{"version":"1.0","provider_name":"@-yet","provider_url":"https:\/\/www.at-yet.de\/en","title":"Secure Infrastructure","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"qwpFR4nRrM\"><a href=\"https:\/\/www.at-yet.de\/en\/it-security\/secure-infrastructure\">Secure Infrastructure<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.at-yet.de\/en\/it-security\/secure-infrastructure\/embed#?secret=qwpFR4nRrM\" width=\"600\" height=\"338\" title=\"&#8220;Secure Infrastructure&#8221; &#8212; @-yet\" data-secret=\"qwpFR4nRrM\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.at-yet.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;subpage-header&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221; el_class=&#8221;header-subtext&#8221;]Companies are increasingly dependent on secure IT systems that reliably support their processes. At the same time, threats from digital attacks are on the rise. The best way to meet this challenge is to take proactive action.And it all starts with a secure IT infrastructure.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_row_inner gap=&#8221;35&#8243;][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][vc_column_inner&hellip;"}