docs\\\/on-premises\\\/installationsanleitung\\\/siem\\\">Dokumentation<\\\/a> finden Sie alle Systemanforderungen an das SIEM-System inklusive einer ausf\\u00fchrlichen Installationsanleitung.<\\\/p><p><span style=\\\"font-weight: 400;\\\">Gerne \\u00fcbernehmen wir oder unsere erfahrenen Partner die Installation und Einrichtung. Sprechen Sie uns einfach an.<\\\/span><\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Kann ich meine Third-Party-Systeme ans Enginsight SIEM-System anbinden?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p style=\\\"font-weight: 400;\\\">Ja! Viele Third-Party-Systeme, z.B. Firewalls verschiedener Hersteller, sind bereits automatisch als Datenquelle an unser SIEM angebunden. So k\\u00f6nnen Sie direkt mit der Loganalyse loslegen.<\\\/p><p style=\\\"font-weight: 400;\\\">Sollte Ihre Appliance noch nicht dazugeh\\u00f6ren, sprechen Sie uns einfach an \\u2013 wir helfen Ihnen gerne dabei, Ihre Datenquellen ins Enginsight SIEM zu integrieren.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Setzt das Enginsight SIEM KI ein?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p style=\\\"font-weight: 400;\\\">Ja, unser SIEM nutzt auch KI-gest\\u00fctzte Aktionen und Machine Learning, um automatisiert zeitreihenbasierte Muster und Anomalien in Ereignis-Streams zu erkennen und entsprechende Alarme auszul\\u00f6sen.<\\\/p><p style=\\\"font-weight: 400;\\\">Im Kontext der Enginsight Playbooks unterst\\u00fctzen KI-Modelle die zielgerichtete Analyse und Filterung von Logs. Zudem k\\u00f6nnen Sie sich mithilfe selbst verfasster Prompts beispielsweise Zusammenfassungen des entsprechenden kritischen Ereignisses geben lassen oder Bedingungen f\\u00fcr bestimmte Reaktionen definieren (Beta).<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Was sind Playbooks bei Enginsight?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p style=\\\"font-weight: 400;\\\">Playbooks sind Teil des Security Orchestration, Automation, and Response (SOAR)-Features unseres SIEM. Sie helfen Ihnen, automatisch auf kritische Sicherheitsereignisse zu reagieren, indem sie die Filterung von Logs automatisieren, relevante Daten strukturieren und die pr\\u00e4zise Steuerung auch komplexer Reaktionsprozesse erm\\u00f6glichen.<\\\/p><p style=\\\"font-weight: 400;\\\">Jedes Playbook wird visuell als Flussdiagramm dargestellt\\u2026<\\\/p><ul><li>\\u2026 mit einem klar definierten Startpunkt (ein spezifisches Sicherheitsereignis wie z.B. ein Brute-Force-Angriff),<\\\/li><li>\\u2026 bestimmten Bedingungen, die zutreffen m\\u00fcssen, um dazugeh\\u00f6rige Reaktionen auszul\\u00f6sen (erfolgt der Angriff beispielsweise auf ein Testsystem oder auf ein Produktivsystem?),<\\\/li><li>\\u2026 und den Reaktionen selbst (z.B. das Versenden einer Benachrichtigung an den jeweils Verantwortlichen).<\\\/li><\\\/ul><p style=\\\"font-weight: 400;\\\">So stellen Playbooks sicher, dass sicherheitsrelevante Ereignisse nicht nur erkannt werden, sondern auch zielgerichtet darauf reagiert wird.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Was macht ein SIEM-System?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p style=\\\"font-weight: 400;\\\">Ein SIEM-System sammelt Log- und Event-Daten aus den verschiedensten Quellen innerhalb einer Netzwerkinfrastruktur, einschlie\\u00dflich Server, Ger\\u00e4te und Anwendungen. Durch die Integration von Kontextinformationen \\u00fcber Benutzer oder Assets erm\\u00f6glicht eine SIEM-L\\u00f6sung einen ganzheitlichen \\u00dcberblick \\u00fcber das, was im Netzwerk passiert.<\\\/p><p style=\\\"font-weight: 400;\\\">Die gesammelten Daten werden durch das SIEM-System konsolidiert und einer eingehenden Analyse unterzogen. So k\\u00f6nnen Abweichungen von der Norm identifiziert und m\\u00f6gliche Cyberangriffe proaktiv entdeckt und abgewehrt werden.<\\\/p>\"}},{\"@type\":\"Question\",\"name\":\"Warum ein SIEM-System?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<p style=\\\"font-weight: 400;\\\">Die Notwendigkeit eines SIEM-Systems ergibt sich aus der F\\u00e4higkeit, Muster und anomales Verhalten zu erkennen. Selbst wenn ein einzelnes Ereignis noch keine Alarmglocken ausl\\u00f6st, kann das SIEM-Tool durch die Korrelation mehrerer Ereignisse, die ansonsten unbemerkt bleiben w\\u00fcrden, potenzielle Bedrohungen aufdecken.<\\\/p><p style=\\\"font-weight: 400;\\\">Das System ist darauf ausgelegt, eine umfassende Sicherheitsanalyse durchzuf\\u00fchren und bei Bedarf entsprechende Benachrichtigungen auszul\\u00f6sen.<\\\/p><p style=\\\"font-weight: 400;\\\">Auch die Einhaltung von Compliance-Anforderungen eines Unternehmens kann mithilfe eines SIEM-Systems \\u00fcberpr\\u00fcft und mittels Logging und Berichterstellung nachgewiesen werden.<\\\/p>\"}}]}<\/script>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-41ce48b elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"41ce48b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9b4c35c\" data-id=\"9b4c35c\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7310e44 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"7310e44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\"> <\/span><span class=\"premium-dual-header-second-header \">Unsichtbares sichtbar, Unsicheres sicher machen &#x2013; gemeinsam<\/span><\/h2> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42aebfd8 elementor-widget elementor-widget-text-editor\" data-id=\"42aebfd8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\">Sie m&#xF6;chten wissen, wie Sie Ihre IT-Sicherheit mit Enginsight verbessern k&#xF6;nnen?<\/p><p style=\"font-weight: 400;\">Gerne analysieren wir gemeinsam mit Ihnen den aktuellen Stand Ihrer Cybersecurity-Ma&#xDF;nahmen. So k&#xF6;nnen wir ermitteln, wo Sie noch Bedarf haben, um Ihre Unternehmens-IT Schritt f&#xFC;r Schritt sicherer zu machen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4e05268 elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4e05268\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-f311c69\" data-id=\"f311c69\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-e4e695e\" data-id=\"e4e695e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a87ed1b elementor-align-center elementor-mobile-align-center elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-button\" data-id=\"a87ed1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/enginsight.com\/de\/demo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Beratungstermin vereinbaren<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-1356e04\" data-id=\"1356e04\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>SECURITY INFORMATION AND EVENT MANAGEMENT SIEM-System von Enginsight Ihre SIEMphonie zum Schutz vor Cyberangriffen Aktive Sicherheit statt nur reaktives Logging: Wie bei einer guten Symphonie spielen im Enginsight SIEM verschiedene Softwarekomponenten zusammen, um Ihnen Angriffserkennung und-behebung in beinahe Echtzeit zu erm&#xF6;glichen &#x2013; &#xFC;ber alle Datenquellen hinweg. Termin anfragen Ihr SIEM Tool f&#xFC;r Angriffserkennung und -abwehr [&#x2026;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","_eb_attr":"","footnotes":""},"class_list":["post-24542","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/enginsight.com\/de\/wp-json\/wp\/v2\/pages\/24542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enginsight.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/enginsight.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/enginsight.com\/de\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/enginsight.com\/de\/wp-json\/wp\/v2\/comments?post=24542"}],"version-history":[{"count":0,"href":"https:\/\/enginsight.com\/de\/wp-json\/wp\/v2\/pages\/24542\/revisions"}],"wp:attachment":[{"href":"https:\/\/enginsight.com\/de\/wp-json\/wp\/v2\/media?parent=24542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}