{"id":6829,"date":"2025-09-21T08:35:58","date_gmt":"2025-09-21T08:35:58","guid":{"rendered":"https:\/\/cyfort.ch\/?page_id=6829"},"modified":"2026-04-01T13:23:35","modified_gmt":"2026-04-01T13:23:35","slug":"security-consulting","status":"publish","type":"page","link":"https:\/\/cyfort.ch\/en\/security-consulting\/","title":{"rendered":"Security Consulting"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"6829\" class=\"elementor elementor-6829 elementor-6828\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ac85743 e-flex e-con-boxed e-con e-parent\" data-id=\"ac85743\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6871d76 align-left heading-style-1 elementor-widget elementor-widget-mae-headings\" data-id=\"6871d76\" data-element_type=\"widget\" data-widget_type=\"mae-headings.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"master-heading sep-none\">\n\t\t\t\t        \t        \t<div class=\"pre-heading\"><span class=\"line\"><span class=\"inner\"><\/span><\/span>What makes our consulting practice-oriented?<\/div>\n\t        \n\t        \n\t        \t        <h2 class=\"main-heading\">Security Consulting<\/h2>\n\t        \n\t        \n\t        \t    <\/div>\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3db10a7 e-flex e-con-boxed e-con e-parent\" data-id=\"3db10a7\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-633dc8d e-con-full e-flex e-con e-child\" data-id=\"633dc8d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e26a9a heading-style-1 elementor-widget elementor-widget-mae-headings\" data-id=\"5e26a9a\" data-element_type=\"widget\" data-widget_type=\"mae-headings.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"master-heading sep-none\">\n\t\t\t\t        \n\t        \n\t        \n\t        \n\t        \t            <div class=\"sub-heading\">You know your security posture has gaps. The difficult part is knowing which risks matter most, what to fix first, and how to move from assessment to implementation without losing momentum. Our Security Consulting helps you cut through that complexity. We assess your environment against proven frameworks, identify the biggest risks, and turn the findings into a prioritized action plan your team can actually execute.    <br><br>\nFrom ISO 27001-based assessments and Microsoft tenant hardening to Entra ID, Zero Trust access, Defender, Sentinel, Purview, and ISMS processes, we combine strategic guidance with practical implementation support. No generic 200-page reports. Just clear recommendations, defined deliverables, and security improvements that hold up in day-to-day operations.  <\/div>\n\t        \t    <\/div>\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4b69f62 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"4b69f62\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a9210af image-width-full elementor-widget elementor-widget-mae-gallery-stack\" data-id=\"a9210af\" data-element_type=\"widget\" data-widget_type=\"mae-gallery-stack.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"master-gallery-stack\">\n\t\t\t<div class=\"master-fancy-image master-animation elementor-repeater-item-f2f6858\" data-top=\"0px\" data-animation=\"reveal revealBottom2\">\n\t\t\t\t\t\t\t\t\t<div class=\"image-wrap\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/cyfort.ch\/wp-content\/uploads\/2025\/09\/logo-kompass-scaled.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/cyfort.ch\/wp-content\/uploads\/2025\/09\/logo-kompass-scaled.png 2560w, https:\/\/cyfort.ch\/wp-content\/uploads\/2025\/09\/logo-kompass-300x300.png 300w, https:\/\/cyfort.ch\/wp-content\/uploads\/2025\/09\/logo-kompass-1024x1024.png 1024w, https:\/\/cyfort.ch\/wp-content\/uploads\/2025\/09\/logo-kompass-150x150.png 150w, https:\/\/cyfort.ch\/wp-content\/uploads\/2025\/09\/logo-kompass-768x768.png 768w, https:\/\/cyfort.ch\/wp-content\/uploads\/2025\/09\/logo-kompass-1536x1536.png 1536w, https:\/\/cyfort.ch\/wp-content\/uploads\/2025\/09\/logo-kompass-2048x2048.png 2048w, https:\/\/cyfort.ch\/wp-content\/uploads\/2025\/09\/logo-kompass-60x60.png 60w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/div>\n\t\t\t\t\t\t\t\t<\/div><div class=\"master-shape master-animation elementor-repeater-item-a25115e\" data-animation=\"revealTop\"><\/div>\t\t<\/div>\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-65453bf7 elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"65453bf7\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-10976fca\" data-id=\"10976fca\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-350b7de9 rotating elementor-widget__width-initial elementor-absolute elementor-widget elementor-widget-image\" data-id=\"350b7de9\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"769\" height=\"679\" src=\"https:\/\/cyfort.ch\/wp-content\/uploads\/2021\/08\/dots.png\" class=\"attachment-full size-full wp-image-5192\" alt=\"\" srcset=\"https:\/\/cyfort.ch\/wp-content\/uploads\/2021\/08\/dots.png 769w, https:\/\/cyfort.ch\/wp-content\/uploads\/2021\/08\/dots-300x265.png 300w\" sizes=\"(max-width: 769px) 100vw, 769px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ad674c7 elementor-widget elementor-widget-spacer\" data-id=\"7ad674c7\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1be18d2e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1be18d2e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-785162fa\" data-id=\"785162fa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d7a458 elementor-widget elementor-widget-heading\" data-id=\"5d7a458\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Non-binding exchange<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-713e9182\" data-id=\"713e9182\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b3d6003 align-right align--tabletleft align--mobileleft elementor-widget elementor-widget-mae-button\" data-id=\"3b3d6003\" data-element_type=\"widget\" id=\"formular-cta\" data-widget_type=\"mae-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <a class=\"master-button btn-dark icon-left big\" href=\"http:\/\/!--[CDATA[#kontakt%5D%5D--\" \n            >\n\n            <span class=\"inner\">\n                <span class=\"content-base\">\n                    <span class=\"icon ci-right-arrow1\"><\/span>                    <span class=\"text\">CONTACT NOW<\/span>\n                                    <\/span>\n\n                <span class=\"content-hover\">\n                    <span class=\"icon ci-right-arrow1\"><\/span>                    <span class=\"text\">CONTACT NOW<\/span>\n                                    <\/span>\n            <\/span>\n\n            <span class=\"bg-hover\"><\/span>        <\/a>\n\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-6733ba52 elementor-widget elementor-widget-spacer\" data-id=\"6733ba52\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-54ad4d6e elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"54ad4d6e\" data-element_type=\"section\" id=\"consulting\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e7bbb4b\" data-id=\"e7bbb4b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7422df51 pointer-event-none elementor-widget elementor-widget-mae-particles\" data-id=\"7422df51\" data-element_type=\"widget\" data-widget_type=\"mae-particles.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"master-particles\" data-config='{\"json\":\"{\\\"particles\\\":{\\\"number\\\":{\\\"value\\\":200,\\\"density\\\":{\\\"enable\\\":true,\\\"value_area\\\":800}},\\\"color\\\":{\\\"value\\\":\\\"#dbe0e4\\\"},\\\"shape\\\":{\\\"type\\\":\\\"circle\\\",\\\"stroke\\\":{\\\"width\\\":0,\\\"color\\\":\\\"#000000\\\"},\\\"polygon\\\":{\\\"nb_sides\\\":5},\\\"image\\\":{\\\"src\\\":\\\"img\\\/github.svg\\\",\\\"width\\\":100,\\\"height\\\":100}},\\\"opacity\\\":{\\\"value\\\":0.5,\\\"random\\\":false,\\\"anim\\\":{\\\"enable\\\":false,\\\"speed\\\":1,\\\"opacity_min\\\":0.1,\\\"sync\\\":false}},\\\"size\\\":{\\\"value\\\":4,\\\"random\\\":false,\\\"anim\\\":{\\\"enable\\\":false,\\\"speed\\\":40,\\\"size_min\\\":0.1,\\\"sync\\\":false}},\\\"line_linked\\\":{\\\"enable\\\":true,\\\"distance\\\":150,\\\"color\\\":\\\"#dbe0e4\\\",\\\"opacity\\\":0.4,\\\"width\\\":2},\\\"move\\\":{\\\"enable\\\":true,\\\"speed\\\":6,\\\"direction\\\":\\\"none\\\",\\\"random\\\":false,\\\"straight\\\":false,\\\"out_mode\\\":\\\"out\\\",\\\"bounce\\\":false,\\\"attract\\\":{\\\"enable\\\":false,\\\"rotateX\\\":600,\\\"rotateY\\\":1200}}},\\\"interactivity\\\":{\\\"detect_on\\\":\\\"canvas\\\",\\\"events\\\":{\\\"onhover\\\":{\\\"enable\\\":false,\\\"mode\\\":\\\"repulse\\\"},\\\"onclick\\\":{\\\"enable\\\":false,\\\"mode\\\":\\\"push\\\"},\\\"resize\\\":true},\\\"modes\\\":{\\\"grab\\\":{\\\"distance\\\":400,\\\"line_linked\\\":{\\\"opacity\\\":1}},\\\"bubble\\\":{\\\"distance\\\":400,\\\"size\\\":40,\\\"duration\\\":2,\\\"opacity\\\":8,\\\"speed\\\":3},\\\"repulse\\\":{\\\"distance\\\":200,\\\"duration\\\":0.4},\\\"push\\\":{\\\"particles_nb\\\":4},\\\"remove\\\":{\\\"particles_nb\\\":2}}},\\\"retina_detect\\\":true}\"}'>\n            <div id=\"particles-js\" class=\"canvas-particles\"><\/div>\n        <\/div>\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42b970c3 align-center heading-style-1 elementor-widget elementor-widget-mae-headings\" data-id=\"42b970c3\" data-element_type=\"widget\" data-widget_type=\"mae-headings.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"master-heading sep-none\">\n\t\t\t\t        \n\t        \n\t        \t        <h2 class=\"main-heading\">Our expertise<\/h2>\n\t        \n\t        \n\t        \t    <\/div>\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8112aa2 elementor-tabs-view-vertical elementor-widget elementor-widget-tabs\" data-id=\"8112aa2\" data-element_type=\"widget\" data-widget_type=\"tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-tabs\">\n\t\t\t<div class=\"elementor-tabs-wrapper\" role=\"tablist\" >\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1351\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-1351\" aria-expanded=\"false\">Security Posture Management \u2013 \u200b\u200bISO 27001-based<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1352\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1352\" aria-expanded=\"false\">Microsoft Tenant Hardening and Secure Configuration<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1353\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1353\" aria-expanded=\"false\">EntraID and Modern Authentication<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1354\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1354\" aria-expanded=\"false\">Zero Trust Network Access with Global Secure Access<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1355\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1355\" aria-expanded=\"false\">Microsoft Defender XDR and Sentinel Integration<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1356\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1356\" aria-expanded=\"false\">Microsoft 365 Collaboration Security<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1357\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1357\" aria-expanded=\"false\">Data Management, Klassifikation &amp; DLP with Microsoft Purview<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1358\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"8\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1358\" aria-expanded=\"false\">ISMS Process Implementation and Management<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"elementor-tabs-content-wrapper\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-1351\" aria-expanded=\"false\">Security Posture Management \u2013 \u200b\u200bISO 27001-based<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1351\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1351\" tabindex=\"0\" hidden=\"false\"><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Get a clear picture of where your security posture stands today and which gaps need attention first.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">We assess your environment against ISO 27001-aligned controls, identify weak points in governance and operations, and translate the results into a prioritized action plan.<\/span><\/span><\/p><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\"><strong>What you get: <\/strong>management-ready gap overview, prioritized recommendations, and a roadmap for technical and organizational improvements.<\/span><\/span><\/p><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\"> <strong>Typical use case: <\/strong>organizations preparing for audits, scaling security maturity, or needing a structured baseline before larger projects.<\/span><\/span><\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1352\" aria-expanded=\"false\">Microsoft Tenant Hardening and Secure Configuration<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1352\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1352\" tabindex=\"0\" hidden=\"hidden\"><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Reduce avoidable risk in your Microsoft environment by closing common configuration gaps before they become incidents.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">We review your Microsoft 365 tenant, identities, endpoints, and key services against established hardening practices and turn findings into concrete remediation steps.<\/span><\/span><\/p><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\"><strong>What you get:<\/strong> a prioritized hardening plan, safer baseline configurations, and a more defensible Microsoft environment.<\/span><\/span><\/p><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\"><strong>Why it matters:<\/strong> many serious incidents start with weak defaults, inconsistent settings, or overlooked admin exposure.<\/span><\/span><\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1353\" aria-expanded=\"false\">EntraID and Modern Authentication<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1353\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1353\" tabindex=\"0\" hidden=\"hidden\"><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Identity is now the main control plane for modern IT.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">We help you strengthen Entra ID with Conditional Access, MFA strategy, privileged access controls, and a realistic path toward stronger authentication models.<\/span><\/span><\/p><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\"><strong>What you get:<\/strong> tighter access governance, lower identity risk, and policies that protect sensitive resources without disrupting normal work.<\/span><\/span><\/p><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\"><strong>Typical outcome:<\/strong> fewer risky sign-ins, more consistent access decisions, and stronger control over who can reach what.<\/span><\/span><\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1354\" aria-expanded=\"false\">Zero Trust Network Access with Global Secure Access<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1354\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1354\" tabindex=\"0\" hidden=\"hidden\"><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Traditional network security assumes that users and devices inside the perimeter can be trusted.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">That model no longer fits modern work.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">We help you implement Zero Trust Network Access with Microsoft Global Secure Access so access decisions are based on identity, device posture, location, and risk, not just network presence.<\/span><\/span><\/p><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\"><strong>What you get: <\/strong>more controlled access to internal resources, reduced exposure from compromised devices or accounts, and a modern alternative to broad legacy VPN access.<\/span><\/span><\/p><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\"><strong>Typical outcome: <\/strong>users connect securely from anywhere, while sensitive systems stay protected by context-aware access policies.<\/span><\/span><\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1355\" aria-expanded=\"false\">Microsoft Defender XDR and Sentinel Integration<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1355\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1355\" tabindex=\"0\" hidden=\"hidden\"><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Build the foundation for stronger detection and response by configuring the right security signals, integrations, and use cases.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Whether you are preparing for an in-house SOC or improving an existing setup, we help you deploy Microsoft security tooling in a way that supports real operational outcomes.<\/span><\/span><\/p><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\"><strong>What you get: <\/strong>cleaner signal quality, better visibility across the Microsoft stack, and a more usable basis for incident detection and response.<\/span><\/span><\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1356\" aria-expanded=\"false\">Microsoft 365 Collaboration Security<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1356\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1356\" tabindex=\"0\" hidden=\"hidden\"><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Microsoft 365 makes collaboration faster, but it also increases the risk of oversharing, weak permissions, external access issues, and accidental data exposure.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">We help you secure Teams, SharePoint, OneDrive, Exchange, and related collaboration workflows so employees can work efficiently without creating unnecessary security gaps.<\/span><\/span><\/p><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\"> <strong>What you get:<\/strong> clearer permission structures, safer sharing settings, stronger protection for sensitive content, and better visibility into collaboration risks.<\/span><\/span><\/p><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\"><strong>Typical outcome:<\/strong> your teams collaborate productively, while your organization keeps tighter control over who can access, share, and move business-critical information.<\/span><\/span><\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1357\" aria-expanded=\"false\">Data Management, Klassifikation &amp; DLP with Microsoft Purview<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1357\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1357\" tabindex=\"0\" hidden=\"hidden\"><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Sensitive data cannot be protected if nobody knows where it is, how it is labeled, or how it moves.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">We help you define classification models, apply labeling logic, and implement DLP controls that reduce leakage risk without making collaboration unworkable.<\/span><\/span><\/p><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\"><strong>What you get: <\/strong>better visibility into sensitive data, clearer protection rules, and practical data-loss controls that support governance and compliance.<\/span><\/span><\/p><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\"><strong>Best for: <\/strong>organizations handling regulated, confidential, or business-critical information across Microsoft 365.<\/span><\/span><\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"8\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1358\" aria-expanded=\"false\">ISMS Process Implementation and Management<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1358\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1358\" tabindex=\"0\" hidden=\"hidden\"><div class=\"lRu31\" dir=\"ltr\"><p><span class=\"HwtZe\" lang=\"de\"><span class=\"HwtZe\" lang=\"de\"><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">We help you build and run an Information Security Management System that supports real security governance, not just audit preparation.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">From policies and risk management to roles and continuous improvement, we turn framework requirements into practical processes your organization can actually maintain.<\/span><\/span><\/span><\/span><\/p><p><strong>What you get:<\/strong> a structured ISMS foundation, defined responsibilities, usable policies and workflows, and support for long-term security governance.<\/p><\/div><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\"><strong>Typical outcome: <\/strong>stronger audit readiness, clearer decision-making, and security processes that become part of daily operations instead of remaining a documentation exercise.<\/span><\/span><\/p><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-c305fd5 e-flex e-con-boxed e-con e-parent\" data-id=\"c305fd5\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db3158d elementor-widget elementor-widget-toggle\" data-id=\"db3158d\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2291\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2291\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">How do we know where to start with security consulting?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2291\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2291\"><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Most organizations know they have gaps, but not which ones matter most. We assess your current environment, priorities, and risks, then turn that into a clear roadmap so you know what to fix first.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">We assess your current environment, priorities, and risks, then turn that into a clear roadmap so you know what to fix first.<\/span><\/span><\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2292\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2292\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What do we actually get at the end of a consulting engagement?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2292\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2292\"><p>Depending on scope, typical deliverables include a gap analysis, prioritized recommendations, an implementation roadmap, management-ready summaries, and practical next steps your team can act on.<\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2293\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2293\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Is this a one-time assessment or ongoing support?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2293\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2293\"><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Both are possible.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Some clients need a focused one-time assessment, while others prefer phased projects or ongoing advisory support.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">We adapt the engagement model to your goals and internal resources.<\/span><\/span><\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2294\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-2294\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Do you only advise, or do you also help implement the changes?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2294\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-2294\"><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">We do both.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">We can provide an independent assessment and roadmap, and we can also support rollout, configuration, workshops, policy design, and validation if you want help putting the recommendations into practice.<\/span><\/span><\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2295\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-2295\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Can you help us prepare for ISO 27001 or improve our ISMS?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2295\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-2295\"><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">Yes.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">We help assess your current maturity, identify gaps, and build practical ISMS processes that support both audit readiness and long-term security governance.<\/span><\/span><\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2296\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-2296\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-caret-right\" viewBox=\"0 0 192 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M0 384.662V127.338c0-17.818 21.543-26.741 34.142-14.142l128.662 128.662c7.81 7.81 7.81 20.474 0 28.284L34.142 398.804C21.543 411.404 0 402.48 0 384.662z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-caret-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">How do you make sure the recommendations are practical and not just theoretical?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-2296\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-2296\"><p><span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">We prioritize recommendations based on business risk, technical reality, and available resources.<\/span><\/span> <span class=\"jCAhz ChMk0b\"><span class=\"ryNqvb\">The goal is to give you clear, achievable actions, not oversized reports full of low-value tasks.<\/span><\/span><\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8abcf8d e-flex e-con-boxed e-con e-parent\" data-id=\"8abcf8d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-611ac03 heading-style-1 elementor-widget elementor-widget-mae-headings\" data-id=\"611ac03\" data-element_type=\"widget\" id=\"kontakt\" data-widget_type=\"mae-headings.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"master-heading sep-none\">\n\t\t\t\t        \t        \t<div class=\"pre-heading\"><span class=\"line\"><span class=\"inner\"><\/span><\/span>Get in touch<\/div>\n\t        \n\t        \n\t        \t        <h2 class=\"main-heading\">Contact form<\/h2>\n\t        \n\t        \n\t        \t    <\/div>\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01e679d cf7-style-1 elementor-widget elementor-widget-mae-contact-form-7\" data-id=\"01e679d\" data-element_type=\"widget\" data-widget_type=\"mae-contact-form-7.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode izeetak-cf7-0\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f5248-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"5248\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/6829#wpcf7-f5248-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"5248\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.4\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f5248-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"input-wrap\"><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" autocomplete=\"name\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" autocomplete=\"email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span><\/div>\n\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-text wpcf7-validates-as-tel\" autocomplete=\"tel\" aria-invalid=\"false\" placeholder=\"Telephone (optional)\" value=\"\" type=\"tel\" name=\"your-phone\" \/><\/span>\n\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-subject\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Subject\" value=\"\" type=\"text\" name=\"your-subject\" \/><\/span>\n\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Message\" name=\"your-message\"><\/textarea><\/span>\n\n<span id=\"wpcf7-69e8caa8777d5-wrapper\" class=\"wpcf7-form-control-wrap website-wrap\" style=\"display:none !important; visibility:hidden !important;\"><label for=\"wpcf7-69e8caa8777d5-field\" class=\"hp-message\">Please leave this field empty.<\/label><input id=\"wpcf7-69e8caa8777d5-field\"  class=\"wpcf7-form-control wpcf7-text\" type=\"text\" name=\"website\" value=\"\" size=\"40\" tabindex=\"-1\" autocomplete=\"new-password\" \/><\/span>\n\n<input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send\" \/><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What makes our consulting practice-oriented? Security Consulting You know your security posture has gaps. The difficult part is knowing which risks matter most, what to fix first, and how to move from assessment to implementation without losing momentum. Our Security Consulting helps you cut through that complexity. We assess your<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-6829","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Consulting - CyFort<\/title>\n<meta name=\"description\" content=\"With security consulting, we analyze risks, develop strategies and support you during implementation - for sustainable protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyfort.ch\/en\/security-consulting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Consulting - CyFort\" \/>\n<meta property=\"og:description\" content=\"With security consulting, we analyze risks, develop strategies and support you during implementation - for sustainable protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyfort.ch\/en\/security-consulting\/\" \/>\n<meta property=\"og:site_name\" content=\"CyFort\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T13:23:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyfort.ch\/wp-content\/uploads\/2025\/09\/logo-kompass-scaled.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyfort.ch\/en\/security-consulting\/\",\"url\":\"https:\/\/cyfort.ch\/en\/security-consulting\/\",\"name\":\"Security Consulting - CyFort\",\"isPartOf\":{\"@id\":\"https:\/\/cyfort.ch\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyfort.ch\/en\/security-consulting\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyfort.ch\/en\/security-consulting\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyfort.ch\/wp-content\/uploads\/2025\/09\/logo-kompass-scaled.png\",\"datePublished\":\"2025-09-21T08:35:58+00:00\",\"dateModified\":\"2026-04-01T13:23:35+00:00\",\"description\":\"With security consulting, we analyze risks, develop strategies and support you during implementation - for sustainable protection.\",\"breadcrumb\":{\"@id\":\"https:\/\/cyfort.ch\/en\/security-consulting\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyfort.ch\/en\/security-consulting\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyfort.ch\/en\/security-consulting\/#primaryimage\",\"url\":\"https:\/\/cyfort.ch\/wp-content\/uploads\/2025\/09\/logo-kompass-scaled.png\",\"contentUrl\":\"https:\/\/cyfort.ch\/wp-content\/uploads\/2025\/09\/logo-kompass-scaled.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyfort.ch\/en\/security-consulting\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/cyfort.ch\/en\/home-page\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Consulting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyfort.ch\/#website\",\"url\":\"https:\/\/cyfort.ch\/\",\"name\":\"CyFort\",\"description\":\"Cyber Security\",\"publisher\":{\"@id\":\"https:\/\/cyfort.ch\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyfort.ch\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyfort.ch\/#organization\",\"name\":\"CyFort\",\"url\":\"https:\/\/cyfort.ch\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyfort.ch\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyfort.ch\/wp-content\/uploads\/2021\/08\/logo.png\",\"contentUrl\":\"https:\/\/cyfort.ch\/wp-content\/uploads\/2021\/08\/logo.png\",\"width\":1647,\"height\":331,\"caption\":\"CyFort\"},\"image\":{\"@id\":\"https:\/\/cyfort.ch\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Consulting - CyFort","description":"With security consulting, we analyze risks, develop strategies and support you during implementation - for sustainable protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyfort.ch\/en\/security-consulting\/","og_locale":"en_US","og_type":"article","og_title":"Security Consulting - CyFort","og_description":"With security consulting, we analyze risks, develop strategies and support you during implementation - for sustainable protection.","og_url":"https:\/\/cyfort.ch\/en\/security-consulting\/","og_site_name":"CyFort","article_modified_time":"2026-04-01T13:23:35+00:00","og_image":[{"url":"https:\/\/cyfort.ch\/wp-content\/uploads\/2025\/09\/logo-kompass-scaled.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyfort.ch\/en\/security-consulting\/","url":"https:\/\/cyfort.ch\/en\/security-consulting\/","name":"Security Consulting - CyFort","isPartOf":{"@id":"https:\/\/cyfort.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyfort.ch\/en\/security-consulting\/#primaryimage"},"image":{"@id":"https:\/\/cyfort.ch\/en\/security-consulting\/#primaryimage"},"thumbnailUrl":"https:\/\/cyfort.ch\/wp-content\/uploads\/2025\/09\/logo-kompass-scaled.png","datePublished":"2025-09-21T08:35:58+00:00","dateModified":"2026-04-01T13:23:35+00:00","description":"With security consulting, we analyze risks, develop strategies and support you during implementation - for sustainable protection.","breadcrumb":{"@id":"https:\/\/cyfort.ch\/en\/security-consulting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyfort.ch\/en\/security-consulting\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyfort.ch\/en\/security-consulting\/#primaryimage","url":"https:\/\/cyfort.ch\/wp-content\/uploads\/2025\/09\/logo-kompass-scaled.png","contentUrl":"https:\/\/cyfort.ch\/wp-content\/uploads\/2025\/09\/logo-kompass-scaled.png"},{"@type":"BreadcrumbList","@id":"https:\/\/cyfort.ch\/en\/security-consulting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cyfort.ch\/en\/home-page\/"},{"@type":"ListItem","position":2,"name":"Security Consulting"}]},{"@type":"WebSite","@id":"https:\/\/cyfort.ch\/#website","url":"https:\/\/cyfort.ch\/","name":"CyFort","description":"Cyber Security","publisher":{"@id":"https:\/\/cyfort.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyfort.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyfort.ch\/#organization","name":"CyFort","url":"https:\/\/cyfort.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyfort.ch\/#\/schema\/logo\/image\/","url":"https:\/\/cyfort.ch\/wp-content\/uploads\/2021\/08\/logo.png","contentUrl":"https:\/\/cyfort.ch\/wp-content\/uploads\/2021\/08\/logo.png","width":1647,"height":331,"caption":"CyFort"},"image":{"@id":"https:\/\/cyfort.ch\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cyfort.ch\/en\/wp-json\/wp\/v2\/pages\/6829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyfort.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyfort.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyfort.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyfort.ch\/en\/wp-json\/wp\/v2\/comments?post=6829"}],"version-history":[{"count":10,"href":"https:\/\/cyfort.ch\/en\/wp-json\/wp\/v2\/pages\/6829\/revisions"}],"predecessor-version":[{"id":7918,"href":"https:\/\/cyfort.ch\/en\/wp-json\/wp\/v2\/pages\/6829\/revisions\/7918"}],"wp:attachment":[{"href":"https:\/\/cyfort.ch\/en\/wp-json\/wp\/v2\/media?parent=6829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}