{"id":14929,"date":"2024-07-22T23:32:23","date_gmt":"2024-07-22T23:32:23","guid":{"rendered":"https:\/\/techrenzhe.com\/website_eed82bcb\/?page_id=14929"},"modified":"2026-02-04T00:24:42","modified_gmt":"2026-02-04T00:24:42","slug":"penetrationstests","status":"publish","type":"page","link":"https:\/\/compliancert.com\/de\/penetrationstests\/","title":{"rendered":"Penetrationstests"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"14929\" class=\"elementor elementor-14929\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4e1d4b6 elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"4e1d4b6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-30220cc\" data-id=\"30220cc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b2a9839 e-flex e-con-boxed e-con e-parent\" data-id=\"b2a9839\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba035a0 animated-slow elementor-widget__width-initial elementor-headline--style-highlight elementor-invisible elementor-widget elementor-widget-animated-headline\" data-id=\"ba035a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;highlighted_text&quot;:&quot;Penetration Testing.&quot;,&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:300,&quot;marker&quot;:&quot;underline&quot;,&quot;headline_style&quot;:&quot;highlight&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;highlight_animation_duration&quot;:1200,&quot;highlight_iteration_delay&quot;:8000}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h1 class=\"elementor-headline\">\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">Schweizer Qualit\u00e4t<\/span>\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">Penetrationstests.<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">OSCP-zertifiziert.<\/span>\n\t\t\t\t\t<\/h1>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dcbf362 e-flex e-con-boxed e-con e-parent\" data-id=\"dcbf362\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-4b5a4fc elementor-widget__width-auto vamtam-has-underline-anim elementor-widget elementor-widget-button\" data-id=\"4b5a4fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjI1MjU4IiwidG9nZ2xlIjpmYWxzZSwiYWxpZ25fd2l0aF9wYXJlbnQiOiIifQ%3D%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Konsultation buchen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4a91552 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4a91552\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-601d63e\" data-id=\"601d63e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9eeafb6 elementor-widget elementor-widget-text-editor\" data-id=\"9eeafb6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Vertrauen in das f\u00fchrende Innovations-\u00d6kosystem der Schweiz<\/p><p><!-- notionvc: 7f88e2b3-6c15-4490-acd0-5e29a5be61cf --><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f4d654 e-grid e-con-boxed e-con e-parent\" data-id=\"5f4d654\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-236433c elementor-widget elementor-widget-image\" data-id=\"236433c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"307\" height=\"90\" src=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2026\/01\/Innovaud-logo-one-line-RGB-COLOR-01-1-1.png?fit=307%2C90&amp;ssl=1\" class=\"attachment-large size-large wp-image-26313\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2026\/01\/Innovaud-logo-one-line-RGB-COLOR-01-1-1.png?w=307&amp;ssl=1 307w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2026\/01\/Innovaud-logo-one-line-RGB-COLOR-01-1-1.png?resize=300%2C88&amp;ssl=1 300w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2026\/01\/Innovaud-logo-one-line-RGB-COLOR-01-1-1.png?resize=18%2C5&amp;ssl=1 18w\" sizes=\"(max-width: 307px) 100vw, 307px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-822147f elementor-widget elementor-widget-image\" data-id=\"822147f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"298\" height=\"77\" src=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2026\/01\/unlilitrust_Logo_BLEU_RVB-1.png?fit=298%2C77&amp;ssl=1\" class=\"attachment-large size-large wp-image-26316\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2026\/01\/unlilitrust_Logo_BLEU_RVB-1.png?w=298&amp;ssl=1 298w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2026\/01\/unlilitrust_Logo_BLEU_RVB-1.png?resize=18%2C5&amp;ssl=1 18w\" sizes=\"(max-width: 298px) 100vw, 298px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4b580e elementor-widget elementor-widget-image\" data-id=\"d4b580e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"180\" height=\"99\" src=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2026\/01\/trust-valley-logo.png?fit=180%2C99&amp;ssl=1\" class=\"attachment-large size-large wp-image-26315\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2026\/01\/trust-valley-logo.png?w=180&amp;ssl=1 180w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2026\/01\/trust-valley-logo.png?resize=18%2C10&amp;ssl=1 18w\" sizes=\"(max-width: 180px) 100vw, 180px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2460d6 elementor-widget elementor-widget-image\" data-id=\"e2460d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"152\" height=\"82\" src=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2026\/01\/tech4trust-logo.png?fit=152%2C82&amp;ssl=1\" class=\"attachment-large size-large wp-image-26314\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2026\/01\/tech4trust-logo.png?w=152&amp;ssl=1 152w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2026\/01\/tech4trust-logo.png?resize=150%2C82&amp;ssl=1 150w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2026\/01\/tech4trust-logo.png?resize=18%2C10&amp;ssl=1 18w\" sizes=\"(max-width: 152px) 100vw, 152px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e08f992 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e08f992\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9a8772e\" data-id=\"9a8772e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-011ee8f elementor-align-start elementor-widget__width-auto elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"011ee8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-brand-symbol\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cybersecurity Dienstleistungen<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39c0cb5 elementor-widget elementor-widget-heading\" data-id=\"39c0cb5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Penetrationstests: Warum Sie sie brauchen, wann sie erforderlich sind und welcher Typ zu Ihnen passt<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df31c02 elementor-widget elementor-widget-text-editor\" data-id=\"df31c02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">Erkennen Sie Schwachstellen, bevor es Hacker tun. Wir bieten manuelles, von Experten geleitetes Ethical Hacking f\u00fcr die Einhaltung von ISO 27001, SOC 2 und FADP.<\/p><ul><li><b data-path-to-node=\"3,4,1,1\" data-index-in-node=\"0\">Null Fehlalarme<\/b> (Manuelle Verifizierung)<\/li><li><b data-path-to-node=\"3,4,1,1\" data-index-in-node=\"45\">Team in der Schweiz<\/b> (Daten bleiben in der Schweiz)<\/li><li><b data-path-to-node=\"3,4,1,1\" data-index-in-node=\"92\">Pr\u00fcfungsreife Berichte<\/b> (Von den Big 4 Wirtschaftspr\u00fcfern akzeptiert)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-371cf62 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"371cf62\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-48c5cf1\" data-id=\"48c5cf1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b28454 elementor-widget elementor-widget-heading\" data-id=\"5b28454\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Audit-Ready Pentesting f\u00fcr jedes Framework<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db92d46 elementor-widget elementor-widget-text-editor\" data-id=\"db92d46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">Lassen Sie nicht zu, dass ein fehlender Pentest Ihre Zertifizierung verz\u00f6gert. Wir passen unseren Testumfang an die spezifischen Nachweisanforderungen Ihres Auditors an und stellen sicher, dass Sie die Anforderungen von Anhang A (ISO 27001), CC6 (SOC 2) und Art. 32 (GDPR\/FADP) Anforderungen erf\u00fcllen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-84c7ca6 e-grid e-con-boxed e-con e-parent\" data-id=\"84c7ca6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-41a911e e-con-full e-flex e-con e-child\" data-id=\"41a911e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b87db7 elementor-widget elementor-widget-heading\" data-id=\"7b87db7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">ISO 27001<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33f83a9 elementor-widget elementor-widget-text-editor\" data-id=\"33f83a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">Auch wenn dies nicht ausdr\u00fccklich vorgeschrieben ist, wird in der Praxis erwartet, dass Pentesting die Wirksamkeit von Anhang-A-Kontrollen in den Bereichen Schwachstellenmanagement, sichere Konfiguration, technische H\u00e4rtung und kontinuierliche Verbesserung nachweist.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c5406d e-con-full e-flex e-con e-child\" data-id=\"7c5406d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd9bb37 elementor-widget elementor-widget-heading\" data-id=\"dd9bb37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">SOC 2<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e309ce8 elementor-widget elementor-widget-text-editor\" data-id=\"e309ce8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">Nicht formell vorgeschrieben, aber von Pr\u00fcfern und Kunden weitgehend erwartet. Pentesting st\u00e4rkt den Nachweis f\u00fcr CC6.x-, CC7.x- und CC8.x-Sicherheitskriterien und gilt als Best Practice f\u00fcr Produktionssysteme.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-225c11f e-con-full e-flex e-con e-child\" data-id=\"225c11f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f7cc16e elementor-widget elementor-widget-heading\" data-id=\"f7cc16e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">GDPR &amp; FADP<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fee459 elementor-widget elementor-widget-text-editor\" data-id=\"1fee459\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">Beide Rahmenwerke (Art. 32 DSGVO und die Sicherheitspflichten des Schweizer DSG) verlangen \"angemessene technische und organisatorische Ma\u00dfnahmen\". Regelm\u00e4\u00dfige Sicherheitstests - einschlie\u00dflich Pentesting - sind eine wichtige Erwartung, um proaktive, risikobasierte Sicherheit zu demonstrieren.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eee4b74 e-con-full e-flex e-con e-child\" data-id=\"eee4b74\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a2d9c96 elementor-widget elementor-widget-heading\" data-id=\"a2d9c96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">HIPAA<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02feb19 elementor-widget elementor-widget-text-editor\" data-id=\"02feb19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">F\u00fcr vom HIPAA erfasste Einrichtungen und Gesch\u00e4ftspartner sind Penetrationstests ein empfohlener Teil der technischen Schutzma\u00dfnahmen der Security Rule und unterst\u00fctzen die kontinuierliche Risikobewertung.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-323330e e-con-full e-flex e-con e-child\" data-id=\"323330e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eb2e953 elementor-widget elementor-widget-heading\" data-id=\"eb2e953\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">ISO 42001 (AI-Managementsysteme)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f0c496 elementor-widget elementor-widget-text-editor\" data-id=\"6f0c496\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">Bei risikoreichen KI-Systemen erwartet das Gesetz, dass Organisationen eine robuste Cybersicherheit gew\u00e4hrleisten, Modellmanipulationen verhindern und die Sicherheit von Datenpipelines und Infrastrukturen validieren. Penetrationstests sind eine proaktive, abgestimmte Ma\u00dfnahme.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dac09ec e-con-full e-flex e-con e-child\" data-id=\"dac09ec\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27319c2 elementor-widget elementor-widget-heading\" data-id=\"27319c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">EU-KI-Gesetz<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-04ae1bf elementor-widget elementor-widget-text-editor\" data-id=\"04ae1bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">360Vue bietet Funktionen zur Einhaltung von SOC 2, wobei der Schwerpunkt auf Sicherheit, Verf\u00fcgbarkeit, Verarbeitungsintegrit\u00e4t, Vertraulichkeit und Datenschutz liegt, um die h\u00f6chsten Standards f\u00fcr Datensicherheit und Vertrauen zu erf\u00fcllen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9137909 e-con-full e-flex e-con e-child\" data-id=\"9137909\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b54ebd elementor-widget elementor-widget-heading\" data-id=\"5b54ebd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">NIS2<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e1a0d8 elementor-widget elementor-widget-text-editor\" data-id=\"0e1a0d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">Im Rahmen von NIS2 werden Penetrationstests f\u00fcr den Nachweis der Risikominderung, der Widerstandsf\u00e4higkeit und der Ausgereiftheit Ihrer technischen und organisatorischen Sicherheitsma\u00dfnahmen unerl\u00e4sslich.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a12075c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a12075c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-44ba788\" data-id=\"44ba788\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bd6842e elementor-align-start elementor-mobile-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"bd6842e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-brand-symbol\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Verbessern Sie Ihre Cybersicherheit mit unseren Expertendiensten!<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2674e23 elementor-widget elementor-widget-text-editor\" data-id=\"2674e23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">Wenden Sie sich noch heute an unsere Experten f\u00fcr Penetrationstests, um eine kostenlose Beratung zu erhalten und Ihre Cybersicherheit zu st\u00e4rken.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-629df4c\" data-id=\"629df4c\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-ed4f509 elementor-align-right elementor-widget__width-auto elementor-tablet-align-justify elementor-mobile-align-justify elementor-widget-tablet__width-inherit elementor-widget-mobile__width-inherit vamtam-has-underline-anim elementor-widget elementor-widget-button\" data-id=\"ed4f509\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/compliancert.com\/de\/kontakt-2\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Nehmen Sie Kontakt auf<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aef58a0 elementor-section-content-bottom elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aef58a0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-46a793f\" data-id=\"46a793f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aa65cff e-con-full e-flex e-con e-child\" data-id=\"aa65cff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d990ada elementor-widget elementor-widget-heading\" data-id=\"d990ada\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Vollst\u00e4ndige Abdeckung der Angriffsfl\u00e4che<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d4d47f elementor-widget elementor-widget-text-editor\" data-id=\"0d4d47f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Moderne Angriffe beschr\u00e4nken sich nicht auf einen Kanal. Unser offensives Sicherheitsteam testet Ihren gesamten digitalen Fu\u00dfabdruck, um Logikfehler zu finden, die automatischen Scannern entgehen.<\/p><p class=\"p1\">Zur Unterst\u00fctzung von GDPR, FADP, ISO 27001, ISO 42001, SOC 2, HIPAA, NIS2 und dem EU AI Act bieten wir eine breite Palette von Penetrationstests an, die auf Ihre Systeme, Datenstr\u00f6me und Ihr Risikoprofil zugeschnitten sind.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68a9da7 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"68a9da7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"101\" height=\"101\" src=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/11\/encrypted.png?fit=101%2C101&amp;ssl=1\" class=\"attachment-full size-full wp-image-26009\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/11\/encrypted.png?w=101&amp;ssl=1 101w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/11\/encrypted.png?resize=12%2C12&amp;ssl=1 12w\" sizes=\"(max-width: 101px) 100vw, 101px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Webanwendung und API-Sicherheit (SaaS)<\/h3><p class=\"elementor-image-box-description\">Kritisch f\u00fcr Frameworks, die eine regelm\u00e4\u00dfige Validierung von Anwendungen, APIs und exponierten Diensten erwarten - ISO 27001, SOC 2, GDPR\/FADP, NIS2, HIPAA, ISO 42001 und das EU AI Act.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a6319a elementor-widget elementor-widget-accordion\" data-id=\"8a6319a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1451\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1451\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-caret-up\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Penetrationstests f\u00fcr Webanwendungen<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1451\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1451\"><p>Erforderlich f\u00fcr Webplattformen, die sensible oder personenbezogene Daten verarbeiten. Relevant f\u00fcr ISO 27001 (A.8, A.12), SOC 2 (CC6\/CC7), GDPR Art. 32, NIS2, und HIPAA.<!-- notionvc: a6cc7272-c4b2-4d66-b2b5-7d83624b913e --><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1452\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1452\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-caret-up\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Penetrationstests f\u00fcr mobile Anwendungen<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1452\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1452\"><p>Wichtig f\u00fcr Anwendungen, die personenbezogene Daten verarbeiten oder \u00fcbermitteln - in \u00dcbereinstimmung mit GDPR\/FADP, ISO 27001, SOC 2 und HIPAA.<!-- notionvc: 58142a5f-82fd-4e82-8814-11dfbb5b5c24 --><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1453\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1453\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-caret-up\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">API-Penetrationstests<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1453\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1453\"><p>Unverzichtbar f\u00fcr SaaS, Microservices und KI-Systeme, die auf sichere Datenpipelines angewiesen sind. Wird bei ISO 27001, SOC 2, GDPR, NIS2, ISO 42001 und dem EU-KI-Gesetz dringend erwartet.<!-- notionvc: a6f4fcbd-9639-417b-b623-3db02591822b --><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1454\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1454\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-caret-up\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Penetrationstests f\u00fcr native\/kompilierte Anwendungen<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1454\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1454\"><p>Relevant, wenn Software an Benutzer verteilt oder auf Endger\u00e4ten installiert wird. Wird h\u00e4ufig f\u00fcr ISO 27001, SOC 2 und HIPAA verlangt.<!-- notionvc: a0f78aa2-04e2-4518-8454-f0ca7bc4ce12 --><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50c869b elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"50c869b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"84\" height=\"84\" src=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/11\/account_tree.png?fit=84%2C84&amp;ssl=1\" class=\"attachment-full size-full wp-image-26010\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/11\/account_tree.png?w=84&amp;ssl=1 84w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/11\/account_tree.png?resize=12%2C12&amp;ssl=1 12w\" sizes=\"(max-width: 84px) 100vw, 84px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Cloud &amp; Netzwerk-Infrastruktur<\/h3><p class=\"elementor-image-box-description\">Wird zur Validierung der Sicherheit interner\/externer Netzwerke und Cloud-Umgebungen verwendet - wird f\u00fcr ISO 27001, SOC 2, GDPR\/FADP, NIS2 und HIPAA erwartet.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e538319 elementor-widget elementor-widget-accordion\" data-id=\"e538319\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2401\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2401\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-caret-up\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Externe Netzwerk-Penetrationstests<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2401\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2401\"><p>Validiert internetf\u00e4hige Anlagen und ungesch\u00fctzte Angriffsfl\u00e4chen. Wichtig f\u00fcr ISO 27001, SOC 2, NIS2 und HIPAA.<!-- notionvc: 899b7003-9a8b-4991-9df0-26850aea3d05 --><br \/><!-- notionvc: a6cc7272-c4b2-4d66-b2b5-7d83624b913e --><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2402\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2402\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-caret-up\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Interne Netzwerk-Penetrationstests<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2402\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2402\"><p>Pr\u00fcft die seitliche Bewegung, die Segmentierung und die interne Sicherheitsposition. Wichtig f\u00fcr ISO 27001, SOC 2 und NIS2.<!-- notionvc: f4cc97c2-c48e-41ff-a56b-6e6db13083cf --><br \/><!-- notionvc: 58142a5f-82fd-4e82-8814-11dfbb5b5c24 --><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2403\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2403\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-caret-up\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Sicherheits\u00fcberpr\u00fcfungen von Cloud-Konfigurationen (AWS, Azure, GCP)<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2403\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2403\"><p>Heute ein Muss. Erforderlich als Nachweis f\u00fcr ISO 27001 (A.5.1, A.8, A.12), SOC 2 (CC6\/CC7), NIS2 und GDPR Art. 32 (Datenintegrit\u00e4t und -verf\u00fcgbarkeit).<!-- notionvc: 782bfbd7-9c63-4323-b0cc-0e5488c9e044 --><br \/><!-- notionvc: a6f4fcbd-9639-417b-b623-3db02591822b --><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2404\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-2404\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-caret-up\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Firewall-Regelsatz-Bewertungen<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2404\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-2404\"><p>Sorgt f\u00fcr geh\u00e4rtete Perimetersicherheit - relevant f\u00fcr ISO 27001, SOC 2 und NIS2.<!-- notionvc: f0b83f02-d8a8-452e-bef0-b9f73e834da3 --><br \/><!-- notionvc: a0f78aa2-04e2-4518-8454-f0ca7bc4ce12 --><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2405\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-2405\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-caret-up\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Bewertungen der VPN-Konfiguration<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2405\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-2405\"><p>Erforderlich, wenn Fernzugriff oder privilegierter Zugriff Teil der Umgebung ist - ISO 27001, NIS2 und HIPAA.<!-- notionvc: 46465aee-8013-4ce7-8968-dcf8bbe87696 --><br \/><!-- notionvc: a0f78aa2-04e2-4518-8454-f0ca7bc4ce12 --><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2406\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-2406\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-caret-up\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Bewertungen zur Sicherheit von Netzwerkger\u00e4ten<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2406\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-2406\"><p>Unterst\u00fctzt ISO 27001 und NIS2 durch Validierung von Router-, Switch- und Ger\u00e4tekonfigurationen.<!-- notionvc: 0ab42587-b0ba-487b-8204-798c672e3b69 --><br \/><!-- notionvc: a0f78aa2-04e2-4518-8454-f0ca7bc4ce12 --><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e199608 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"e199608\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"87\" height=\"86\" src=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/11\/stream.png?fit=87%2C86&amp;ssl=1\" class=\"attachment-full size-full wp-image-26011\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/11\/stream.png?w=87&amp;ssl=1 87w, https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/11\/stream.png?resize=12%2C12&amp;ssl=1 12w\" sizes=\"(max-width: 87px) 100vw, 87px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Social Engineering und Phishing<\/h3><p class=\"elementor-image-box-description\">Spiegelt die organisatorischen Kontrollen wider, die von GDPR\/FADP, ISO 27001, SOC 2, NIS2 und HIPAA erwartet werden.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c40e283 elementor-widget elementor-widget-accordion\" data-id=\"c40e283\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2051\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2051\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-caret-up\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Social-Engineering-Bewertungen<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2051\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2051\"><p>Pr\u00fcft die organisatorische Bereitschaft und die Sicherheit auf der menschlichen Ebene. Relevant f\u00fcr ISO 27001 (A.6, A.7, A.12), SOC 2 (CC6\/CC7), GDPR Art. 32, und NIS2.<!-- notionvc: 39751d33-e228-4eee-8d2e-0893afcc4262 --><br \/><!-- notionvc: a6cc7272-c4b2-4d66-b2b5-7d83624b913e --><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2052\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2052\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-caret-up\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Phishing-Simulationskampagnen<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2052\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2052\"><p>Empfohlen in allen modernen Rahmenwerken als Nachweis f\u00fcr kontinuierliches Sicherheitsbewusstsein - ISO 27001, SOC 2, NIS2, GDPR\/FADP, HIPAA.<!-- notionvc: 4a301aed-d926-4cd0-8ab1-22e5630e9921 --><br \/><!-- notionvc: 58142a5f-82fd-4e82-8814-11dfbb5b5c24 --><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2053\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2053\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-caret-up\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">Pr\u00fcfung der physischen Sicherheit (optional)<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2053\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2053\"><p>N\u00fctzlich f\u00fcr Organisationen mit On-Prem-Infrastruktur; relevant f\u00fcr ISO 27001 und NIS2, aber f\u00fcr die meisten SaaS-Unternehmen nicht erforderlich.<!-- notionvc: 90ba9cd1-7624-44eb-a0df-e292581b89fe --><br \/><!-- notionvc: a6f4fcbd-9639-417b-b623-3db02591822b --><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5904aea elementor-section-content-bottom elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5904aea\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-13f8d2f\" data-id=\"13f8d2f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a09a0bd elementor-widget elementor-widget-heading\" data-id=\"a09a0bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Unsere Cybersecurity-Dienstleistungen<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f219a7 elementor-widget elementor-widget-text-editor\" data-id=\"8f219a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"white-space-collapse: preserve;\">Unsere Cybersecurity-Rollen, einschlie\u00dflich CISO as a Service, Security Maturity Assessment, Penetration Testing und SecOps as a Service, bieten umfassende L\u00f6sungen zur Verbesserung der Sicherheitslage Ihres Unternehmens und der Widerstandsf\u00e4higkeit gegen sich entwickelnde Cyberbedrohungen.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-f112e9b\" data-id=\"f112e9b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t<a class=\"eael-wrapper-link-006bdcf --eael-wrapper-link-tag\" href=\"https:\/\/compliancert.com\/de\/bewertung-des-sicherheitsniveaus\/\"><\/a>\t\t<div data-eael-wrapper-link=\"eael-wrapper-link-006bdcf\" class=\"elementor-element elementor-element-006bdcf related-services elementor-widget elementor-widget-icon-box\" data-id=\"006bdcf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"http:\/\/Business%20Strategy%20Development\" >\n\t\t\t\t\t\t\tBewertung der Sicherheitsreife\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<a class=\"eael-wrapper-link-922976c --eael-wrapper-link-tag\" href=\"https:\/\/compliancert.com\/de\/secops-als-dienstleistung\/\"><\/a>\t\t<div data-eael-wrapper-link=\"eael-wrapper-link-922976c\" class=\"elementor-element elementor-element-922976c related-services elementor-widget elementor-widget-icon-box\" data-id=\"922976c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"http:\/\/Business%20Strategy%20Development\" >\n\t\t\t\t\t\t\tSecOps als Dienstleistung\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-0f33693\" data-id=\"0f33693\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t<a class=\"eael-wrapper-link-8b9a41f --eael-wrapper-link-tag\" href=\"https:\/\/compliancert.com\/de\/ciso-als-dienstleistung\/\"><\/a>\t\t<div data-eael-wrapper-link=\"eael-wrapper-link-8b9a41f\" class=\"elementor-element elementor-element-8b9a41f related-services elementor-widget elementor-widget-icon-box\" data-id=\"8b9a41f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"http:\/\/Business%20Strategy%20Development\" >\n\t\t\t\t\t\t\tCISO als Dienstleistung\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9b839b6 elementor-section-content-bottom elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9b839b6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-03a38a5\" data-id=\"03a38a5\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0d1cb96 elementor-skin-carousel elementor-arrows-yes elementor-pagination-type-bullets elementor-pagination-position-outside elementor-widget elementor-widget-media-carousel\" data-id=\"0d1cb96\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;slides_per_view&quot;:&quot;1&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;slides_per_view_laptop&quot;:&quot;1&quot;,&quot;slides_per_view_tablet&quot;:&quot;1&quot;,&quot;slides_per_view_mobile&quot;:&quot;1&quot;,&quot;slides_to_scroll_laptop&quot;:&quot;1&quot;,&quot;slides_to_scroll_tablet&quot;:&quot;1&quot;,&quot;slides_to_scroll_mobile&quot;:&quot;1&quot;,&quot;skin&quot;:&quot;carousel&quot;,&quot;effect&quot;:&quot;slide&quot;,&quot;show_arrows&quot;:&quot;yes&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;speed&quot;:500,&quot;autoplay&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;loop&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;space_between&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]}}\" data-widget_type=\"media-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t\t\t<div class=\"elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Folien\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-carousel-image\" role=\"img\" aria-label=\"Musterbericht \u00fcber Penetrationstests\" style=\"background-image: url(&#039;https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2026\/01\/Penetration-Testing-Sample-Report-scaled.jpg?fit=1812%2C2560&amp;ssl=1&#039;)\">\n\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-carousel-image\" role=\"img\" aria-label=\"Musterbericht f\u00fcr Penetrationstests 2\" style=\"background-image: url(&#039;https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2026\/01\/Penetration-Testing-Sample-Report-2-scaled.jpg?fit=1812%2C2560&amp;ssl=1&#039;)\">\n\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-carousel-image\" role=\"img\" aria-label=\"Musterbericht f\u00fcr Penetrationstests 3\" style=\"background-image: url(&#039;https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2026\/01\/Penetration-Testing-Sample-Report-3-scaled.jpg?fit=1812%2C2560&amp;ssl=1&#039;)\">\n\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\" aria-label=\"Voriger\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewbox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\" aria-label=\"N\u00e4chster\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewbox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47f38d8 elementor-position-inline-start elementor-widget__width-inherit elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"47f38d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-eye\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288 144a110.94 110.94 0 0 0-31.24 5 55.4 55.4 0 0 1 7.24 27 56 56 0 0 1-56 56 55.4 55.4 0 0 1-27-7.24A111.71 111.71 0 1 0 288 144zm284.52 97.4C518.29 135.59 410.93 64 288 64S57.68 135.64 3.48 241.41a32.35 32.35 0 0 0 0 29.19C57.71 376.41 165.07 448 288 448s230.32-71.64 284.52-177.41a32.35 32.35 0 0 0 0-29.19zM288 400c-98.65 0-189.09-55-237.93-144C98.91 167 189.34 112 288 112s189.09 55 237.93 144C477.1 345 386.66 400 288 400z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tVorgeschmack auf den Pentest-Bericht\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c07c1b9\" data-id=\"c07c1b9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c162fcd elementor-align-start elementor-widget__width-auto elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c162fcd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-brand-symbol\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Bericht \u00fcber Penetrationstests<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d37d65a e-con-full e-flex e-con e-child\" data-id=\"d37d65a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ccfbafb elementor-widget elementor-widget-heading\" data-id=\"ccfbafb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">So sieht ein pr\u00fcfungsf\u00e4higer Bericht aus<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2f5b3e elementor-widget elementor-widget-text-editor\" data-id=\"d2f5b3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Unsere Berichte gehen \u00fcber die Auflistung von Problemen hinaus. Wir liefern die L\u00f6sung. Sehen Sie sich ein reales Beispiel f\u00fcr unseren manuellen Validierungsprozess, die Reproduktionsschritte und die spezifischen Empfehlungen zur Problembehebung auf Code-Ebene an.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-090fb06 elementor-widget__width-auto elementor-align-justify elementor-mobile-align-justify elementor-tablet-align-justify elementor-widget-tablet__width-inherit vamtam-has-underline-anim elementor-widget elementor-widget-button\" data-id=\"090fb06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/compliancert.com\/de\/musterbericht-uber-penetrationstests\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Musterbericht herunterladen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d6d6d43 elementor-section-content-bottom elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d6d6d43\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c259182\" data-id=\"c259182\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d136238 elementor-widget elementor-widget-heading\" data-id=\"d136238\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Sind Sie bereit, Ihre Infrastruktur zu sichern?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-584c8e9 text-link-green elementor-widget elementor-widget-text-editor\" data-id=\"584c8e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Die meisten Compliance-Audits erfordern einen Penetrationstestbericht, der innerhalb der letzten 12 Monate erstellt wurde. Vor Quartalsende sind die Pl\u00e4tze schnell vergeben.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"vamtam-has-theme-widget-styles elementor-element elementor-element-5e464a7 elementor-widget__width-auto vamtam-has-underline-anim elementor-widget elementor-widget-button\" data-id=\"5e464a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6IjI1MjU4IiwidG9nZ2xlIjpmYWxzZSwiYWxpZ25fd2l0aF9wYXJlbnQiOiIifQ%3D%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Planen Sie Ihr Scoping-Gespr\u00e4ch<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Sch\u00fctzen Sie Ihr Unternehmen mit fachkundigen Penetrationstests, die Sicherheitsschwachstellen aufdecken, bevor es Hacker tun. Unsere OSCP-zertifizierten ethischen Hacker simulieren reale Cyberangriffe, um versteckte Schwachstellen in Ihren Websites, Anwendungen, Netzwerken und Cloud-Umgebungen aufzudecken - weit \u00fcber das hinaus, was einfache Sicherheitsscans erkennen k\u00f6nnen.<\/p>","protected":false},"author":1,"featured_media":23376,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[],"tags":[],"class_list":["post-14929","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Penetration Testing - ComplianceRT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/compliancert.com\/de\/penetrationstests\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Penetration Testing - ComplianceRT\" \/>\n<meta property=\"og:description\" content=\"Protect your business with expert penetration testing services designed to identify security weaknesses before hackers do. Our OSCP-certified ethical hackers simulate real-world cyberattacks to uncover hidden vulnerabilities in your websites, applications, networks, and cloud environments\u2014far beyond what basic security scans can detect.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/compliancert.com\/de\/penetrationstests\/\" \/>\n<meta property=\"og:site_name\" content=\"ComplianceRT\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-04T00:24:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/compliancert.com\/wp-content\/uploads\/2025\/02\/Penetration-testing.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"634\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"6\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/penetration-testing\\\/\",\"url\":\"https:\\\/\\\/compliancert.com\\\/penetration-testing\\\/\",\"name\":\"Penetration Testing - ComplianceRT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/penetration-testing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/penetration-testing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Penetration-testing.jpeg?fit=1280%2C634&ssl=1\",\"datePublished\":\"2024-07-22T23:32:23+00:00\",\"dateModified\":\"2026-02-04T00:24:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/penetration-testing\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/compliancert.com\\\/penetration-testing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/penetration-testing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Penetration-testing.jpeg?fit=1280%2C634&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Penetration-testing.jpeg?fit=1280%2C634&ssl=1\",\"width\":1280,\"height\":634},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/penetration-testing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/compliancert.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Penetration Testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#website\",\"url\":\"https:\\\/\\\/compliancert.com\\\/\",\"name\":\"ComplianceRT\",\"description\":\"AI-Powered Compliance Tool &amp; Automation Platform | GDPR | ISO27001 | EU AI Act | NIS2\",\"publisher\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/compliancert.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#organization\",\"name\":\"RT Europe SA\",\"alternateName\":\"RT\",\"url\":\"https:\\\/\\\/compliancert.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/RT-logo-header.svg\",\"contentUrl\":\"https:\\\/\\\/compliancert.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/RT-logo-header.svg\",\"width\":116,\"height\":60,\"caption\":\"RT Europe SA\"},\"image\":{\"@id\":\"https:\\\/\\\/compliancert.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/compliancert\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Penetrationstests - ComplianceRT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/compliancert.com\/de\/penetrationstests\/","og_locale":"de_DE","og_type":"article","og_title":"Penetration Testing - ComplianceRT","og_description":"Protect your business with expert penetration testing services designed to identify security weaknesses before hackers do. Our OSCP-certified ethical hackers simulate real-world cyberattacks to uncover hidden vulnerabilities in your websites, applications, networks, and cloud environments\u2014far beyond what basic security scans can detect.","og_url":"https:\/\/compliancert.com\/de\/penetrationstests\/","og_site_name":"ComplianceRT","article_modified_time":"2026-02-04T00:24:42+00:00","og_image":[{"width":1280,"height":634,"url":"https:\/\/compliancert.com\/wp-content\/uploads\/2025\/02\/Penetration-testing.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"6\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/compliancert.com\/penetration-testing\/","url":"https:\/\/compliancert.com\/penetration-testing\/","name":"Penetrationstests - ComplianceRT","isPartOf":{"@id":"https:\/\/compliancert.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/compliancert.com\/penetration-testing\/#primaryimage"},"image":{"@id":"https:\/\/compliancert.com\/penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/02\/Penetration-testing.jpeg?fit=1280%2C634&ssl=1","datePublished":"2024-07-22T23:32:23+00:00","dateModified":"2026-02-04T00:24:42+00:00","breadcrumb":{"@id":"https:\/\/compliancert.com\/penetration-testing\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/compliancert.com\/penetration-testing\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/compliancert.com\/penetration-testing\/#primaryimage","url":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/02\/Penetration-testing.jpeg?fit=1280%2C634&ssl=1","contentUrl":"https:\/\/i0.wp.com\/compliancert.com\/wp-content\/uploads\/2025\/02\/Penetration-testing.jpeg?fit=1280%2C634&ssl=1","width":1280,"height":634},{"@type":"BreadcrumbList","@id":"https:\/\/compliancert.com\/penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/compliancert.com\/"},{"@type":"ListItem","position":2,"name":"Penetration Testing"}]},{"@type":"WebSite","@id":"https:\/\/compliancert.com\/#website","url":"https:\/\/compliancert.com\/","name":"ComplianceRT","description":"KI-gest\u00fctztes Compliance-Tool &amp; Automatisierungsplattform | DSGVO | ISO27001 | EU AI Act | NIS2","publisher":{"@id":"https:\/\/compliancert.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/compliancert.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/compliancert.com\/#organization","name":"RT Europe SA","alternateName":"RT","url":"https:\/\/compliancert.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/compliancert.com\/#\/schema\/logo\/image\/","url":"https:\/\/compliancert.com\/wp-content\/uploads\/2023\/07\/RT-logo-header.svg","contentUrl":"https:\/\/compliancert.com\/wp-content\/uploads\/2023\/07\/RT-logo-header.svg","width":116,"height":60,"caption":"RT Europe SA"},"image":{"@id":"https:\/\/compliancert.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/compliancert\/"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/pages\/14929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/comments?post=14929"}],"version-history":[{"count":20,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/pages\/14929\/revisions"}],"predecessor-version":[{"id":26560,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/pages\/14929\/revisions\/26560"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/media\/23376"}],"wp:attachment":[{"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/media?parent=14929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/categories?post=14929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/compliancert.com\/de\/wp-json\/wp\/v2\/tags?post=14929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}