{"id":575,"date":"2021-08-05T21:01:13","date_gmt":"2021-08-05T19:01:13","guid":{"rendered":"https:\/\/www.alpha-security.de\/alpha-security\/?page_id=575"},"modified":"2021-08-29T17:12:00","modified_gmt":"2021-08-29T15:12:00","slug":"it-security","status":"publish","type":"page","link":"http:\/\/www.alpha-security.de\/alpha-security\/it-security\/","title":{"rendered":"IT-Security"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row_content_no_spaces&#8220; ova_container=&#8220;no&#8220;][vc_column]<div class=\"l-design \">\n\t            <div class=\"main-slider slider-pro\" id=\"main-slider\" data-slider-width=\"100%\" data-slider-height=\"700px\" data-slider-arrows=\"true\" data-slider-buttons=\"true\">\n\t                <div class=\"sp-slides\">\n\t                    \n            <div class=\"sp-slide \">\n            \t<img class=\"sp-image\" src=\"http:\/\/www.alpha-security.de\/alpha-security\/wp-content\/uploads\/2021\/08\/SLIDER_one.jpg\" alt=\"slider\" \/>\n                <div class=\"container-fluid\">\n                    <div class=\"row\">\n                        <div class=\"col-xs-12\">\n                            <div class=\"main-slider__inner\">\n                                <h2 class=\"main-slider__title sp-layer\" data-width=\"100%\" data-show-transition=\"left\" data-hide-transition=\"left\" data-show-duration=\"800\" data-show-delay=\"400\" data-hide-delay=\"400\"><span class=\"main-slider__title-first\">Beratung - Planung - Durchf\u00fchrung<\/span><strong class=\"main-slider__title-strong\">Security & Solutions GmbH<\/strong><\/h2>\n                                <div class=\"main-slider__info sp-layer\" data-width=\"100%\" data-show-transition=\"left\" data-hide-transition=\"left\" data-show-duration=\"1200\" data-show-delay=\"2000\" data-hide-delay=\"400\">\u201e25 Jahre Erfahrung & Kompetenz f\u00fcr Ihre Sicherheit\u201c<\/div>\n                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n            <div class=\"sp-slide \">\n            \t<img class=\"sp-image\" src=\"http:\/\/www.alpha-security.de\/alpha-security\/wp-content\/uploads\/2021\/08\/SLIDER_two.jpg\" alt=\"slider\" \/>\n                <div class=\"container-fluid\">\n                    <div class=\"row\">\n                        <div class=\"col-xs-12\">\n                            <div class=\"main-slider__inner\">\n                                <h2 class=\"main-slider__title sp-layer\" data-width=\"100%\" data-show-transition=\"left\" data-hide-transition=\"left\" data-show-duration=\"800\" data-show-delay=\"400\" data-hide-delay=\"400\"><span class=\"main-slider__title-first\">Pr\u00e4vention - Intervention - Protection<\/span><strong class=\"main-slider__title-strong\">Security & Solutions GmbH<\/strong><\/h2>\n                                <div class=\"main-slider__info sp-layer\" data-width=\"100%\" data-show-transition=\"left\" data-hide-transition=\"left\" data-show-duration=\"1200\" data-show-delay=\"2000\" data-hide-delay=\"400\">\u201eProfessionelle Dienstleistung aus einer Hand\u201c<\/div>\n                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n\t                <\/div>\n\t            <\/div>\n\t            <span class=\"num\"><\/span>\n        \t<\/div>[\/vc_column][\/vc_row][vc_row css=&#8220;.vc_custom_1502782720994{margin-top: 110px !important;}&#8220;][vc_column][vc_row_inner][vc_column_inner]<div class=\"\"><div class=\"ui-subtitle-block\">alpha Security & Solutions GmbH<\/div><h2 class=\"ui-title-block \"><strong>IT-SECURITY<\/strong><\/h2><\/div>[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8220;1\/2&#8243;][vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8220;1\/4&#8243;]<div class=\"advantages-carousel owl-carousel owl-theme owl-theme_arrows-top enable-owl-carousel  \" data-min480=\"1\" data-min768=\"2\" data-min992=\"3\" data-min1200=\"3\" data-pagination=\"false\" data-navigation=\"true\" data-auto-play=\"4000\" data-stop-on-hover=\"true\"><\/div><section class=\"b-advantages b-advantages-2 wow  fadeIn \" data-wow-duration=\"1s\" data-wow-delay=\"0.2s\"><i class=\"b-advantages__icon ti-search\"><\/i><h3 class=\"b-advantages__title ui-title-inner\">IT-Analyse<\/h3><div class=\"b-advantages__info\">Schwachstellen in Ihrer IT erkennen<\/div><\/section>[\/vc_column_inner][vc_column_inner width=&#8220;1\/4&#8243;]<section class=\"b-advantages b-advantages-2 wow  fadeIn \" data-wow-duration=\"1s\" data-wow-delay=\"0.2s\"><i class=\"b-advantages__icon ti-settings\"><\/i><h3 class=\"b-advantages__title ui-title-inner\">Durchf\u00fchrung<\/h3><div class=\"b-advantages__info\">Implementierung aller Sicherheitsma\u00dfnahmen<\/div><\/section>[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8220;1\/2&#8243;][\/vc_column_inner][vc_column_inner width=&#8220;1\/3&#8243;]<div class=\"advantages-carousel owl-carousel owl-theme owl-theme_arrows-top enable-owl-carousel  \" data-min480=\"1\" data-min768=\"2\" data-min992=\"3\" data-min1200=\"3\" data-pagination=\"false\" data-navigation=\"true\" data-auto-play=\"4000\" data-stop-on-hover=\"true\"><\/div><section class=\"b-advantages b-advantages-2 wow  fadeIn \" data-wow-duration=\"1s\" data-wow-delay=\"0.2s\"><i class=\"b-advantages__icon ti-user\"><\/i><h3 class=\"b-advantages__title ui-title-inner\">Mitarbeiter-Sensibilisierung<\/h3><div class=\"b-advantages__info\">Verst\u00e4ndnis f\u00fcr Gefahren schaffen<\/div><\/section>[\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8220;52px&#8220;][vc_separator]\n  \t\t\t<section class=\"section-default_pdg-btm section-border scrollreveal \">\n  \t\t\t    <div class=\"section__inner\">\n  \t\t\t        <div class=\"row\">\n  \t\t\t            <div class=\"col-xs-12\"><div class=\"ui-subtitle-block-2\">IT-SECURITY<\/div><h2 class=\"ui-title-block\"><strong>IT-Analyse<\/strong><\/h2><\/div>\n  \t\t\t        <\/div>\n  \t\t\t        <div class=\"row\"><div class=\"col-sm-4\">\n  \t\t\t                <div class=\"col_minus-interval_right\">\n  \t\t\t                    <a class=\"img-w-decor img-w-decor_l-minus-110 tilter tilter--1 js-zoom-images\" href=\"http:\/\/www.alpha-security.de\/alpha-security\/wp-content\/uploads\/2017\/09\/fee-computer-computer-security-system-and-a-magnif-QLEJNVK-scaled.jpg\">\n  \t\t\t                        <figure class=\"tilter__figure\"><img class=\"img-responsive\" src=\"http:\/\/www.alpha-security.de\/alpha-security\/wp-content\/uploads\/2017\/09\/fee-computer-computer-security-system-and-a-magnif-QLEJNVK-scaled.jpg\" alt=\"&lt;strong&gt;Schwachstellen&lt;\/strong&gt; in Ihrer IT erkennen\"\/><\/figure>\n  \t\t\t                    <\/a>\n  \t\t\t                <\/div>\n  \t\t\t            <\/div><div class=\"col-sm-6 col-sm-offset-1\">\n  \t\t\t                <div class=\"col_minus-interval_left\"><h3 class=\"ui-title-block ui-title-block_sm ui-title-block_semibold\">\n  \t\t\t                    <strong>Schwachstellen<\/strong> in Ihrer IT erkennen<\/h3><div>alpha ermittelt den Ist-Zustand Ihrer gesamten Unternehmens-IT und nutzt dabei umfassende Sicherheitsmessungen f\u00fcr eine detaillierte Auswertung. Anhand der Identifikation der Schwachstellen wird ein Handlungsplan erstellt und alpha unterst\u00fctzt Sie bei der Umsetzung der IT-Strategie.<br \/>\n<br \/>\n- systematische Analyse Ihrer IT-Infrastruktur<br \/>\n- ganzheitliche Analyseergebnisse Ihrer IT-Infrastruktur<br \/>\n- Handlungsempfehlungen f\u00fcr maximalen Schutz<\/div><\/div>\n  \t\t\t            <\/div>\n  \t\t\t        <\/div><\/div>\n  \t\t\t<\/section>[vc_empty_space height=&#8220;52px&#8220;]\n  \t\t\t<section class=\"section-default_pdg-btm section-border scrollreveal \">\n  \t\t\t    <div class=\"section__inner\">\n  \t\t\t        <div class=\"row\">\n  \t\t\t            <div class=\"col-xs-12\"><div class=\"ui-subtitle-block-2\">IT-Security<\/div><h2 class=\"ui-title-block\"><strong>Durchf\u00fchrung<\/strong><\/h2><\/div>\n  \t\t\t        <\/div>\n  \t\t\t        <div class=\"row\"><div class=\"col-sm-4\">\n  \t\t\t                <div class=\"col_minus-interval_right\">\n  \t\t\t                    <a class=\"img-w-decor img-w-decor_l-minus-110 tilter tilter--1 js-zoom-images\" href=\"http:\/\/www.alpha-security.de\/alpha-security\/wp-content\/uploads\/2021\/08\/programmer-software-developer-Z7UNBRU-scaled.jpg\">\n  \t\t\t                        <figure class=\"tilter__figure\"><img class=\"img-responsive\" src=\"http:\/\/www.alpha-security.de\/alpha-security\/wp-content\/uploads\/2021\/08\/programmer-software-developer-Z7UNBRU-scaled.jpg\" alt=\"Implementierung aller &lt;strong&gt;Sicherheitsma\u00dfnahmen&lt;\/strong&gt;\"\/><\/figure>\n  \t\t\t                    <\/a>\n  \t\t\t                <\/div>\n  \t\t\t            <\/div><div class=\"col-sm-6 col-sm-offset-1\">\n  \t\t\t                <div class=\"col_minus-interval_left\"><h3 class=\"ui-title-block ui-title-block_sm ui-title-block_semibold\">\n  \t\t\t                    Implementierung aller <strong>Sicherheitsma\u00dfnahmen<\/strong><\/h3><div>Anhand einer detaillierten Auswertung des Ist-Zustands der gesamten Unternehmens-IT kann alpha bestehende und potenzielle Gefahren eliminieren.<br \/>\nalpha erstellt einen Handlungsplan und implementiert notwendige Schnittstellen zur langfristigen Behebung von Sicherheitsl\u00fccken Ihrer Unternehmens-IT.<br \/>\n<br \/>\n- langfristige und pr\u00e4ventive Ma\u00dfnahmen gegen Cyberangriffe<br \/>\n- Implementierung von Software und Hardware<\/div><\/div>\n  \t\t\t            <\/div>\n  \t\t\t        <\/div><\/div>\n  \t\t\t<\/section>[vc_empty_space]\n  \t\t\t<section class=\"section-default_pdg-btm section-border scrollreveal \">\n  \t\t\t    <div class=\"section__inner\">\n  \t\t\t        <div class=\"row\">\n  \t\t\t            <div class=\"col-xs-12\"><div class=\"ui-subtitle-block-2\">IT-Security<\/div><h2 class=\"ui-title-block\"><strong>Mitarbeiter-Sensibilisierung<\/strong><\/h2><\/div>\n  \t\t\t        <\/div>\n  \t\t\t        <div class=\"row\"><div class=\"col-sm-4\">\n  \t\t\t                <div class=\"col_minus-interval_right\">\n  \t\t\t                    <a class=\"img-w-decor img-w-decor_l-minus-110 tilter tilter--1 js-zoom-images\" href=\"http:\/\/www.alpha-security.de\/alpha-security\/wp-content\/uploads\/2021\/08\/businessman-speaking-and-holding-digital-tablet-an-67VYDLF-scaled.jpg\">\n  \t\t\t                        <figure class=\"tilter__figure\"><img class=\"img-responsive\" src=\"http:\/\/www.alpha-security.de\/alpha-security\/wp-content\/uploads\/2021\/08\/businessman-speaking-and-holding-digital-tablet-an-67VYDLF-scaled.jpg\" alt=\"&lt;strong&gt;Verst\u00e4ndnis&lt;\/strong&gt; f\u00fcr Gefahren schaffen\"\/><\/figure>\n  \t\t\t                    <\/a>\n  \t\t\t                <\/div>\n  \t\t\t            <\/div><div class=\"col-sm-6 col-sm-offset-1\">\n  \t\t\t                <div class=\"col_minus-interval_left\"><h3 class=\"ui-title-block ui-title-block_sm ui-title-block_semibold\">\n  \t\t\t                    <strong>Verst\u00e4ndnis<\/strong> f\u00fcr Gefahren schaffen<\/h3><div>Eine dauerhafte Sensibilisierung Ihrer Mitarbeiter ist eines der wichtigsten Ma\u00dfnahmen gegen Cyberrisiken.<br \/>\nalpha setzt auf regelm\u00e4\u00dfige Schulung und Mitarbeiter-Sensibilisierung von allen Mitarbeitern, sowohl im Umgang bei  Verdachtsmomenten eines Cyberangriffs sowie der Datenverarbeitung vertraulicher Unternehmensinformationen.<br \/>\n<br \/>\n- Sicherer Umgang mit IT-Systemen und sensibler Daten<br \/>\n- Pr\u00e4vention und Achtsamkeit bei Sicherheitsl\u00fccken<\/div><\/div>\n  \t\t\t            <\/div>\n  \t\t\t        <\/div><\/div>\n  \t\t\t<\/section>[vc_row_inner][vc_column_inner width=&#8220;1\/2&#8243;]<div class=\"b-contacts__item bg-grey \"><i class=\"b-contacts__icon ti-mobile bg-primary_a\"><\/i><div class=\"b-contacts__name\">+49 222 683 777 97<\/div><div class=\"b-contacts__info\">Rufen Sie uns an<\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8220;1\/2&#8243;]<div class=\"b-contacts__item bg-grey \"><i class=\"b-contacts__icon ti-email bg-primary_a\"><\/i><div class=\"b-contacts__name\">info@alpha-security.de<\/div><div class=\"b-contacts__info\">Schreiben Sie uns Ihr Anliegen<\/div><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row_content_no_spaces&#8220; ova_container=&#8220;no&#8220;][vc_column][\/vc_column][\/vc_row][vc_row css=&#8220;.vc_custom_1502782720994{margin-top: 110px !important;}&#8220;][vc_column][vc_row_inner][vc_column_inner][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8220;1\/2&#8243;][vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8220;1\/4&#8243;][\/vc_column_inner][vc_column_inner width=&#8220;1\/4&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8220;1\/2&#8243;][\/vc_column_inner][vc_column_inner width=&#8220;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8220;52px&#8220;][vc_separator][vc_empty_space height=&#8220;52px&#8220;][vc_empty_space][vc_row_inner][vc_column_inner width=&#8220;1\/2&#8243;][\/vc_column_inner][vc_column_inner width=&#8220;1\/2&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/fullwidth.php","meta":[],"_links":{"self":[{"href":"http:\/\/www.alpha-security.de\/alpha-security\/wp-json\/wp\/v2\/pages\/575"}],"collection":[{"href":"http:\/\/www.alpha-security.de\/alpha-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.alpha-security.de\/alpha-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.alpha-security.de\/alpha-security\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.alpha-security.de\/alpha-security\/wp-json\/wp\/v2\/comments?post=575"}],"version-history":[{"count":31,"href":"http:\/\/www.alpha-security.de\/alpha-security\/wp-json\/wp\/v2\/pages\/575\/revisions"}],"predecessor-version":[{"id":883,"href":"http:\/\/www.alpha-security.de\/alpha-security\/wp-json\/wp\/v2\/pages\/575\/revisions\/883"}],"wp:attachment":[{"href":"http:\/\/www.alpha-security.de\/alpha-security\/wp-json\/wp\/v2\/media?parent=575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}