{"version":"1.0","provider_name":"@-yet","provider_url":"https:\/\/www.at-yet.de\/en","title":"SOC \/ SIEM","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"2RpBtN2543\"><a href=\"https:\/\/www.at-yet.de\/en\/it-security\/soc-siem\">SOC \/ SIEM<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.at-yet.de\/en\/it-security\/soc-siem\/embed#?secret=2RpBtN2543\" width=\"600\" height=\"338\" title=\"&#8220;SOC \/ SIEM&#8221; &#8212; @-yet\" data-secret=\"2RpBtN2543\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.at-yet.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;subpage-header&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221; el_class=&#8221;header-subtext&#8221;]The best protection against cyber attacks is proactive approach. Attack detection systems (SIEM) are an important component here and provide effective protection against damage caused by cyberattacks. These systems are integrated into a Security Operations Center (SOC), where the data is ultimately evaluated. The security experts at @-yet&hellip;"}