{"id":1563,"date":"2025-01-25T12:56:26","date_gmt":"2025-01-25T11:56:26","guid":{"rendered":"https:\/\/itc42.lokalix.de\/services\/network-security\/"},"modified":"2025-03-23T13:00:50","modified_gmt":"2025-03-23T12:00:50","slug":"network-security","status":"publish","type":"page","link":"https:\/\/itc42.com\/en\/services\/network-security\/","title":{"rendered":"Network Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1563\" class=\"elementor elementor-1563 elementor-655\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f395e3d e-con-full e-flex e-con e-parent\" data-id=\"f395e3d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf2a47a elementor-widget elementor-widget-template\" data-id=\"cf2a47a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"page\" data-elementor-id=\"1597\" class=\"elementor elementor-1597 elementor-671 elementor-671\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-23450c3 e-flex e-con-boxed e-con e-parent\" data-id=\"23450c3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d52d3fa e-con-full e-flex e-con e-child\" data-id=\"d52d3fa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d118ce4 elementor-widget elementor-widget-heading\" data-id=\"d118ce4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Network Security<span style=\"color: #9085be\">.<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da374fb elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"da374fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSecure networks are the indispensable foundation of any modern IT infrastructure.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d4b0df0 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"d4b0df0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-439697c e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-child\" data-id=\"439697c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3b8e6d3 e-flex e-con-boxed e-con e-parent\" data-id=\"3b8e6d3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b9c7e81 e-con-full e-flex e-con e-child\" data-id=\"b9c7e81\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-617c42b e-con-full e-flex e-con e-child\" data-id=\"617c42b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-de811bb e-con-full e-flex e-con e-child\" data-id=\"de811bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f9b022f elementor-widget elementor-widget-heading\" data-id=\"f9b022f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Increasing threats - growing responsibility<span style=\"color: #9085be\">.<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-629f28c elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"629f28c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAs digitalization progresses, the demands on the security of enterprise networks are also increasing. Inadequate protection can lead not only to financial losses but also to legal consequences for company management. A clear security strategy is essential to ward off attacks and meet compliance requirements.  \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-af8fd7d e-con-full e-flex e-con e-child\" data-id=\"af8fd7d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cbf17d6 elementor-widget elementor-widget-heading\" data-id=\"cbf17d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security concepts for maximum network security<span style=\"color: #9085be\">.<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8dc0d7d elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"8dc0d7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOur consultants develop customized security solutions that are precisely tailored to your company structure. We analyze which security zones are required within your network and define how they need to be secured both internally and externally. We provide you with comprehensive advice on suitable security measures and the appropriate technologies to protect your network from threats and meet legal requirements.  \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7757fd9 e-con-full e-flex e-con e-child\" data-id=\"7757fd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c90c07 elementor-widget elementor-widget-heading\" data-id=\"7c90c07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect your network<span style=\"color: #9085be\">.<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc470d6 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"bc470d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCyberattacks and security breaches are not a question of if, but when. Ensure robust network security now to minimize risks and comply with legal requirements. Contact us for an individual security consultation.  \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-713333c e-con-full e-flex e-con e-child\" data-id=\"713333c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce074da elementor-mobile-align-justify elementor-widget elementor-widget-button\" data-id=\"ce074da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/itc42.com\/startseite\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Optimize your network now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28e4112 e-con-full e-flex e-con e-child\" data-id=\"28e4112\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t<div class=\"elementor-element elementor-element-24bad29 e-con-full e-flex e-con e-child\" data-id=\"24bad29\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-1655e29 e-con-full e-flex e-con e-child\" data-id=\"1655e29\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ccd5782 elementor-view-stacked grow-on-hover elementor-position-inline-start elementor-shape-circle elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"ccd5782\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-building\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M436 480h-20V24c0-13.255-10.745-24-24-24H56C42.745 0 32 10.745 32 24v456H12c-6.627 0-12 5.373-12 12v20h448v-20c0-6.627-5.373-12-12-12zM128 76c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12v40c0 6.627-5.373 12-12 12h-40c-6.627 0-12-5.373-12-12V76zm0 96c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12v40c0 6.627-5.373 12-12 12h-40c-6.627 0-12-5.373-12-12v-40zm52 148h-40c-6.627 0-12-5.373-12-12v-40c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12v40c0 6.627-5.373 12-12 12zm76 160h-64v-84c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12v84zm64-172c0 6.627-5.373 12-12 12h-40c-6.627 0-12-5.373-12-12v-40c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12v40zm0-96c0 6.627-5.373 12-12 12h-40c-6.627 0-12-5.373-12-12v-40c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12v40zm0-96c0 6.627-5.373 12-12 12h-40c-6.627 0-12-5.373-12-12V76c0-6.627 5.373-12 12-12h40c6.627 0 12 5.373 12 12v40z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tITC42 GmbH &amp; Co KG\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAachener Str. 1158a<br>50858 Cologne\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e756887 elementor-view-stacked grow-on-hover elementor-position-inline-start elementor-shape-circle elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"e756887\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-phone-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M497.39 361.8l-112-48a24 24 0 0 0-28 6.9l-49.6 60.6A370.66 370.66 0 0 1 130.6 204.11l60.6-49.6a23.94 23.94 0 0 0 6.9-28l-48-112A24.16 24.16 0 0 0 122.6.61l-104 24A24 24 0 0 0 0 48c0 256.5 207.9 464 464 464a24 24 0 0 0 23.4-18.6l24-104a24.29 24.29 0 0 0-14.01-27.6z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tContact us\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tPhone: +49 2234 3690660<br>E-mail: info@itc42.com\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":1555,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1563","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Network Security &#8211; ITC42 GmbH &amp; Co. KG<\/title>\n<meta name=\"description\" content=\"Network security for companies: Protect your IT from cyber threats, meet compliance requirements and secure yourself.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itc42.com\/en\/services\/network-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Security &#8211; ITC42 GmbH &amp; Co. KG\" \/>\n<meta property=\"og:description\" content=\"Network security for companies: Protect your IT from cyber threats, meet compliance requirements and secure yourself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itc42.com\/en\/services\/network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ITC42 GmbH &amp; Co. KG\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-23T12:00:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itc42.com\/wp-content\/uploads\/2025\/01\/itc42_logo_transparent-e1736333215805.png\" \/>\n\t<meta property=\"og:image:width\" content=\"714\" \/>\n\t<meta property=\"og:image:height\" content=\"218\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/itc42.com\\\/en\\\/services\\\/network-security\\\/\",\"url\":\"https:\\\/\\\/itc42.com\\\/en\\\/services\\\/network-security\\\/\",\"name\":\"Network Security &#8211; ITC42 GmbH &amp; Co. KG\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/itc42.com\\\/en\\\/#website\"},\"datePublished\":\"2025-01-25T11:56:26+00:00\",\"dateModified\":\"2025-03-23T12:00:50+00:00\",\"description\":\"Network security for companies: Protect your IT from cyber threats, meet compliance requirements and secure yourself.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/itc42.com\\\/en\\\/services\\\/network-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/itc42.com\\\/en\\\/services\\\/network-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/itc42.com\\\/en\\\/services\\\/network-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/itc42.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\\\/\\\/itc42.com\\\/en\\\/services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Network Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/itc42.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/itc42.com\\\/en\\\/\",\"name\":\"ITC42 \u2013 IT-Beratung & Netzwerkl\u00f6sungen f\u00fcr Unternehmen\",\"description\":\"Beratung und L\u00f6sungen f\u00fcr eine sichere und effiziente Netzwerke\",\"publisher\":{\"@id\":\"https:\\\/\\\/itc42.com\\\/en\\\/#organization\"},\"alternateName\":\"ITC42 \u2013 IT-Consulting & Netzwerkl\u00f6sungen\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/itc42.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/itc42.com\\\/en\\\/#organization\",\"name\":\"ITC42 GmbH & Co. KG\",\"alternateName\":\"ITC42 \u2013 IT-Consulting & Netzwerkl\u00f6sungen\",\"url\":\"https:\\\/\\\/itc42.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/itc42.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/itc42.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/itc42_logo.jpg\",\"contentUrl\":\"https:\\\/\\\/itc42.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/itc42_logo.jpg\",\"width\":714,\"height\":291,\"caption\":\"ITC42 GmbH & Co. KG\"},\"image\":{\"@id\":\"https:\\\/\\\/itc42.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Security &#8211; ITC42 GmbH &amp; Co. KG","description":"Network security for companies: Protect your IT from cyber threats, meet compliance requirements and secure yourself.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itc42.com\/en\/services\/network-security\/","og_locale":"en_US","og_type":"article","og_title":"Network Security &#8211; ITC42 GmbH &amp; Co. KG","og_description":"Network security for companies: Protect your IT from cyber threats, meet compliance requirements and secure yourself.","og_url":"https:\/\/itc42.com\/en\/services\/network-security\/","og_site_name":"ITC42 GmbH &amp; Co. KG","article_modified_time":"2025-03-23T12:00:50+00:00","og_image":[{"width":714,"height":218,"url":"https:\/\/itc42.com\/wp-content\/uploads\/2025\/01\/itc42_logo_transparent-e1736333215805.png","type":"image\/png"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/itc42.com\/en\/services\/network-security\/","url":"https:\/\/itc42.com\/en\/services\/network-security\/","name":"Network Security &#8211; ITC42 GmbH &amp; Co. KG","isPartOf":{"@id":"https:\/\/itc42.com\/en\/#website"},"datePublished":"2025-01-25T11:56:26+00:00","dateModified":"2025-03-23T12:00:50+00:00","description":"Network security for companies: Protect your IT from cyber threats, meet compliance requirements and secure yourself.","breadcrumb":{"@id":"https:\/\/itc42.com\/en\/services\/network-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itc42.com\/en\/services\/network-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/itc42.com\/en\/services\/network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/itc42.com\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/itc42.com\/en\/services\/"},{"@type":"ListItem","position":3,"name":"Network Security"}]},{"@type":"WebSite","@id":"https:\/\/itc42.com\/en\/#website","url":"https:\/\/itc42.com\/en\/","name":"ITC42 \u2013 IT-Beratung & Netzwerkl\u00f6sungen f\u00fcr Unternehmen","description":"Beratung und L\u00f6sungen f\u00fcr eine sichere und effiziente Netzwerke","publisher":{"@id":"https:\/\/itc42.com\/en\/#organization"},"alternateName":"ITC42 \u2013 IT-Consulting & Netzwerkl\u00f6sungen","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itc42.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itc42.com\/en\/#organization","name":"ITC42 GmbH & Co. KG","alternateName":"ITC42 \u2013 IT-Consulting & Netzwerkl\u00f6sungen","url":"https:\/\/itc42.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itc42.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/itc42.com\/wp-content\/uploads\/2025\/01\/itc42_logo.jpg","contentUrl":"https:\/\/itc42.com\/wp-content\/uploads\/2025\/01\/itc42_logo.jpg","width":714,"height":291,"caption":"ITC42 GmbH & Co. KG"},"image":{"@id":"https:\/\/itc42.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/itc42.com\/en\/wp-json\/wp\/v2\/pages\/1563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itc42.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itc42.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itc42.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itc42.com\/en\/wp-json\/wp\/v2\/comments?post=1563"}],"version-history":[{"count":1,"href":"https:\/\/itc42.com\/en\/wp-json\/wp\/v2\/pages\/1563\/revisions"}],"predecessor-version":[{"id":1565,"href":"https:\/\/itc42.com\/en\/wp-json\/wp\/v2\/pages\/1563\/revisions\/1565"}],"up":[{"embeddable":true,"href":"https:\/\/itc42.com\/en\/wp-json\/wp\/v2\/pages\/1555"}],"wp:attachment":[{"href":"https:\/\/itc42.com\/en\/wp-json\/wp\/v2\/media?parent=1563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}