{"id":431,"date":"2018-01-23T15:02:09","date_gmt":"2018-01-23T14:02:09","guid":{"rendered":"http:\/\/knowlitge.de\/?page_id=431"},"modified":"2018-02-08T15:33:30","modified_gmt":"2018-02-08T14:33:30","slug":"it-sicherheit","status":"publish","type":"page","link":"https:\/\/knowlitge.de\/de\/it-sicherheit\/","title":{"rendered":"IT-Sicherheit"},"content":{"rendered":"<div class=\"content_block\" id=\"custom_post_widget-1034\"><div  class=\"lgc-column lgc-grid-parent lgc-grid-20 lgc-tablet-grid-20 lgc-mobile-grid-100 lgc-equal-heights \"><div  class=\"inside-grid-column\">\n<p><figure id=\"attachment_714\" aria-describedby=\"caption-attachment-714\" style=\"width: 143px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/knowlitge.de\/https:\/\/knowlitge.de\/it-sicherheitscheck\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"714\" data-permalink=\"https:\/\/knowlitge.de\/de\/entwicklung-individueller-software\/laptop-2557586_1920\/\" data-orig-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=1920%2C1279&amp;ssl=1\" data-orig-size=\"1920,1279\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"laptop-2557586_1920\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=700%2C466&amp;ssl=1\" class=\"wp-image-714\" src=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/sicherheit.png?resize=143%2C135&#038;ssl=1\" alt=\"\" width=\"143\" height=\"135\" \/><\/a><figcaption id=\"caption-attachment-714\" class=\"wp-caption-text\">IT-Sicherheitscheck<\/figcaption><\/figure><\/p>\n<p><\/p><\/div><\/div>\n<div  class=\"lgc-column lgc-grid-parent lgc-grid-20 lgc-tablet-grid-20 lgc-mobile-grid-100 lgc-equal-heights \"><div  class=\"inside-grid-column\">\n<p><figure id=\"attachment_714\" aria-describedby=\"caption-attachment-714\" style=\"width: 143px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/knowlitge.de\/anti-virus-management\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"714\" data-permalink=\"https:\/\/knowlitge.de\/de\/entwicklung-individueller-software\/laptop-2557586_1920\/\" data-orig-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=1920%2C1279&amp;ssl=1\" data-orig-size=\"1920,1279\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"laptop-2557586_1920\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=700%2C466&amp;ssl=1\" class=\"wp-image-714\" src=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/antivirus.png?resize=143%2C135&#038;ssl=1\" alt=\"\" width=\"143\" height=\"135\" \/><\/a><figcaption id=\"caption-attachment-714\" class=\"wp-caption-text\">Anti-Virus Management<\/figcaption><\/figure><\/p>\n<p><\/p><\/div><\/div>\n<div  class=\"lgc-column lgc-grid-parent lgc-grid-20 lgc-tablet-grid-20 lgc-mobile-grid-100 lgc-equal-heights \"><div  class=\"inside-grid-column\">\n<p><figure id=\"attachment_714\" aria-describedby=\"caption-attachment-714\" style=\"width: 143px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/knowlitge.de\/backup-management\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"714\" data-permalink=\"https:\/\/knowlitge.de\/de\/entwicklung-individueller-software\/laptop-2557586_1920\/\" data-orig-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=1920%2C1279&amp;ssl=1\" data-orig-size=\"1920,1279\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"laptop-2557586_1920\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=700%2C466&amp;ssl=1\" class=\"wp-image-714\" src=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/backup2.png?resize=143%2C135&#038;ssl=1\" alt=\"\" width=\"143\" height=\"135\" \/><\/a><figcaption id=\"caption-attachment-714\" class=\"wp-caption-text\">Backup Management<\/figcaption><\/figure><\/p>\n<p><\/p><\/div><\/div>\n<div  class=\"lgc-column lgc-grid-parent lgc-grid-20 lgc-tablet-grid-20 lgc-mobile-grid-100 lgc-equal-heights \"><div  class=\"inside-grid-column\">\n<p><figure id=\"attachment_714\" aria-describedby=\"caption-attachment-714\" style=\"width: 143px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/knowlitge.de\/firewall-management\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"714\" data-permalink=\"https:\/\/knowlitge.de\/de\/entwicklung-individueller-software\/laptop-2557586_1920\/\" data-orig-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=1920%2C1279&amp;ssl=1\" data-orig-size=\"1920,1279\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"laptop-2557586_1920\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=700%2C466&amp;ssl=1\" class=\"wp-image-714\" src=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/firewall.png?resize=143%2C135&#038;ssl=1\" alt=\"\" width=\"143\" height=\"135\" \/><\/a><figcaption id=\"caption-attachment-714\" class=\"wp-caption-text\">Firewall Management<\/figcaption><\/figure><\/p>\n<p><\/p><\/div><\/div>\n<div  class=\"lgc-column lgc-grid-parent lgc-grid-20 lgc-tablet-grid-20 lgc-mobile-grid-100 lgc-equal-heights \"><div  class=\"inside-grid-column\">\n<p><figure id=\"attachment_714\" aria-describedby=\"caption-attachment-714\" style=\"width: 143px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/knowlitge.de\/update-management\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"714\" data-permalink=\"https:\/\/knowlitge.de\/de\/entwicklung-individueller-software\/laptop-2557586_1920\/\" data-orig-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=1920%2C1279&amp;ssl=1\" data-orig-size=\"1920,1279\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"laptop-2557586_1920\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=700%2C466&amp;ssl=1\" class=\"wp-image-714\" src=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/update2.png?resize=143%2C135&#038;ssl=1\" alt=\"\" width=\"143\" height=\"135\" \/><\/a><figcaption id=\"caption-attachment-714\" class=\"wp-caption-text\">Update Management<\/figcaption><\/figure><\/p>\n<p><\/p><\/div><\/div>\n<\/div>\n<h6>Sicherheit umfassend und mit System<\/h6>\n<ul class=\"checklist\">\n<li>Passgenaues IT-Sicherheitskonzept f\u00fcr Ihr Unternehmen<\/li>\n<li>Optimaler Schutz vor Viren, Trojanern und Hackern<\/li>\n<li>F\u00fcr eine rundum sichere Unternehmens-IT<\/li>\n<\/ul>\n<h6>IT-Security: So sch\u00fctzen Sie sich vor Cyberkriminellen<\/h6>\n<p>IT-Sicherheit wird f\u00fcr kleinere und mittelgro\u00dfe Unternehmen ein immer wichtigeres Thema. Das von Cyberangriffen ausgehende Risiko steigt kontinuierlich an, w\u00e4hrend die Folgen zunehmend schwer abzusch\u00e4tzen sind. Das liegt unter anderem an der immer dichteren Vernetzung Ihrer IT-Systeme. Wer sich nicht ausreichend sch\u00fctzt, riskiert Ausf\u00e4lle und Datenverluste, die f\u00fcr den Betrieb schnell verheerende Folgen haben k\u00f6nnen. Dabei muss professioneller Schutz nicht kompliziert oder teuer sein: Wir stellen Ihnen genau die Dienstleistungen zur Seite, die Ihr Unternehmen f\u00fcr eine sichere IT ben\u00f6tigt. Damit befreien Sie Ihren Gesch\u00e4ftsalltag von Gedanken an die Stabilit\u00e4t und Sicherheit Ihrer IT. Diese Aufgabe \u00fcbernehmen wir f\u00fcr Sie.<\/p>\n<h6>IT-Sicherheitskonzept mit Mehrwert \u2013 passgenau f\u00fcr Ihre Anspr\u00fcche<\/h6>\n<p>Ein IT-Konzept, in dem Schwachstellen beseitigt werden, bevor etwas passiert \u2013 das ist es, was wir Ihnen bieten. Wir w\u00e4hlen genau die L\u00f6sungen aus, die zu den Anforderungen Ihrer Infrastruktur passen. Und sorgen anschlie\u00dfend mit effizienten Virenschutz-Programmen, Datensicherungs-Strategien und weiteren, zielf\u00fchrenden Bausteinen f\u00fcr eine sichere und zuverl\u00e4ssige IT.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"content_block\" id=\"custom_post_widget-1047\"><h4><span style=\"color: #808080;\">Unsere weiteren Service-Dienstleistungen<\/span><\/h4>\n<p>Erg\u00e4nzend dazu haben wir weitere Dienstleistungen entwickelt, um Ihr Unternehmen durch eine sichere und zukunftsf\u00e4hige IT zu st\u00e4rken. Erfahren Sie mehr zu unseren Leistungen aus den Bereichen IT-Support, IT-Infrastruktur , IT-Sicherheit, IT-Schulung und Cloud Computing:<\/p>\n<div  class=\"lgc-column lgc-grid-parent lgc-grid-20 lgc-tablet-grid-20 lgc-mobile-grid-100 lgc-equal-heights \"><div  class=\"inside-grid-column\">\n<p><figure id=\"attachment_714\" aria-describedby=\"caption-attachment-714\" style=\"width: 143px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/knowlitge.de\/it-support-fuer-unternehmen\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"714\" data-permalink=\"https:\/\/knowlitge.de\/de\/entwicklung-individueller-software\/laptop-2557586_1920\/\" data-orig-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=1920%2C1279&amp;ssl=1\" data-orig-size=\"1920,1279\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"laptop-2557586_1920\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=700%2C466&amp;ssl=1\" class=\"wp-image-714\" src=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/02\/monitoring1.jpg?resize=143%2C135&#038;ssl=1\" alt=\"\" width=\"143\" height=\"135\" \/><\/a><figcaption id=\"caption-attachment-714\" class=\"wp-caption-text\">IT-Support<\/figcaption><\/figure><\/p>\n<p><\/p><\/div><\/div>\n<div  class=\"lgc-column lgc-grid-parent lgc-grid-20 lgc-tablet-grid-20 lgc-mobile-grid-100 lgc-equal-heights \"><div  class=\"inside-grid-column\">\n<p><figure id=\"attachment_714\" aria-describedby=\"caption-attachment-714\" style=\"width: 143px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/knowlitge.de\/IT-Infrastruktur\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"714\" data-permalink=\"https:\/\/knowlitge.de\/de\/entwicklung-individueller-software\/laptop-2557586_1920\/\" data-orig-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=1920%2C1279&amp;ssl=1\" data-orig-size=\"1920,1279\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"laptop-2557586_1920\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=700%2C466&amp;ssl=1\" class=\"wp-image-714\" src=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2015\/10\/Zahnr%C3%A4der-1400x300.png?resize=143%2C135&#038;ssl=1\" alt=\"\" width=\"143\" height=\"135\" \/><\/a><figcaption id=\"caption-attachment-714\" class=\"wp-caption-text\">IT-Infrastruktur<\/figcaption><\/figure><\/p>\n<p><\/p><\/div><\/div>\n<div  class=\"lgc-column lgc-grid-parent lgc-grid-20 lgc-tablet-grid-20 lgc-mobile-grid-100 lgc-equal-heights \"><div  class=\"inside-grid-column\">\n<p><figure id=\"attachment_714\" aria-describedby=\"caption-attachment-714\" style=\"width: 143px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/knowlitge.de\/IT-Sicherheit\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"714\" data-permalink=\"https:\/\/knowlitge.de\/de\/entwicklung-individueller-software\/laptop-2557586_1920\/\" data-orig-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=1920%2C1279&amp;ssl=1\" data-orig-size=\"1920,1279\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"laptop-2557586_1920\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=700%2C466&amp;ssl=1\" class=\"wp-image-714\" src=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2015\/10\/kette-1400x300.png?resize=143%2C135&#038;ssl=1\" alt=\"\" width=\"143\" height=\"135\" \/><\/a><figcaption id=\"caption-attachment-714\" class=\"wp-caption-text\">IT-Sicherheit<\/figcaption><\/figure><\/p>\n<p><\/p><\/div><\/div>\n<div  class=\"lgc-column lgc-grid-parent lgc-grid-20 lgc-tablet-grid-20 lgc-mobile-grid-100 lgc-equal-heights \"><div  class=\"inside-grid-column\">\n<p><figure id=\"attachment_714\" aria-describedby=\"caption-attachment-714\" style=\"width: 143px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/knowlitge.de\/IT-Schulung\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"714\" data-permalink=\"https:\/\/knowlitge.de\/de\/entwicklung-individueller-software\/laptop-2557586_1920\/\" data-orig-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=1920%2C1279&amp;ssl=1\" data-orig-size=\"1920,1279\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"laptop-2557586_1920\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=700%2C466&amp;ssl=1\" class=\"wp-image-714\" src=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2015\/10\/tastatur-dunkel-1400x300.jpg?resize=143%2C135&#038;ssl=1\" alt=\"\" width=\"143\" height=\"135\" \/><\/a><figcaption id=\"caption-attachment-714\" class=\"wp-caption-text\">IT-Schulung<\/figcaption><\/figure><\/p>\n<p><\/p><\/div><\/div>\n<div  class=\"lgc-column lgc-grid-parent lgc-grid-20 lgc-tablet-grid-20 lgc-mobile-grid-100 lgc-equal-heights \"><div  class=\"inside-grid-column\">\n<p><figure id=\"attachment_714\" aria-describedby=\"caption-attachment-714\" style=\"width: 143px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/knowlitge.de\/Cloud-Computing\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"714\" data-permalink=\"https:\/\/knowlitge.de\/de\/entwicklung-individueller-software\/laptop-2557586_1920\/\" data-orig-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=1920%2C1279&amp;ssl=1\" data-orig-size=\"1920,1279\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"laptop-2557586_1920\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/laptop-2557586_1920.jpg?fit=700%2C466&amp;ssl=1\" class=\"wp-image-714\" src=\"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/Cloud-2-1400-x-300-1.png?resize=143%2C135&#038;ssl=1\" alt=\"\" width=\"143\" height=\"135\" \/><\/a><figcaption id=\"caption-attachment-714\" class=\"wp-caption-text\">Cloud Computing<\/figcaption><\/figure><\/p>\n<p><\/p><\/div><\/div>\n<h4><span style=\"color: #808080;\">Was d\u00fcrfen wir f\u00fcr Sie tun?<\/span><\/h4>\n<p>Kontaktieren Sie uns. Wir informieren und beraten Sie gerne: <a href=\"https:\/\/knowlitge.de\/kontakt\/\">Kontakt<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Sicherheit umfassend und mit System Passgenaues IT-Sicherheitskonzept f\u00fcr Ihr Unternehmen Optimaler Schutz vor Viren, Trojanern und Hackern F\u00fcr eine rundum sichere Unternehmens-IT IT-Security: So sch\u00fctzen Sie sich vor Cyberkriminellen IT-Sicherheit wird f\u00fcr kleinere und mittelgro\u00dfe Unternehmen ein immer wichtigeres Thema.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-431","page","type-page","status-publish","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"de","enabled_languages":["en","de"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"de":{"title":false,"content":false,"excerpt":false}}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT-Sicherheit - knowlITge<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/knowlitge.de\/it-sicherheit\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT-Sicherheit - knowlITge\" \/>\n<meta property=\"og:url\" content=\"https:\/\/knowlitge.de\/it-sicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"knowlITge\" \/>\n<meta property=\"article:modified_time\" content=\"2018-02-08T14:33:30+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/knowlitge.de\\\/it-sicherheit\\\/\",\"url\":\"https:\\\/\\\/knowlitge.de\\\/it-sicherheit\\\/\",\"name\":\"IT-Sicherheit - knowlITge\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/knowlitge.de\\\/#website\"},\"datePublished\":\"2018-01-23T14:02:09+00:00\",\"dateModified\":\"2018-02-08T14:33:30+00:00\",\"description\":\"knowlITge GmbH, K\u00f6ln \\\/ Bonn \\\/ Sankt Augustin - IT-Dienstleister seid \u00fcber 20 Jahren ! Docusnap, F-Secure, Gateprotect, Zabbix Softwarerentwicklung - VB.Net, Access Support - Windows, Linux, Drucker, Telefon, Cloud - Schulung, Workshop, Seminare, Beratung, Consulting\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/knowlitge.de\\\/it-sicherheit\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/knowlitge.de\\\/it-sicherheit\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/knowlitge.de\\\/it-sicherheit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/knowlitge.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT-Sicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/knowlitge.de\\\/#website\",\"url\":\"https:\\\/\\\/knowlitge.de\\\/\",\"name\":\"knowlITge\",\"description\":\"IT Dienstleister\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/knowlitge.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT-Sicherheit - knowlITge","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/knowlitge.de\/it-sicherheit\/","og_locale":"de_DE","og_type":"article","og_title":"IT-Sicherheit - knowlITge","og_url":"https:\/\/knowlitge.de\/it-sicherheit\/","og_site_name":"knowlITge","article_modified_time":"2018-02-08T14:33:30+00:00","twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/knowlitge.de\/it-sicherheit\/","url":"https:\/\/knowlitge.de\/it-sicherheit\/","name":"IT-Sicherheit - knowlITge","isPartOf":{"@id":"https:\/\/knowlitge.de\/#website"},"datePublished":"2018-01-23T14:02:09+00:00","dateModified":"2018-02-08T14:33:30+00:00","description":"knowlITge GmbH, K\u00f6ln \/ Bonn \/ Sankt Augustin - IT-Dienstleister seid \u00fcber 20 Jahren ! Docusnap, F-Secure, Gateprotect, Zabbix Softwarerentwicklung - VB.Net, Access Support - Windows, Linux, Drucker, Telefon, Cloud - Schulung, Workshop, Seminare, Beratung, Consulting","breadcrumb":{"@id":"https:\/\/knowlitge.de\/it-sicherheit\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/knowlitge.de\/it-sicherheit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/knowlitge.de\/it-sicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/knowlitge.de\/"},{"@type":"ListItem","position":2,"name":"IT-Sicherheit"}]},{"@type":"WebSite","@id":"https:\/\/knowlitge.de\/#website","url":"https:\/\/knowlitge.de\/","name":"knowlITge","description":"IT Dienstleister","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/knowlitge.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"jetpack_sharing_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/P6NCzV-6X","jetpack-related-posts":[{"id":169,"url":"https:\/\/knowlitge.de\/de\/","url_meta":{"origin":431,"position":0},"title":"IT-Dienstleister f\u00fcr Unternehmen und \u00f6ffentliche Auftraggeber","author":"dvladmin","date":"7. Oktober 2015","format":false,"excerpt":"Die knowlITge GmbH bietet als langj\u00e4hriger IT-Dienstleister seit 1994 erfolgreich Dienstleistungen in den Bereichen IT-Support, IT-Infrastruktur, IT-Sicherheit, IT-Schulung und Cloud Computing an. Unternehmen, Verb\u00e4nde und \u00f6ffentliche Auftraggeber nutzen das Know-How des IT-System- und Beratungshauses mit Standorten in K\u00f6ln \/ Bonn \/ Sankt Augustin und Berlin. Mehr erfahren... Unsere aktualisierten Datenschutzbestimmungen\u2026","rel":"","context":"\u00c4hnlicher Beitrag","block_context":{"text":"\u00c4hnlicher Beitrag","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":489,"url":"https:\/\/knowlitge.de\/de\/cloud-computing\/","url_meta":{"origin":431,"position":1},"title":"Cloud Computing","author":"dvladmin","date":"24. Januar 2018","format":false,"excerpt":"Die sichere Komplett-L\u00f6sung f\u00fcr Ihr Unternehmen Je nach Bedarf frei skalierbare L\u00f6sungen Erh\u00f6hte Datensicherheit durch Cloud-Backups Flexible Zug\u00e4nglichkeit Ihrer Daten Ortsunabh\u00e4ngig in sicheren Rechenzentrum Cloud: Sicher, unkompliziert, zukunftssicher Ortsunabh\u00e4ngig arbeiten und trotzdem schnellen Zugang zu allen wichtigen Daten haben, die Kooperation innerhalb Ihres Unternehmens erleichtern, Dokumente sicher und rechtskonform archivieren\u2026","rel":"","context":"\u00c4hnlicher Beitrag","block_context":{"text":"\u00c4hnlicher Beitrag","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":362,"url":"https:\/\/knowlitge.de\/de\/it-support-fuer-unternehmen\/","url_meta":{"origin":431,"position":2},"title":"IT-Support","author":"dvladmin","date":"19. Januar 2018","format":false,"excerpt":"IT-Komplettpaket f\u00fcr Unternehmen Mit uns als Ihrem professionellen Partner f\u00fcr IT-Outsourcing erhalten Sie eine konstant funktionsf\u00e4hige, zuverl\u00e4ssig laufende IT-Umgebung, egal ob auf Arbeitsplatz- oder Server-Ebene. Mit Services zu den Themen Desktop Management und Server Management bieten wir Ihnen genau die Leistungsbausteine, die Ihre IT ben\u00f6tigt, um Ihr Gesch\u00e4ft im Alltag\u2026","rel":"","context":"\u00c4hnlicher Beitrag","block_context":{"text":"\u00c4hnlicher Beitrag","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2015\/10\/Zahnr%C3%A4der-1400x300.png?fit=1200%2C257&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2015\/10\/Zahnr%C3%A4der-1400x300.png?fit=1200%2C257&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2015\/10\/Zahnr%C3%A4der-1400x300.png?fit=1200%2C257&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2015\/10\/Zahnr%C3%A4der-1400x300.png?fit=1200%2C257&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2015\/10\/Zahnr%C3%A4der-1400x300.png?fit=1200%2C257&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":433,"url":"https:\/\/knowlitge.de\/de\/it-sicherheitscheck\/","url_meta":{"origin":431,"position":3},"title":"IT-Sicherheitscheck","author":"dvladmin","date":"23. Januar 2018","format":false,"excerpt":"Sich sch\u00fctzen vor externe Risiken und Schwachstellen Ihre IT muss vor externen Risiken ebenso gesch\u00fctzt sein, wie vor internen Schwachstellen. Andernfalls haben Hacker ein leichtes Spiel und Probleme mit Ihrer Hardware und Software f\u00fchren zu unerw\u00fcnschten Ausf\u00e4llen in Ihrem Unternehmen. Mit dem IT-Sicherheits-Check pr\u00fcfen wir Ihre IT kostenlos auf m\u00f6gliche\u2026","rel":"","context":"\u00c4hnlicher Beitrag","block_context":{"text":"\u00c4hnlicher Beitrag","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/knowlitge.de\/wp-content\/uploads\/2018\/01\/sicherheit.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":464,"url":"https:\/\/knowlitge.de\/de\/it-infrastruktur\/","url_meta":{"origin":431,"position":4},"title":"IT-Infrastruktur","author":"dvladmin","date":"24. Januar 2018","format":false,"excerpt":"Das Fundament f\u00fcr Ihr Unternehmen Genaue Analysen f\u00fcr eine optimierte IT-Umgebung Einfache Beschaffung leistungsf\u00e4higer Hard- und Software Kostenschonende Miete von IT-Systemen IT-Strategie - Grundlage f\u00fcr Aufbau und Optimierung Alle Weiterentwicklungen, Leistungssteigerungen und die Selbstverst\u00e4ndlichkeit, mit der heute IT-Systeme genutzt werden, k\u00f6nnen \u00fcber eines nicht hinwegt\u00e4uschen: IT ist und bleibt \u00e4u\u00dferst\u2026","rel":"","context":"\u00c4hnlicher Beitrag","block_context":{"text":"\u00c4hnlicher Beitrag","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":15,"url":"https:\/\/knowlitge.de\/de\/ueber-uns\/","url_meta":{"origin":431,"position":5},"title":"\u00dcber uns","author":"dvladmin","date":"21. September 2015","format":false,"excerpt":"Die knowlITge GmbH bietet seit 1994 erfolgreich Dienstleistungen in den Bereichen IT-Support, IT-Infrastruktur, IT-Sicherheit, IT-Schulung und Cloud Computing an. Unternehmen, Verb\u00e4nde und \u00f6ffentliche Auftraggeber nutzen das Know-How des IT-System- und Beratungshauses mit Standorten in Bonn \/ Sankt Augustin und Berlin. Wir freuen uns \u00fcber Ihr Interesse an unserem Unternehmen. Haben\u2026","rel":"","context":"\u00c4hnlicher Beitrag","block_context":{"text":"\u00c4hnlicher Beitrag","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/knowlitge.de\/de\/wp-json\/wp\/v2\/pages\/431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowlitge.de\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/knowlitge.de\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/knowlitge.de\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/knowlitge.de\/de\/wp-json\/wp\/v2\/comments?post=431"}],"version-history":[{"count":10,"href":"https:\/\/knowlitge.de\/de\/wp-json\/wp\/v2\/pages\/431\/revisions"}],"predecessor-version":[{"id":1162,"href":"https:\/\/knowlitge.de\/de\/wp-json\/wp\/v2\/pages\/431\/revisions\/1162"}],"wp:attachment":[{"href":"https:\/\/knowlitge.de\/de\/wp-json\/wp\/v2\/media?parent=431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}