{"id":1791,"date":"2022-11-07T09:00:16","date_gmt":"2022-11-07T08:00:16","guid":{"rendered":"https:\/\/plansysteme.com\/?p=1791"},"modified":"2022-08-29T13:41:01","modified_gmt":"2022-08-29T11:41:01","slug":"security-as-a-service-secaas","status":"publish","type":"post","link":"https:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/","title":{"rendered":"Security as a Service (SECaaS)"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>Nichts ist in der IT so wichtig wie die Sicherheit. Unternehmen m\u00fcssen ihre eigenen IT-Infrastrukturen und lokalen Rechenzentren zuverl\u00e4ssig sichern, was mit einem hohen Zeit- und Kostenaufwand verbunden sein kann. Und selbst dann ist der Erfolg nicht garantiert. Die Auslagerung vieler IT-Aufgaben in die Cloud er\u00f6ffnet auch im Bereich Sicherheit neue Perspektiven: Security as a Service soll den Anforderungen der globalen Kommunikation Rechnung tragen.<\/p>\n<\/div><div class=\"fusion-text fusion-text-2\"><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-black ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Inhaltsverzeichnis<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/#Wo_liegt_die_Zukunft_der_Netzsicherheit\" >Wo liegt die Zukunft der Netzsicherheit?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/#Security_as_a_Service_verfolgt_einen_neuen_Ansatz\" >Security as a Service verfolgt einen neuen Ansatz<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/#SECaaS_funktioniert_ueberall\" >SECaaS funktioniert \u00fcberall<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/#Weniger_Sicherheitsluecken_in_IT-Systemen_von_Firmen\" >Weniger Sicherheitsl\u00fccken in IT-Systemen von Firmen<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/#Fragen_und_Antworten_zu_Security_as_a_Service\" >Fragen und Antworten zu Security as a Service<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Wo_liegt_die_Zukunft_der_Netzsicherheit\"><\/span>Wo liegt die Zukunft der Netzsicherheit?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>\u00dcblicherweise ist in gro\u00dfen Unternehmen die Sicherheit von Rechenzentren ein gro\u00dfes Thema. Die Bereitstellung von Cloud-Diensten f\u00fcr diese Aufgabe ist f\u00fcr viele Experten der n\u00e4chste logische Schritt, um die Zukunft der Netzsicherheit zu gestalten. Tatsache ist, dass heutzutage ein Gro\u00dfteil der Zugangsvoraussetzungen f\u00fcr Ger\u00e4te bzw. User nicht mehr im lokalen Rechenzentrum geb\u00fcndelt sind, sondern immer st\u00e4rker auf globale Netzwerkstrukturen und Cloud-Dienste verteilt sind.<\/p>\n<p>Dort, wo dezentrale Cloud-Dienste Soft- und Hardware-L\u00f6sungen hosten, muss die Security-Architektur einen sicheren Zugriff auf ortsunabh\u00e4ngig gehostete Daten und Dienste gew\u00e4hrleisten. Inzwischen wird mehr Internet-Traffic zwischen Usern und Cloud-Services abgewickelt als mit firmeneigenen Rechenzentren. Durch Homeoffice und andere Innovationen erfolgt der Zugriff immer seltener aus der gesch\u00fctzten IT-Architektur des Unternehmens heraus.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:60px;width:100%;\"><\/div>\n<a class=\"awb-lightbox awb-lightbox-1\" href=\"https:\/\/www.youtube.com\/watch?v=jmI5eFimCc4\" data-rel=\"iLightbox\"><img decoding=\"async\" src=\"https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/09\/security.webp\" alt=\"Security as a Service\"><\/a><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:60px;width:100%;\"><\/div>\n<div class=\"fusion-text fusion-text-3\"><h2><span class=\"ez-toc-section\" id=\"Security_as_a_Service_verfolgt_einen_neuen_Ansatz\"><\/span>Security as a Service verfolgt einen neuen Ansatz<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Bislang war es in Firmen so, dass der Traffic komplett durch ein zentrales Rechenzentrum gef\u00fchrt wurde. Dort griffen dann die internen Sicherheitsma\u00dfnahmen wie Firewall, Virenschutzprogramme und Zugriffskontrollen. Um den hohen Sicherheitsanforderungen der heutigen Zeit gerecht zu werden, ist hierf\u00fcr aber ein immer gr\u00f6\u00dferes Spezialwissen erforderlich, das von normalen Usern kaum noch abgedeckt werden kann.<\/p>\n<p>Hinzu kommt, dass die internen Strukturen oft wenig benutzerfreundlich organisiert sind und der Administrationsaufwand der IT-Abteilung entsprechend hoch ist. Das kann zu sehr absurden Situationen f\u00fchren, in denen beispielsweise User im Homeoffice zun\u00e4chst in das Firmen-Rechenzentrum eingeloggt werden, um von dort aus auf Cloud-Software wie Microsoft Office zuzugreifen. Nicht selten wird der Zugriff durch die IT-Sicherheit dann blockiert und User m\u00fcssen mit <a href=\"https:\/\/de.wikipedia.org\/wiki\/Virtual_Private_Network\" target=\"_blank\" rel=\"noopener\">VPN<\/a> und anderen Tricks operieren. Anbieter von Security as a Service m\u00f6chten diese Probleme l\u00f6sen und die User-Experience verbessern.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:60px;width:100%;\"><\/div>\n<div class=\"fusion-text fusion-text-4\"><h2><span class=\"ez-toc-section\" id=\"SECaaS_funktioniert_ueberall\"><\/span>SECaaS funktioniert \u00fcberall<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5\"><p><a href=\"https:\/\/plansysteme.com\/de\/cloud-computing\/software-as-a-service\/\" target=\"_blank\" rel=\"noopener\">Software as a Service<\/a> ist inzwischen der Standard f\u00fcr viele Firmen, die dezentral und kosteneffizient arbeiten m\u00f6chten. Die Sicherheitsarchitektur muss entsprechend Schritt halten k\u00f6nnen. St\u00e4ndige Verf\u00fcgbarkeit und ortsunabh\u00e4ngige Erreichbarkeit (sofern eine Internet-Verbindung besteht) sind gro\u00dfe Pluspunkte der \u201eas-a-Service\u201c-L\u00f6sungen. Zudem l\u00e4sst sich Security as a Service ebenso einfach bedarfsgerecht skalieren wie andere Abo-Modelle im Bereich <a href=\"https:\/\/plansysteme.com\/de\/cloud-computing\/cloud-computing\/\" target=\"_blank\" rel=\"noopener\">Cloud Computing<\/a>.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\"><div id=\"attachment_1798\" style=\"width: 591px\" class=\"wp-caption alignnone\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1798\" class=\"wp-image-1798 size-full\" src=\"https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/09\/security-as-a-service.webp\" alt=\"security as a service\" width=\"581\" height=\"436\" srcset=\"https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/09\/security-as-a-service-200x150.webp 200w, https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/09\/security-as-a-service-300x225.webp 300w, https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/09\/security-as-a-service-400x300.webp 400w, https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/09\/security-as-a-service.webp 581w\" sizes=\"(max-width: 581px) 100vw, 581px\" \/><p id=\"caption-attachment-1798\" class=\"wp-caption-text\">\u00a9 Microsoft<\/p><\/div>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:5px;margin-bottom:5px;width:100%;\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7\"><p><img decoding=\"async\" class=\"alignnone size-full wp-image-1804\" src=\"https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/09\/security-1.webp\" alt=\"security\" width=\"581\" height=\"436\" srcset=\"https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/09\/security-1-200x150.webp 200w, https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/09\/security-1-300x225.webp 300w, https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/09\/security-1-400x300.webp 400w, https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/09\/security-1.webp 581w\" sizes=\"(max-width: 581px) 100vw, 581px\" \/><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8\"><p>Alle Nutzerinnen und Nutzer, die sich im firmeneigenen Netzwerk bewegen und die Cloud-Dienste nutzen, werden \u00fcber SECaaS-Funktionen gleichzeitig abgesichert, unabh\u00e4ngig davon, ob jemand sein letztes Update verschoben hat oder nicht. Da die Dienste cloudbasiert sind und entsprechend vom Anbieter gepflegt werden, besteht immer der aktuellste Schutz vor Bedrohungen der virtuellen Sicherheit.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:60px;width:100%;\"><\/div>\n<div class=\"fusion-text fusion-text-9\"><h2><span class=\"ez-toc-section\" id=\"Weniger_Sicherheitsluecken_in_IT-Systemen_von_Firmen\"><\/span>Weniger Sicherheitsl\u00fccken in IT-Systemen von Firmen<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Durch die Nutzung von SECaaS-Angeboten reduziert sich auch die Zahl an potenziellen Sicherheitsl\u00fccken im Firmen-Netzwerk, die von au\u00dfen ausgenutzt werden k\u00f6nnten. Gerade durch Homeoffice und die ortsunabh\u00e4ngige Auslagerung gef\u00e4hrden einzelne User durch Unkenntnis oder Fahrl\u00e4ssigkeit die Sicherheit der Unternehmens-IT, etwa durch die Verbindung mit unsicheren WLAN-Hotspots im Caf\u00e9 nebenan oder fehlenden Aktualisierungen des eigenen Rechners. Mobile Ger\u00e4te sind daher besonders lohnende Ziele f\u00fcr Hackerangriffe und andere Cyber-Kriminalit\u00e4t.<\/p>\n<p>Es ist f\u00fcr Unternehmen inzwischen unm\u00f6glich geworden, alle denkbaren Verbindungen hinreichend abzusichern. Setzt die Sicherheitsarchitektur aber nicht mehr im lokalen Rechenzentrum, sondern direkt in der Cloud-Umgebung an, ist die Gefahr f\u00fcr erfolgreiche Angriffe von au\u00dfen sehr viel geringer.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:60px;width:100%;\"><\/div>\n<\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-no-small-visibility\" style=\"align-self: flex-start;margin-right:auto;margin-bottom:5px;width:100%;max-width:25px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#b51621;border-color:#b51621;border-top-width:1px;\"><\/div><\/div><div class=\"fusion-text fusion-text-10\"><p><span style=\"color: #b51621; font-size: 25.6px; font-family: 'Barlow Condensed',sans-serif; font-weight: 400;\">PLANSYSTEME<\/span><br \/>\n<span style=\"font-size: 28px; font-weight: bold;\">HABEN SIE IRGENDWELCHE FRAGEN? GERNE K\u00d6NNEN SIE UNS KONTAKTIEREN!<\/span><br \/>\nBitte z\u00f6gern Sie nicht uns zu kontaktieren. In einem ersten unverbindlichen Gespr\u00e4ch finden wir heraus, wie wir Ihnen helfen k\u00f6nnen und ob unsere L\u00f6sungen zu Ihren Bed\u00fcrfnissen passen. Wir freuen uns auf Sie!<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-1 fusion-button-span-yes fusion-button-default-type Buttonkontakt\" style=\"--awb-margin-top:95px;--button_accent_color:#ffffff;--button_accent_hover_color:#ffffff;--button_border_hover_color:#212529;--button_gradient_top_color:#b51621;--button_gradient_bottom_color:#b51621;--button_gradient_top_color_hover:#212529;--button_gradient_bottom_color_hover:#212529;--button_text_transform:uppercase;\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Kontakt\" aria-label=\"Kontakt\" href=\"https:\/\/plansysteme.com\/de\/kontakt\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Kontakt<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:60px;width:100%;\"><\/div>\n<div class=\"fusion-text fusion-text-11\"><h2><span class=\"ez-toc-section\" id=\"Fragen_und_Antworten_zu_Security_as_a_Service\"><\/span>Fragen und Antworten zu Security as a Service<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:19.2px;--awb-icon-alignment:left;--awb-hover-color:#f9f9fb;--awb-border-color:#e2e2e2;--awb-background-color:#ffffff;--awb-divider-color:#3e3e3e;--awb-divider-hover-color:#3e3e3e;--awb-icon-color:#ffffff;--awb-title-color:#b51621;--awb-content-color:#ffffff;--awb-icon-box-color:#3e3e3e;--awb-toggle-hover-accent-color:#b51621;--awb-title-font-family:&quot;Barlow Condensed&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-content-font-family:&quot;Muli&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-1791-1\"><div class=\"fusion-panel panel-default panel-a8cb6203ed380842b fusion-toggle-has-divider\" style=\"--awb-title-color:#b51621;--awb-content-color:#ffffff;\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_a8cb6203ed380842b\"><a aria-expanded=\"false\" aria-controls=\"a8cb6203ed380842b\" role=\"button\" data-toggle=\"collapse\" data-target=\"#a8cb6203ed380842b\" href=\"#a8cb6203ed380842b\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Was beinhaltet SECaaS?<\/span><\/a><\/h4><\/div><div id=\"a8cb6203ed380842b\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_a8cb6203ed380842b\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<ul>\n<li><em>Verhinderung von Datenverlust<\/em><\/li>\n<li><em>Notfallwiederherstellung<\/em><\/li>\n<li><em>E-Mail-Sicherheit<\/em><\/li>\n<li><em>Virenschutzverwaltung<\/em><\/li>\n<li><em>Spam-Filterung<\/em><\/li>\n<li><em>Identit\u00e4ts- und Zugriffsverwaltung<\/em><\/li>\n<li><em>Eindringschutz<\/em><\/li>\n<li><em>Netzwerksicherheit<\/em><\/li>\n<li><em>Internetsicherheit<\/em><\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-b23b5d7a35ab6f7ea fusion-toggle-has-divider\" style=\"--awb-title-color:#b51621;--awb-content-color:#ffffff;\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_b23b5d7a35ab6f7ea\"><a aria-expanded=\"false\" aria-controls=\"b23b5d7a35ab6f7ea\" role=\"button\" data-toggle=\"collapse\" data-target=\"#b23b5d7a35ab6f7ea\" href=\"#b23b5d7a35ab6f7ea\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Welche Vorteile hat Security as a Service?<\/span><\/a><\/h4><\/div><div id=\"b23b5d7a35ab6f7ea\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_b23b5d7a35ab6f7ea\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><em>Einer der gr\u00f6\u00dften Vorteile eines Security as a Service-Modells sind die Kosteneinsparungen f\u00fcr Unternehmen. Weitere Vorteile sind schnellere Bereitstellung und mehr Agilit\u00e4t und das Freisetzen von Ressourcen.<\/em><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":1794,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[87,92,91,74],"class_list":["post-1791","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing","tag-cloud","tag-secaas","tag-security","tag-service"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.11 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security as a Service (SECaaS) | Plansysteme<\/title>\n<meta name=\"description\" content=\"Security as a Service hilft Unternehmen ihre eigenen IT-Infrastrukturen und lokalen Rechenzentren zuverl\u00e4ssig zu sichern.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security as a Service (SECaaS)\" \/>\n<meta property=\"og:description\" content=\"Security as a Service hilft Unternehmen ihre eigenen IT-Infrastrukturen und lokalen Rechenzentren zuverl\u00e4ssig zu sichern.\" \/>\n<meta property=\"og:url\" content=\"http:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/\" \/>\n<meta property=\"og:site_name\" content=\"Plansysteme\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/login\/?next=httpswww.facebook.comPlansystemeGmbH\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-07T08:00:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/09\/cloud.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Sandra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sandra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"18\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/security-as-a-service-secaas\\\/#article\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/security-as-a-service-secaas\\\/\"},\"author\":{\"name\":\"Sandra\",\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#\\\/schema\\\/person\\\/41afc55c60ec63ca2bafd962b8295993\"},\"headline\":\"Security as a Service (SECaaS)\",\"datePublished\":\"2022-11-07T08:00:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/security-as-a-service-secaas\\\/\"},\"wordCount\":5593,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/security-as-a-service-secaas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/plansysteme.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/cloud.webp\",\"keywords\":[\"cloud\",\"secaas\",\"security\",\"service\"],\"articleSection\":[\"Cloud Computing | Augmented Reality Industrie 4.0\"],\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/security-as-a-service-secaas\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/security-as-a-service-secaas\\\/\",\"url\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/security-as-a-service-secaas\\\/\",\"name\":\"Security as a Service (SECaaS) | Plansysteme\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/security-as-a-service-secaas\\\/#primaryimage\"},\"image\":{\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/security-as-a-service-secaas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/plansysteme.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/cloud.webp\",\"datePublished\":\"2022-11-07T08:00:16+00:00\",\"description\":\"Security as a Service hilft Unternehmen ihre eigenen IT-Infrastrukturen und lokalen Rechenzentren zuverl\u00e4ssig zu sichern.\",\"breadcrumb\":{\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/security-as-a-service-secaas\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/security-as-a-service-secaas\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/security-as-a-service-secaas\\\/#primaryimage\",\"url\":\"https:\\\/\\\/plansysteme.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/cloud.webp\",\"contentUrl\":\"https:\\\/\\\/plansysteme.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/cloud.webp\",\"width\":1000,\"height\":667,\"caption\":\"security as a service\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\\\/\\\/plansysteme.com\\\/de\\\/cloud-computing\\\/security-as-a-service-secaas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Computing | Augmented Reality Industrie 4.0\",\"item\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/category\\\/cloud-computing\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security as a Service (SECaaS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/\",\"name\":\"Plansysteme\",\"description\":\"Software mit System\",\"publisher\":{\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#organization\"},\"alternateName\":\"Plansysteme GmbH\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#organization\",\"name\":\"Plansysteme GmbH\",\"alternateName\":\"Plansysteme\",\"url\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/plansysteme.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo-ohne-Reiter.png\",\"contentUrl\":\"https:\\\/\\\/plansysteme.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo-ohne-Reiter.png\",\"width\":725,\"height\":175,\"caption\":\"Plansysteme GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/login\\\/?next=httpswww.facebook.comPlansystemeGmbH\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/plansysteme-gmbh\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCG-FU-CijbCqIpbZcreuCZw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/plansysteme.com\\\/de\\\/#\\\/schema\\\/person\\\/41afc55c60ec63ca2bafd962b8295993\",\"name\":\"Sandra\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security as a Service (SECaaS) | Plansysteme","description":"Security as a Service hilft Unternehmen ihre eigenen IT-Infrastrukturen und lokalen Rechenzentren zuverl\u00e4ssig zu sichern.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/","og_locale":"de_DE","og_type":"article","og_title":"Security as a Service (SECaaS)","og_description":"Security as a Service hilft Unternehmen ihre eigenen IT-Infrastrukturen und lokalen Rechenzentren zuverl\u00e4ssig zu sichern.","og_url":"http:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/","og_site_name":"Plansysteme","article_publisher":"https:\/\/www.facebook.com\/login\/?next=httpswww.facebook.comPlansystemeGmbH","article_published_time":"2022-11-07T08:00:16+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/09\/cloud.webp","type":"image\/webp"}],"author":"Sandra","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Sandra","Gesch\u00e4tzte Lesezeit":"18\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/#article","isPartOf":{"@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/"},"author":{"name":"Sandra","@id":"https:\/\/plansysteme.com\/de\/#\/schema\/person\/41afc55c60ec63ca2bafd962b8295993"},"headline":"Security as a Service (SECaaS)","datePublished":"2022-11-07T08:00:16+00:00","mainEntityOfPage":{"@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/"},"wordCount":5593,"commentCount":0,"publisher":{"@id":"https:\/\/plansysteme.com\/de\/#organization"},"image":{"@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/#primaryimage"},"thumbnailUrl":"https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/09\/cloud.webp","keywords":["cloud","secaas","security","service"],"articleSection":["Cloud Computing | Augmented Reality Industrie 4.0"],"inLanguage":"de","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/#respond"]}]},{"@type":"WebPage","@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/","url":"http:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/","name":"Security as a Service (SECaaS) | Plansysteme","isPartOf":{"@id":"https:\/\/plansysteme.com\/de\/#website"},"primaryImageOfPage":{"@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/#primaryimage"},"image":{"@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/#primaryimage"},"thumbnailUrl":"https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/09\/cloud.webp","datePublished":"2022-11-07T08:00:16+00:00","description":"Security as a Service hilft Unternehmen ihre eigenen IT-Infrastrukturen und lokalen Rechenzentren zuverl\u00e4ssig zu sichern.","breadcrumb":{"@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["http:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/#primaryimage","url":"https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/09\/cloud.webp","contentUrl":"https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/09\/cloud.webp","width":1000,"height":667,"caption":"security as a service"},{"@type":"BreadcrumbList","@id":"http:\/\/plansysteme.com\/de\/cloud-computing\/security-as-a-service-secaas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/plansysteme.com\/de\/"},{"@type":"ListItem","position":2,"name":"Cloud Computing | Augmented Reality Industrie 4.0","item":"https:\/\/plansysteme.com\/de\/category\/cloud-computing\/"},{"@type":"ListItem","position":3,"name":"Security as a Service (SECaaS)"}]},{"@type":"WebSite","@id":"https:\/\/plansysteme.com\/de\/#website","url":"https:\/\/plansysteme.com\/de\/","name":"Plansysteme","description":"Software mit System","publisher":{"@id":"https:\/\/plansysteme.com\/de\/#organization"},"alternateName":"Plansysteme GmbH","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/plansysteme.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/plansysteme.com\/de\/#organization","name":"Plansysteme GmbH","alternateName":"Plansysteme","url":"https:\/\/plansysteme.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/plansysteme.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/06\/Logo-ohne-Reiter.png","contentUrl":"https:\/\/plansysteme.com\/wp-content\/uploads\/2022\/06\/Logo-ohne-Reiter.png","width":725,"height":175,"caption":"Plansysteme GmbH"},"image":{"@id":"https:\/\/plansysteme.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/login\/?next=httpswww.facebook.comPlansystemeGmbH","https:\/\/www.linkedin.com\/company\/plansysteme-gmbh\/","https:\/\/www.youtube.com\/channel\/UCG-FU-CijbCqIpbZcreuCZw"]},{"@type":"Person","@id":"https:\/\/plansysteme.com\/de\/#\/schema\/person\/41afc55c60ec63ca2bafd962b8295993","name":"Sandra"}]}},"_links":{"self":[{"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/posts\/1791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/comments?post=1791"}],"version-history":[{"count":0,"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/posts\/1791\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/media\/1794"}],"wp:attachment":[{"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/media?parent=1791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/categories?post=1791"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/plansysteme.com\/de\/wp-json\/wp\/v2\/tags?post=1791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}