{"id":12363,"date":"2022-02-28T18:21:45","date_gmt":"2022-02-28T17:21:45","guid":{"rendered":"https:\/\/secanda.com\/?page_id=12363"},"modified":"2024-11-20T13:24:21","modified_gmt":"2024-11-20T12:24:21","slug":"cybersicherheit","status":"publish","type":"page","link":"https:\/\/www.secanda.com\/de\/loesungen\/cybersicherheit\/","title":{"rendered":"SECANDA | Cybersicherheit"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:center top;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:70px;--awb-padding-top-medium:50px;--awb-padding-right-medium:35px;--awb-padding-bottom-medium:40px;--awb-padding-left-medium:35px;--awb-padding-right-small:15px;--awb-padding-left-small:15px;--awb-margin-bottom:2px;--awb-background-color:var(--awb-custom_color_9);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-align-content-space-between fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:70px;--awb-spacing-left-large:1.92%;--awb-width-medium:75%;--awb-order-medium:0;--awb-spacing-right-medium:2.56%;--awb-margin-bottom-medium:50px;--awb-spacing-left-medium:2.56%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"1.0\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:var(--awb-custom_color_5);--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;text-transform:uppercase;\">SECANDA baut den Gesch\u00e4fts\u00adbereich Cybersicherheit deutlich aus<\/h1><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:75%;--awb-order-medium:0;--awb-spacing-right-medium:2.56%;--awb-spacing-left-medium:2.56%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"1.0\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-transform:none;--awb-text-color:var(--awb-custom_color_5);\"><p>Die SECANDA AG sichert \u00fcber ihre Tochtergesell\u00adschaft IDpendant die digitale Infrastruktur von Industriekonzernen und anderen Unternehmen, Banken, Kliniken sowie staatlichen Einrichtungen und Institutionen.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:center top;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:70px;--awb-padding-top-medium:50px;--awb-padding-right-medium:35px;--awb-padding-bottom-medium:40px;--awb-padding-left-medium:35px;--awb-padding-right-small:15px;--awb-padding-left-small:15px;--awb-margin-bottom:2px;--awb-background-color:var(--awb-custom_color_5);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-align-content-space-between fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"1.0\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\" style=\"--awb-text-transform:none;\"><p>IDpendant analysiert die Sicherheitsarchitek\u00adtur der IT-Systeme ihrer Kunden und setzt Projekte zum Schutz aller Daten, Kommunika\u00adtions\u00adwege und Server gegen Angriffe von au\u00dfen um. Dabei setzt IDpendant die Soft\u00adware\u00adprodukte weltweit f\u00fchrender Anbieter f\u00fcr IT-Sicherheit ein.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"1.0\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\" style=\"--awb-text-transform:none;\"><p>Die wichtigsten Schutzma\u00dfnahmen, die Kunden bei IDpendant derzeit beauftragen, sind aktuell:<\/p>\n<ul>\n<li>Schl\u00fcsselfertige Infrastrukturen zur starken Authentifizierung anstelle von z.B. Pass\u00adw\u00f6rtern gem\u00e4\u00df BSI<\/li>\n<li>Schl\u00fcsselfertige Infrastrukturen f\u00fcr Emailverschl\u00fcsselung und Festplatten\u00adverschl\u00fcsselung<\/li>\n<li>Verschl\u00fcsselung von Cloud-basierten Anwendungen gem\u00e4\u00df Schrems II (Urteil zum internationalen Datentransfer)<\/li>\n<li>Aufbau und Management gro\u00dfer Public-Key-Infrastrukturen im Bereich IoT<\/li>\n<li>Trennung von gesch\u00e4ftlichen und privaten Daten auf mobilen Endger\u00e4ten gem\u00e4\u00df DSGVO<\/li>\n<li>SSO (Single Sign On) f\u00fcr Mitarbeiter und Privileged Access Management f\u00fcr Adminis\u00adtratoren<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-bottom:2px;--awb-background-color:var(--awb-color3);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-align-content-space-between fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-padding-top:80px;--awb-padding-right:100px;--awb-padding-bottom:70px;--awb-padding-top-medium:50px;--awb-padding-right-medium:35px;--awb-padding-bottom-medium:40px;--awb-padding-left-medium:35px;--awb-padding-right-small:15px;--awb-padding-left-small:15px;--awb-bg-color:var(--awb-custom_color_10);--awb-bg-color-hover:var(--awb-custom_color_10);--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"1.0\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-end fusion-content-layout-row\"><div class=\"fusion-text fusion-text-4 feste_breite_links\" style=\"--awb-text-transform:none;--awb-text-color:var(--awb-color1);\"><p>Unsere Tochtergesellschaft IDpendant mit Sitz in Unter&shy;schlei\u00dfheim bei M\u00fcnchen ist eine technologisch f\u00fchrende Beratungs- und Projektgesellschaft f\u00fcr IT-Sicherheit in Deutschland. Sie bietet ma\u00dfgeschneiderte L\u00f6sungen f\u00fcr IT-Sicherheit, die speziell auf die Bed\u00fcrfnisse von Unternehmen zugeschnitten sind.<\/p>\n<p>Das Portfolio umfasst:<\/p>\n<ul>\n<li>Starke Authentifizierung: Schutz durch Multi-Faktor-Authentifizierung (MFA) und sichere Token-L\u00f6sungen.<\/li>\n<li>Single Sign-On (SSO): Effiziente und benutzerfreundliche Zugriffssteuerung ohne Sicherheitskompromisse.<\/li>\n<li>Verschl\u00fcsselung und Festplattensicherheit: Schutz sensibler Unternehmensdaten \u2013 auch mobil.<\/li>\n<li>Privileged Access Management (PAM): Verwaltung und Absicherung von privilegierten Zug\u00e4ngen.<\/li>\n<li>Security Hardware: Inklusive Smartcards, HSMs und Chipkartenleser.<\/li>\n<\/ul>\n<p>IDpendant integriert f\u00fchrende Technologien, um eine sichere, benutzerfreundliche und herstellerunabh\u00e4ngige IT-Umgebung zu gew\u00e4hrleisten.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-stretch fusion-animated feste_breite_rechts\" style=\"--awb-padding-top:80px;--awb-padding-bottom:70px;--awb-padding-left:100px;--awb-padding-top-medium:50px;--awb-padding-right-medium:35px;--awb-padding-bottom-medium:40px;--awb-padding-left-medium:35px;--awb-padding-right-small:15px;--awb-padding-left-small:15px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0px;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"1.0\" data-animationOffset=\"top-into-view\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5\" style=\"--awb-text-transform:none;--awb-text-color:var(--awb-color1);\"><p>SECANDA erstellt und verwaltet sichere Identit\u00e4ten f\u00fcr verschiedene Authentifizierungsmedien und bietet mit SECANDA SECURE eine &#8222;offene Plattform&#8220; (open-loop security) f\u00fcr die Integration vieler Payment &amp; Access L\u00f6sungen. Diese Plattform ist herstellerunabh\u00e4ngig und bietet unterschiedliche Sicherheits-Levels, je nach Anforderung und Bedarf.<\/p>\n<p>Die SECANDA-Gruppe z\u00e4hlt mit ihren Chipkarten- und Identifika\u00adtionssystemen zu den f\u00fchrenden Anbietern von Systemen auf der Basis der sicheren ID. Mehr als zwei Millio\u00adnen Menschen in Deutschland und der Schweiz nutzen Tag f\u00fcr Tag ihre pers\u00f6n\u00adli\u00adche Chipkarte und ihre ID in einem System von SECANDA.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--link_hover_color: var(--awb-custom_color_10);--link_color: var(--awb-color2);--awb-background-position:center top;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-padding-bottom:50px;--awb-padding-right-medium:35px;--awb-padding-left-medium:35px;--awb-padding-right-small:15px;--awb-padding-left-small:15px;--awb-margin-bottom:2px;--awb-background-color:var(--awb-custom_color_5);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-align-content-space-between fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:28%;--awb-margin-top-large:0px;--awb-spacing-right-large:6.8571428571429%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:6.8571428571429%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:5.76%;--awb-spacing-left-medium:5.76%;--awb-width-small:60%;--awb-order-small:0;--awb-spacing-right-small:3.2%;--awb-margin-bottom-small:30px;--awb-spacing-left-small:3.2%;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"1.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-zoomin\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.idpendant.de\/\" target=\"_blank\" aria-label=\"logo_idpendant\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"550\" height=\"550\" alt=\"Logo IDpendant GmbH\" src=\"https:\/\/www.secanda.com\/wp-content\/uploads\/2022\/03\/logo_idpendant.png\" data-orig-src=\"https:\/\/www.secanda.com\/wp-content\/uploads\/2022\/03\/logo_idpendant.png\" class=\"lazyload img-responsive wp-image-12386\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27550%27%20height%3D%27550%27%20viewBox%3D%270%200%20550%20550%27%3E%3Crect%20width%3D%27550%27%20height%3D%27550%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.secanda.com\/wp-content\/uploads\/2022\/03\/logo_idpendant-200x200.png 200w, https:\/\/www.secanda.com\/wp-content\/uploads\/2022\/03\/logo_idpendant-400x400.png 400w, https:\/\/www.secanda.com\/wp-content\/uploads\/2022\/03\/logo_idpendant.png 550w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 767px) 100vw, 550px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:72%;--awb-margin-top-large:25px;--awb-spacing-right-large:2.6666666666667%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:70px;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-margin-top-medium:0px;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:70px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"1.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-custom_color_10);--awb-margin-bottom:50px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:50px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\">Ihr Kontakt f\u00fcr Fragen rund um Ihre IT-Sicherheit<\/h2><\/div><div class=\"fusion-text fusion-text-6 fusion-text-no-margin\" style=\"--awb-text-transform:none;--awb-text-color:var(--awb-custom_color_10);--awb-margin-bottom:0px;\"><p>IDpendant<\/p>\n<\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-text-transform:none;\"><p>Hotline: <a href=\"tel:+498937001100\">089 3700 110 0<\/a><br \/>\n<a href=\"https:\/\/www.idpendant.de\" target=\"_blank\" rel=\"noopener\">www.idpendant.de<\/a><\/p>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:0px;--awb-icon-size:16px;--awb-content-font-size:17px;--awb-icon-alignment:left;--awb-hover-color:var(--awb-color5);--awb-border-color:var(--awb-color4);--awb-background-color:var(--awb-color4);--awb-divider-color:var(--awb-custom_color_8);--awb-divider-hover-color:var(--awb-custom_color_8);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color1);--awb-icon-box-color:var(--awb-custom_color_10);--awb-toggle-hover-accent-color:var(--awb-color1);--awb-toggle-active-accent-color:var(--awb-color1);--awb-title-font-family:&quot;Interstate light&quot;;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:17px;--awb-content-font-family:&quot;Interstate light&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-12363-1\"><div class=\"fusion-panel panel-default panel-c48bdb86a3ccf87d1 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_c48bdb86a3ccf87d1\"><a aria-expanded=\"false\" aria-controls=\"c48bdb86a3ccf87d1\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-12363-1\" data-target=\"#c48bdb86a3ccf87d1\" href=\"#c48bdb86a3ccf87d1\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Kontakt<\/span><\/a><\/h4><\/div><div id=\"c48bdb86a3ccf87d1\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_c48bdb86a3ccf87d1\"><div class=\"panel-body toggle-content fusion-clearfix\">IDpendant GmbH<br \/>\nEdisonstra\u00dfe 3<br \/>\nD-85716 Unterschlei\u00dfheim<\/p>\n<p style=\"margin-bottom: 0px;\"><i class=\"fb-icon-element-1 fb-icon-element fontawesome-icon fa-phone-alt fas circle-yes fusion-text-flow\" style=\"--awb-circlecolor:#e7344c;--awb-circlecolor-hover:#e7344c;--awb-circlebordersize:0px;--awb-font-size:13.2px;--awb-width:26.4px;--awb-height:26.4px;--awb-line-height:26.4px;--awb-margin-top:3px;\"><\/i> <a href=\"tel:+498937001100\">+49 89 3700 110 0<\/a><\/p>\n<p style=\"margin-bottom: 0px;\"><i class=\"fb-icon-element-2 fb-icon-element fontawesome-icon fa-fax fas circle-yes fusion-text-flow\" style=\"--awb-circlecolor:#e7344c;--awb-circlecolor-hover:#e7344c;--awb-circlebordersize:0px;--awb-font-size:13.2px;--awb-width:26.4px;--awb-height:26.4px;--awb-line-height:26.4px;--awb-margin-top:3px;\"><\/i> <a href=\"tel:+4989370011010\">+49 89 3700 110 10<\/a><\/p>\n<p style=\"margin-bottom: 0px;\"><i class=\"fb-icon-element-3 fb-icon-element fontawesome-icon fa-envelope fas circle-yes fusion-text-flow\" style=\"--awb-circlecolor:#e7344c;--awb-circlecolor-hover:#e7344c;--awb-circlebordersize:0px;--awb-font-size:13.2px;--awb-width:26.4px;--awb-height:26.4px;--awb-line-height:26.4px;--awb-margin-top:3px;\"><\/i> <a href=\"mailto:info@idpendant.com\">info@idpendant.com<\/a><\/p>\n<i class=\"fb-icon-element-4 fb-icon-element fontawesome-icon fa-address-card fas circle-yes fusion-text-flow\" style=\"--awb-circlecolor:#e7344c;--awb-circlecolor-hover:#e7344c;--awb-circlebordersize:0px;--awb-font-size:13.2px;--awb-width:26.4px;--awb-height:26.4px;--awb-line-height:26.4px;--awb-margin-top:3px;\"><\/i> <a href=\"https:\/\/www.secanda.com\/downloads\/IDpendant.vcf\">Outlook-Kontakt<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--link_hover_color: var(--awb-custom_color_6);--link_color: var(--awb-custom_color_10);--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:5px;--awb-padding-right-medium:35px;--awb-padding-left-medium:35px;--awb-padding-right-small:0px;--awb-padding-left-small:15px;--awb-margin-bottom:2px;--awb-background-color:var(--awb-custom_color_5);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:30px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8\" style=\"--awb-font-size:24px;--awb-text-transform:uppercase;\"><p><a href=\"https:\/\/www.secanda.com\/de\/kontakt\/#Kontaktformular\">Zum Kontaktformular <span class=\"t_bitter\">\u2192<\/span><\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":10686,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-12363","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SECANDA | Cybersicherheit<\/title>\n<meta name=\"description\" content=\"Die InterCard Tochter IDpendant analysiert Ihre IT-Sicherheit und setzt Cybersicherheitsprojekte zum Schutz gegen Angriffe um. WE ARE SECANDA\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.secanda.com\/de\/loesungen\/cybersicherheit\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SECANDA | Cybersicherheit\" \/>\n<meta property=\"og:description\" content=\"Die InterCard Tochter IDpendant analysiert Ihre IT-Sicherheit und setzt Cybersicherheitsprojekte zum Schutz gegen Angriffe um. WE ARE SECANDA\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.secanda.com\/de\/loesungen\/cybersicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"SECANDA AG\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-20T12:24:21+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.secanda.com\\\/de\\\/loesungen\\\/cybersicherheit\\\/\",\"url\":\"https:\\\/\\\/www.secanda.com\\\/de\\\/loesungen\\\/cybersicherheit\\\/\",\"name\":\"SECANDA | Cybersicherheit\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.secanda.com\\\/de\\\/#website\"},\"datePublished\":\"2022-02-28T17:21:45+00:00\",\"dateModified\":\"2024-11-20T12:24:21+00:00\",\"description\":\"Die InterCard Tochter IDpendant analysiert Ihre IT-Sicherheit und setzt Cybersicherheitsprojekte zum Schutz gegen Angriffe um. WE ARE SECANDA\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.secanda.com\\\/de\\\/loesungen\\\/cybersicherheit\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.secanda.com\\\/de\\\/loesungen\\\/cybersicherheit\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.secanda.com\\\/de\\\/loesungen\\\/cybersicherheit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.secanda.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SECANDA | L\u00f6sungen\",\"item\":\"https:\\\/\\\/www.secanda.com\\\/de\\\/loesungen\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SECANDA | Cybersicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.secanda.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.secanda.com\\\/de\\\/\",\"name\":\"SECANDA AG\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.secanda.com\\\/de\\\/#organization\"},\"alternateName\":\"SECANDA\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.secanda.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.secanda.com\\\/de\\\/#organization\",\"name\":\"SECANDA Systems AG\",\"alternateName\":\"SECANDA\",\"url\":\"https:\\\/\\\/www.secanda.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.secanda.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.secanda.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/LT6-CorporateDesign-SECANDA_Signet_rot.png\",\"contentUrl\":\"https:\\\/\\\/www.secanda.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/LT6-CorporateDesign-SECANDA_Signet_rot.png\",\"width\":465,\"height\":465,\"caption\":\"SECANDA Systems AG\"},\"image\":{\"@id\":\"https:\\\/\\\/www.secanda.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/secanda\\\/\",\"https:\\\/\\\/www.xing.com\\\/pages\\\/secanda\",\"https:\\\/\\\/www.youtube.com\\\/@secanda2022\",\"https:\\\/\\\/www.instagram.com\\\/wearesecanda\\\/\"],\"description\":\"Die SECANDA Systems AG ist die gr\u00f6\u00dfte Tochtergesellschaft der SECANDA AG und ein f\u00fchrender Anbieter integrierter L\u00f6sungen f\u00fcr digitale Identit\u00e4ten, Zutrittskontrolle, Arbeitszeiterfassung, Payment und vernetzte ID-\u00d6kosysteme. Das Unternehmen entstand 2023 aus dem Zusammenschluss der langj\u00e4hrig etablierten Spezialisten InterCard GmbH Kartensysteme, IntraKey technologies AG und H. Schom\u00e4cker GmbH und vereint mehr als f\u00fcnf Jahrzehnte Expertise im Bereich Identifikations- und Kartentechnologien.\",\"email\":\"info@secanda.com\",\"telephone\":\"+49 7720 9945 0\",\"legalName\":\"SECANDA Systems AG\",\"foundingDate\":\"1978-12-07\",\"vatID\":\"DE142986548\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SECANDA | Cybersicherheit","description":"Die InterCard Tochter IDpendant analysiert Ihre IT-Sicherheit und setzt Cybersicherheitsprojekte zum Schutz gegen Angriffe um. WE ARE SECANDA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.secanda.com\/de\/loesungen\/cybersicherheit\/","og_locale":"de_DE","og_type":"article","og_title":"SECANDA | Cybersicherheit","og_description":"Die InterCard Tochter IDpendant analysiert Ihre IT-Sicherheit und setzt Cybersicherheitsprojekte zum Schutz gegen Angriffe um. WE ARE SECANDA","og_url":"https:\/\/www.secanda.com\/de\/loesungen\/cybersicherheit\/","og_site_name":"SECANDA AG","article_modified_time":"2024-11-20T12:24:21+00:00","twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.secanda.com\/de\/loesungen\/cybersicherheit\/","url":"https:\/\/www.secanda.com\/de\/loesungen\/cybersicherheit\/","name":"SECANDA | Cybersicherheit","isPartOf":{"@id":"https:\/\/www.secanda.com\/de\/#website"},"datePublished":"2022-02-28T17:21:45+00:00","dateModified":"2024-11-20T12:24:21+00:00","description":"Die InterCard Tochter IDpendant analysiert Ihre IT-Sicherheit und setzt Cybersicherheitsprojekte zum Schutz gegen Angriffe um. WE ARE SECANDA","breadcrumb":{"@id":"https:\/\/www.secanda.com\/de\/loesungen\/cybersicherheit\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.secanda.com\/de\/loesungen\/cybersicherheit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.secanda.com\/de\/loesungen\/cybersicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.secanda.com\/de\/"},{"@type":"ListItem","position":2,"name":"SECANDA | L\u00f6sungen","item":"https:\/\/www.secanda.com\/de\/loesungen\/"},{"@type":"ListItem","position":3,"name":"SECANDA | Cybersicherheit"}]},{"@type":"WebSite","@id":"https:\/\/www.secanda.com\/de\/#website","url":"https:\/\/www.secanda.com\/de\/","name":"SECANDA AG","description":"","publisher":{"@id":"https:\/\/www.secanda.com\/de\/#organization"},"alternateName":"SECANDA","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.secanda.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.secanda.com\/de\/#organization","name":"SECANDA Systems AG","alternateName":"SECANDA","url":"https:\/\/www.secanda.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.secanda.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.secanda.com\/wp-content\/uploads\/2024\/10\/LT6-CorporateDesign-SECANDA_Signet_rot.png","contentUrl":"https:\/\/www.secanda.com\/wp-content\/uploads\/2024\/10\/LT6-CorporateDesign-SECANDA_Signet_rot.png","width":465,"height":465,"caption":"SECANDA Systems AG"},"image":{"@id":"https:\/\/www.secanda.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/secanda\/","https:\/\/www.xing.com\/pages\/secanda","https:\/\/www.youtube.com\/@secanda2022","https:\/\/www.instagram.com\/wearesecanda\/"],"description":"Die SECANDA Systems AG ist die gr\u00f6\u00dfte Tochtergesellschaft der SECANDA AG und ein f\u00fchrender Anbieter integrierter L\u00f6sungen f\u00fcr digitale Identit\u00e4ten, Zutrittskontrolle, Arbeitszeiterfassung, Payment und vernetzte ID-\u00d6kosysteme. Das Unternehmen entstand 2023 aus dem Zusammenschluss der langj\u00e4hrig etablierten Spezialisten InterCard GmbH Kartensysteme, IntraKey technologies AG und H. Schom\u00e4cker GmbH und vereint mehr als f\u00fcnf Jahrzehnte Expertise im Bereich Identifikations- und Kartentechnologien.","email":"info@secanda.com","telephone":"+49 7720 9945 0","legalName":"SECANDA Systems AG","foundingDate":"1978-12-07","vatID":"DE142986548","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}}]}},"_links":{"self":[{"href":"https:\/\/www.secanda.com\/de\/wp-json\/wp\/v2\/pages\/12363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.secanda.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.secanda.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.secanda.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.secanda.com\/de\/wp-json\/wp\/v2\/comments?post=12363"}],"version-history":[{"count":7,"href":"https:\/\/www.secanda.com\/de\/wp-json\/wp\/v2\/pages\/12363\/revisions"}],"predecessor-version":[{"id":31952,"href":"https:\/\/www.secanda.com\/de\/wp-json\/wp\/v2\/pages\/12363\/revisions\/31952"}],"up":[{"embeddable":true,"href":"https:\/\/www.secanda.com\/de\/wp-json\/wp\/v2\/pages\/10686"}],"wp:attachment":[{"href":"https:\/\/www.secanda.com\/de\/wp-json\/wp\/v2\/media?parent=12363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}