{"id":1185,"date":"2025-11-10T14:48:24","date_gmt":"2025-11-10T13:48:24","guid":{"rendered":"https:\/\/addyet.xyz\/it-security\/secure-infrastructure"},"modified":"2025-12-22T12:05:29","modified_gmt":"2025-12-22T11:05:29","slug":"secure-infrastructure","status":"publish","type":"page","link":"https:\/\/www.at-yet.de\/en\/it-security\/secure-infrastructure","title":{"rendered":"Secure Infrastructure"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;subpage-header&#8221;][vc_column]<style>.vcex-heading.vcex_69dd0fb355333{color:#00056e;font-family:'Playfair Display', serif;font-weight:700;line-height:1.2em;}<\/style><h1 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h1 vcex_69dd0fb355333\"><span class=\"vcex-heading-inner wpex-inline-block\">Secure IT infrastructure - the basis for sustainable IT security and the success of your company<\/span><\/h1>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221; el_class=&#8221;header-subtext&#8221;]Companies are increasingly dependent on secure IT systems that reliably support their processes. At the same time, threats from digital attacks are on the rise. The best way to meet this challenge is to take proactive action.<br \/>And it all starts with a secure IT infrastructure.[\/vc_column_text]<a href=\"#form\" class=\"vcex-button theme-button inline header-button\"><span class=\"vcex-button-inner theme-button-inner wpex-flex wpex-flex-wrap wpex-items-center wpex-justify-center\">Get free advice now<\/span><\/a> [\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"vcex-module vcex-divider vcex-divider-solid wpex-my-50 vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"border-color:#00056e;\"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column]<style>.vcex-heading.vcex_69dd0fb357bd2{color:#00056e;font-family:'Playfair Display', serif;font-weight:700;line-height:var(--wpex-leading-loose);}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 wpex-text-center vc_custom_1765954065970 vcex_69dd0fb357bd2\"><span class=\"vcex-heading-inner wpex-inline-block\">Secure IT infrastructure with @-yet<\/span><\/h2>[vc_row_inner gap=&#8221;35&#8243;][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-icon-box.vcex_69dd0fb358b3f .vcex-icon-box-content{color:#00056e;font-size:20px;font-family:'Open Sans';}.vcex-icon-box.vcex_69dd0fb358b3f .vcex-icon-box-heading{color:#00056e;font-size:20px;font-family:'Open Sans';font-weight:700;}.vcex-icon-box.vcex_69dd0fb358b3f .vcex-icon-box-icon{color:#00056e;}.vcex-icon-box.vcex_69dd0fb358b3f .vcex-icon-box-image{width:50px;}<\/style><a class=\"vcex-module vcex-icon-box vcex-icon-box-two vcex-icon-box-has-link wpex-inherit-color wpex-no-underline wpex-block wpex-text-center vcex_69dd0fb358b3f\" href=\"#\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--image wpex-mb-20\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"Haken in einem Kreis. Symbolbild f\u00fcr erledigte Aufgaben\" decoding=\"async\" src=\"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/10\/Prevention.svg\" width=\"88\" height=\"88\"><\/div><div class=\"vcex-icon-box-text\"><h4 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\">Many years of experience<\/h4><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p>Our experts draw on knowledge and experience from more than 20 years of IT forensic analyses, penetration tests, the development of management systems and red teaming.<\/p>\n<\/div><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-icon-box.vcex_69dd0fb35a300 .vcex-icon-box-content{color:#00056e;font-size:20px;font-family:'Open Sans';}.vcex-icon-box.vcex_69dd0fb35a300 .vcex-icon-box-heading{color:#00056e;font-size:20px;font-family:'Open Sans';font-weight:700;}.vcex-icon-box.vcex_69dd0fb35a300 .vcex-icon-box-icon{color:#00056e;}.vcex-icon-box.vcex_69dd0fb35a300 .vcex-icon-box-image{width:50px;}<\/style><a class=\"vcex-module vcex-icon-box vcex-icon-box-two vcex-icon-box-has-link wpex-inherit-color wpex-no-underline wpex-block wpex-text-center vcex_69dd0fb35a300\" href=\"#\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--image wpex-mb-20\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"Haken in einem Kreis. Symbolbild f\u00fcr erledigte Aufgaben\" decoding=\"async\" src=\"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/10\/Prevention.svg\" width=\"88\" height=\"88\"><\/div><div class=\"vcex-icon-box-text\"><h4 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\">Independent<\/h4><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p>@-yet is not contractually bound to any hardware or software manufacturer. You always receive the best solution, regardless of the product.<\/p>\n<\/div><\/div><\/a>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-icon-box.vcex_69dd0fb35b295 .vcex-icon-box-content{color:#00056e;font-size:20px;font-family:'Open Sans';}.vcex-icon-box.vcex_69dd0fb35b295 .vcex-icon-box-heading{color:#00056e;font-size:20px;font-family:'Open Sans';font-weight:700;}.vcex-icon-box.vcex_69dd0fb35b295 .vcex-icon-box-icon{color:#00056e;}.vcex-icon-box.vcex_69dd0fb35b295 .vcex-icon-box-image{width:50px;}<\/style><a class=\"vcex-module vcex-icon-box vcex-icon-box-two vcex-icon-box-has-link wpex-inherit-color wpex-no-underline wpex-block wpex-text-center vcex_69dd0fb35b295\" href=\"#\"><div class=\"vcex-icon-box-symbol vcex-icon-box-symbol--image wpex-mb-20\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"Haken in einem Kreis. Symbolbild f\u00fcr erledigte Aufgaben\" decoding=\"async\" src=\"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/10\/Prevention.svg\" width=\"88\" height=\"88\"><\/div><div class=\"vcex-icon-box-text\"><h4 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\">Certified specialists<\/h4><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p>The @-yet teams consist exclusively of experienced and in some cases multi-certified security specialists.<\/p>\n<\/div><\/div><\/a>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"vcex-module vcex-divider vcex-divider-solid wpex-my-50 vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"border-color:#00056e;\"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765954150562{padding-top: 50px !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;24px&#8221; font_family=&#8221;Open Sans&#8221;]A favourite target for attacks[\/vc_column_text]<style>.vcex-heading.vcex_69dd0fb35cfef{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dd0fb35cfef\"><span class=\"vcex-heading-inner wpex-inline-block\">Protect the Active Directory<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]The Active Directory is the centrepiece of the IT infrastructure and is particularly worth protecting from an IT security perspective. It is responsible for user and system administration. And it is the basis for the organisation of authorisations in many companies. It is therefore of central importance for every IT organisation &#8211; and one of the most important targets for attackers.<\/p>\n<p>The experts at @-yet GmbH support you in the sustainable protection of the Active Directory. This includes the implementation of hierarchical security structures (\u2018tiering model\u2019) and the use of secure authentication methods and protocols. Through this and other hardening measures (e.g. via security GPOs), we prevent or make it more difficult for an attacker to gain higher or even the highest authorisation level in the IT infrastructure.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765954160759{padding-top: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Security through separation[\/vc_column_text]<style>.vcex-heading.vcex_69dd0fb35dbc8{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dd0fb35dbc8\"><span class=\"vcex-heading-inner wpex-inline-block\">Network segmentation<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]The heart of every IT infrastructure is the network. It connects IT systems and allows them to communicate with each other, enabling collaboration even across location boundaries. Attackers exploit the weakest point in this complex network structure and try to gain access to your network and systems.<\/p>\n<p>Network segmentation is a very effective means of preventing the spread of attacks in your network. Our security experts divide the company&#8217;s network into smaller, individually secured sections. We restrict access to and between the individual segments according to the principle of the lowest possible authorisations (\u2018need-2-access\u2019). @-yet supports you in classifying systems according to their respective security requirements.<\/p>\n<p>Based on this planning, our teams design a finely segmented network with strict, secure rules for communication that are customised to your needs.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765954225711{padding-top: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Unencrypted in an emergency[\/vc_column_text]<style>.vcex-heading.vcex_69dd0fb35e7bb{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dd0fb35e7bb\"><span class=\"vcex-heading-inner wpex-inline-block\">Protect backups from ransomware<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]According to the Sophos Ransomware Report 2024, almost 60% of all companies worldwide were affected by an attack by encryption malware in 2023. More than 800 companies were victims of an attack in Germany alone. When ransomware strikes, it encrypts data on all affected systems &#8211; and also attempts to compromise backup data.<\/p>\n<p>@-yet supports you in setting up a ransomware-proof backup infrastructure. We protect your backup systems with technical and organisational measures such as media disruption or separate administration. In this way, we ensure that your data backups are safe from sabotage even in the event of a cyber emergency and that you are still able to recover.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765954242121{padding-top: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Detect the attack when it happens[\/vc_column_text]<style>.vcex-heading.vcex_69dd0fb35f33f{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dd0fb35f33f\"><span class=\"vcex-heading-inner wpex-inline-block\">Detection of attacks<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]Many attacks on IT infrastructure follow the same or similar patterns. Recognising these patterns is the task of attack detection systems (SIEM), which is required for all relevant companies as part of NIS2, among other things. These systems are an integral part of a good security strategy and an effective way of recognising cyber attacks at an early stage. In order for these systems to recognise attack patterns, they require correlated information from the infrastructure, e.g. from connected log sources.<\/p>\n<p>The security experts at @-yet support you right from the start in the planning and implementation of such a solution. Whether defining the requirements, identifying the required data sources, their technical connection or the processual implementation &#8211; @-yet is at your side with certified specialists.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765954307643{padding-top: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Effective protection right to the end point[\/vc_column_text]<style>.vcex-heading.vcex_69dd0fb35fd1a{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dd0fb35fd1a\"><span class=\"vcex-heading-inner wpex-inline-block\">Endpoint security<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]All statistics come to the same conclusion: phishing is the most common gateway for cyber criminals. In the age of generative AI, fake emails that tempt people to click carelessly are difficult to distinguish from originals. Awareness training for employees increases the chance of preventing such an attack in advance.<\/p>\n<p>However, a single careless click must not lead to a catastrophe.<br \/>Today, endpoint security is more than just virus protection. @-yet GmbH supports you in the interaction of all disciplines to protect your end devices.[\/vc_column_text]<style>.vcex-bullets.vcex_69dd0fb360422{color:#00056e;font-size:var(--wpex-text-lg);font-family:'Open Sans';}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical custom-icon wpex-text-lg vc_custom_1765954345895 bullet-liste vcex_69dd0fb360422\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Virus protection<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Detection of attacks<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">System hardening<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Encryption<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Protection while working from home<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Software and asset management<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Support and administration<\/div><\/div><\/li>\n<\/ul>\n<\/div>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]Support from employees is an important aspect. @-yet designs a customised endpoint security solution for you and sensitises your team to the various threats.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765954526864{padding-top: 50px !important;padding-bottom: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Professionally close security gaps[\/vc_column_text]<style>.vcex-heading.vcex_69dd0fb360e06{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dd0fb360e06\"><span class=\"vcex-heading-inner wpex-inline-block\">Vulnerability management<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]A study by the BSI (Federal Office for Information Security) shows that 70 new vulnerabilities are found in software products every day. And the trend is rising. The more software your company uses, the higher the number of potential vulnerabilities. And many become a gateway for attackers to gain access to the company network or systems or to spread within them. In order to close these vulnerabilities as quickly as possible, companies need well thought-out vulnerability management as a continuous process.<\/p>\n<p>@-yet GmbH provides comprehensive advice on product selection and design[\/vc_column_text]<style>.vcex-bullets.vcex_69dd0fb3614bb{color:#00056e;font-size:var(--wpex-text-lg);font-family:'Open Sans';}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical custom-icon wpex-text-lg vc_custom_1765954503506 bullet-liste vcex_69dd0fb3614bb\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">for identifying and assessing the risk of vulnerabilities<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">identification of the affected assets and<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">the elimination of vulnerabilities<\/div><\/div><\/li>\n<\/ul>\n<\/div>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]with a concept and action plan customized to your needs.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1765954538959{background-color: #00056E !important;}&#8221; min_height=&#8221;250px&#8221; el_class=&#8221;info-text-section&#8221;][vc_column]<style>.vcex-heading.vcex_69dd0fb361ebd{color:#ffffff;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 wpex-text-left vcex_69dd0fb361ebd\"><span class=\"vcex-heading-inner wpex-inline-block\">A secure IT infrastructure<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#ffffff&#8221;]Companies are increasingly dependent on secure IT systems that reliably support processes. At the same time, threats from digital attacks are on the rise. The best way to meet this challenge is to act proactively. And it all starts with a secure IT infrastructure.<\/p>\n<p>A secure IT infrastructure forms the basis for sustainable security and future business success. The IT security experts at @-yet support you with a wide range of consulting services and measures. From analysis and the implementation of advanced security solutions to the optimisation of processes and guidelines. The @-yet teams ensure that your IT infrastructure is and remains stable and reliable &#8211; even in an emergency. This makes your IT landscape a viable basis for sustainable success and protects your company from attacks and security incidents.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765954605788{padding-top: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]@-yet Secure infrastructure[\/vc_column_text]<style>.vcex-heading.vcex_69dd0fb36297d{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 wpex-text-left vcex_69dd0fb36297d\"><span class=\"vcex-heading-inner wpex-inline-block\">What can @-yet do for you?<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]Companies are increasingly dependent on secure IT systems that reliably support their processes. A secure IT infrastructure is resilient to internal and external attacks and cyber incidents of all kinds. In such an environment, incidents only affect isolated areas without jeopardizing the company&#8217;s overall value creation. A secure infrastructure is essential for the company\u2019s continued existence.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765954693210{padding-top: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Secure business through secure IT infrastructure[\/vc_column_text]<style>.vcex-heading.vcex_69dd0fb3634a8{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dd0fb3634a8\"><span class=\"vcex-heading-inner wpex-inline-block\">How @-yet works<\/span><\/h2><style>.vcex-bullets.vcex_69dd0fb363c3c .vcex-bullets-icon-wrap{margin-inline-end:20px;}.vcex-bullets.vcex_69dd0fb363c3c{color:#00056e;font-size:var(--wpex-text-lg);font-family:'Open Sans';}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical wpex-gap-10 custom-icon wpex-text-lg bullet-liste vcex_69dd0fb363c3c\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Comprehensive advice on securing all areas of IT<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Maturity assessment of the IT infrastructure<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Review and optimization of security settings<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">IT infrastructure emergency operation and reconstruction after a cyber incident<\/div><\/div><\/li>\n<\/ul>\n<\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765954762725{padding-top: 50px !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Secure IT infrastructure with @-yet[\/vc_column_text]<style>.vcex-heading.vcex_69dd0fb364490{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dd0fb364490\"><span class=\"vcex-heading-inner wpex-inline-block\">These are your advantages<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:30px;\"><\/div><style>.vcex-bullets.vcex_69dd0fb364cd3 .vcex-bullets-icon-wrap{margin-inline-end:20px;}.vcex-bullets.vcex_69dd0fb364cd3{color:#00056e;font-size:var(--wpex-text-lg);font-family:'Open Sans';}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical wpex-gap-10 custom-icon wpex-text-lg bullet-liste vcex_69dd0fb364cd3\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Increased resilience of the IT infrastructure to cyber incidents<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Holistic approach to the planning and design of IT security<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Application of current findings from IT forensic analyses and security assessments<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Compliance with regulatory requirements such as ISO 27001, NIS2 and GDPR<\/div><\/div><\/li>\n<\/ul>\n<\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:4rem;\"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; css=&#8221;.vc_custom_1759848861664{margin-bottom: 4rem !important;}&#8221;][vc_column]<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"border-bottom-width:1px;border-color:#00056e;\"><\/div>[\/vc_column][\/vc_row][vc_row local_scroll_id=&#8221;form&#8221;][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_section wpex-relative\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<header class=\"ce_contact__header\">\n<p class=\"overline\">With @-yet, you can protect what is most valuable.<\/p>\n<\/header>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div><style>.vcex-heading.vcex_69dd0fb369f99{color:#00056e;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl vcex_69dd0fb369f99\"><span class=\"vcex-heading-inner wpex-inline-block\">Arrange your free, no-obligation consultation now.<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div>\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Arrange your personal appointment now for a non-binding and free consultation. Our security and data protection experts will be happy to answer your questions.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div>\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Direct contact:<\/strong><\/p>\n<p>Phone: +49 2175 16 55 0<br \/>\nEmail: info@at-yet.de<\/p>\n<p>Or via this form.<\/p>\n<p>We look forward to hearing from you!<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><script>\nvar gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),document.addEventListener(\"gform\/theme\/scripts_loaded\",function(){gform.themeScriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>\"function\"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn(\"The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1.\"),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener(\"gform_main_scripts_loaded\",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener(\"gform\/theme\/scripts_loaded\",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener(\"DOMContentLoaded\",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook(\"action\",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook(\"filter\",o,r,e,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,r){gform.removeHook(\"action\",o,r)},removeFilter:function(o,r,e){gform.removeHook(\"filter\",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+\"_\"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==r?t.apply(null,e):e[0]=t.apply(null,e)})),\"filter\"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}});\n<\/script>\n\n                <div class='gf_browser_gecko gform_wrapper gravity-theme gform-theme--no-framework' data-form-theme='gravity-theme' data-form-index='0' id='gform_wrapper_2' ><form method='post' enctype='multipart\/form-data'  id='gform_2'  action='\/en\/wp-json\/wp\/v2\/pages\/1185' data-formid='2' novalidate>\n                        <div class='gform-body gform_body'><div id='gform_fields_2' class='gform_fields top_label form_sublabel_below description_below validation_below'><div id=\"field_2_5\" class=\"gfield gfield--type-select gfield--input-type-select gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_5'>Salutation<\/label><div class='ginput_container ginput_container_select'><select name='input_5' id='input_2_5' class='large gfield_select'     aria-invalid=\"false\" ><option value='' >Please select<\/option><option value='Herr' >Mr.<\/option><option value='Frau' >Mrs.<\/option><\/select><\/div><\/div><fieldset id=\"field_2_1\" class=\"gfield gfield--type-name gfield--input-type-name gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/legend><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_2_1'>\n                            \n                            <span id='input_2_1_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_1.3' id='input_2_1_3' value=''   aria-required='true'     \/>\n                                                    <label for='input_2_1_3' class='gform-field-label gform-field-label--type-sub '>First name<\/label>\n                                                <\/span>\n                            \n                            <span id='input_2_1_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_1.6' id='input_2_1_6' value=''   aria-required='true'     \/>\n                                                    <label for='input_2_1_6' class='gform-field-label gform-field-label--type-sub '>Last name<\/label>\n                                                <\/span>\n                            \n                        <\/div><\/fieldset><div id=\"field_2_6\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_6'>Company<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_6' id='input_2_6' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_7\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-half field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_7'>Position<\/label><div class='ginput_container ginput_container_text'><input name='input_7' id='input_2_7' type='text' value='' class='large'      aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_3\" class=\"gfield gfield--type-email gfield--input-type-email gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_3'>Email<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_3' id='input_2_3' type='email' value='' class='large'    aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/div><div id=\"field_2_4\" class=\"gfield gfield--type-phone gfield--input-type-phone gfield--width-half field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_4'>Phone<\/label><div class='ginput_container ginput_container_phone'><input name='input_4' id='input_2_4' type='tel' value='' class='large'    aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_8\" class=\"gfield gfield--type-textarea gfield--input-type-textarea gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_8'>Your message<\/label><div class='ginput_container ginput_container_textarea'><textarea name='input_8' id='input_2_8' class='textarea medium'      aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/div><fieldset id=\"field_2_10\" class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Further information<\/legend><div class='ginput_container ginput_container_consent'><input name='input_10.1' id='input_2_10_1' type='checkbox' value='1'    aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_2_10_1' >Yes, I would like to receive news about IT security and data protection as well as information about @-yet events in future.<\/label><input type='hidden' name='input_10.2' value='Yes, I would like to receive news about IT security and data protection as well as information about @-yet events in future.' class='gform_hidden' \/><input type='hidden' name='input_10.3' value='2' class='gform_hidden' \/><\/div><\/fieldset><fieldset id=\"field_2_9\" class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Privacy protection<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/legend><div class='ginput_container ginput_container_consent'><input name='input_9.1' id='input_2_9_1' type='checkbox' value='1'   aria-required=\"true\" aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_2_9_1' >Yes, I have read and understood the contents of the <a href=\"\/en\/privacy-policy\">privacy policy<\/a>.<\/label><input type='hidden' name='input_9.2' value='Yes, I have read and understood the contents of the &lt;a href=&quot;\/en\/privacy-policy&quot;&gt;privacy policy&lt;\/a&gt;.' class='gform_hidden' \/><input type='hidden' name='input_9.3' value='2' class='gform_hidden' \/><\/div><\/fieldset><div id=\"field_2_11\" class=\"gfield gfield--type-frcaptcha gfield--input-type-frcaptcha gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_11'>Ohne Titel<\/label><div class='ginput_container ginput_container_frcaptcha'><div class=\"frc-captcha \" data-sitekey=\"FCMKBD0ANB8C39IQ\" data-lang=\"en\" ><\/div>\n\t\t<noscript>You need to enable Javascript for the anti-spam check.<\/noscript><\/div><\/div><\/div><\/div>\n        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_2' class='gform_button button' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit now'  \/> \n            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_2' value='postback' \/>\n            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_2' id='gform_theme_2' value='gravity-theme' \/>\n            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_2' id='gform_style_settings_2' value='[]' \/>\n            <input type='hidden' class='gform_hidden' name='is_submit_2' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='2' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='EUR' value='jrxy6oXIb2oBpCf378008pvwbrsa1KFMLJsCGvga5\/aSn377r8Rl5V1GhS\/ZOGMaDvBgI30B+oEq7x1aMAXKNTtJcp7fVbq3Pi8mkWwKBboYdiU=' \/>\n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_2' value='WyJ7XCI1XCI6W1wiNmVkMzVmYTkwNDY2ZDU4ZDgxNTIxZGI1YmI3NTMzNGNcIixcImQ3MDliMmZkYTY2YWZmMjU0YjhkNmJlMGQ2ZjRhNDUzXCIsXCJhOWVjZmU5NWFhYjcwYTg1YmZjOWQ1MDkzNWVlYjkzMVwiXSxcIjEwLjFcIjpcIjY0Yjc1NTczYTc5YmU1NTk3YmM2N2JjOTFiMmM0MmUxXCIsXCIxMC4yXCI6XCIyOGE2NDdjZjhlOTI5YTdjN2MxMGQ3YTA3Y2Q4MGRlYVwiLFwiMTAuM1wiOlwiM2ZhMTVjODkyMjk0ZWU5NDY1MmNjOTM4Yzg3Y2NhMzZcIixcIjkuMVwiOlwiNjRiNzU1NzNhNzliZTU1OTdiYzY3YmM5MWIyYzQyZTFcIixcIjkuMlwiOlwiYTY3Njc5NjY3YTk0ZDFlYTIzMjM0ZjZjNTUwMjQ3MDZcIixcIjkuM1wiOlwiM2ZhMTVjODkyMjk0ZWU5NDY1MmNjOTM4Yzg3Y2NhMzZcIn0iLCJiZWYyODc5M2QyNGY0ZDY2MmYwNWQ5ZmVlYjYwZmM3NSJd' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_2' id='gform_target_page_number_2' value='0' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_2' id='gform_source_page_number_2' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <\/form>\n                        <\/div><script>\ngform.initializeOnLoaded( function() {gformInitSpinner( 2, 'https:\/\/www.at-yet.de\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery('#gform_ajax_frame_2').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_2');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_2').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_2').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_2').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_2').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_2').val();gformInitSpinner( 2, 'https:\/\/www.at-yet.de\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [2, current_page]);window['gf_submitting_2'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_2').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [2]);window['gf_submitting_2'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_2').text());}else{jQuery('#gform_2').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger(\"gform_pre_post_render\", [{ formId: \"2\", currentPage: \"current_page\", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( \"gform_wrapper_2\" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( \"span\" );            visibilitySpan.id = \"gform_visibility_test_2\";            gformWrapperDiv.insertAdjacentElement( \"afterend\", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( \"gform_visibility_test_2\" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 2, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} );\n<\/script>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"Secure IT infrastructure - the basis for sustainable IT security and the success of your company Companies are increasingly dependent on secure IT systems that reliably support their processes. At the same time, threats from digital attacks are on the rise. The best way to meet this challenge is to take proactive action.And it all&hellip;","protected":false},"author":2,"featured_media":0,"parent":887,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1185","page","type-page","status-publish","hentry","entry","no-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Secure Infrastructure - @-yet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.at-yet.de\/en\/it-security\/secure-infrastructure\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Infrastructure\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.at-yet.de\/en\/it-security\/secure-infrastructure\" \/>\n<meta property=\"og:site_name\" content=\"@-yet\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-22T11:05:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/secure-infrastructure\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/secure-infrastructure\",\"name\":\"Secure Infrastructure - @-yet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#website\"},\"datePublished\":\"2025-11-10T13:48:24+00:00\",\"dateModified\":\"2025-12-22T11:05:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/secure-infrastructure#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/secure-infrastructure\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\\\/secure-infrastructure#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.at-yet.de\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT security\",\"item\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/it-security\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Secure Infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#website\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\",\"name\":\"@-yet\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.at-yet.de\\\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#organization\",\"name\":\"@-yet\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/add_yet_Logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.at-yet.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/add_yet_Logo.svg\",\"caption\":\"@-yet\"},\"image\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/at-yet\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Secure Infrastructure - @-yet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.at-yet.de\/en\/it-security\/secure-infrastructure","og_locale":"en_US","og_type":"article","og_title":"Secure Infrastructure","og_url":"https:\/\/www.at-yet.de\/en\/it-security\/secure-infrastructure","og_site_name":"@-yet","article_modified_time":"2025-12-22T11:05:29+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.at-yet.de\/en\/it-security\/secure-infrastructure","url":"https:\/\/www.at-yet.de\/en\/it-security\/secure-infrastructure","name":"Secure Infrastructure - @-yet","isPartOf":{"@id":"https:\/\/www.at-yet.de\/en#website"},"datePublished":"2025-11-10T13:48:24+00:00","dateModified":"2025-12-22T11:05:29+00:00","breadcrumb":{"@id":"https:\/\/www.at-yet.de\/en\/it-security\/secure-infrastructure#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.at-yet.de\/en\/it-security\/secure-infrastructure"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.at-yet.de\/en\/it-security\/secure-infrastructure#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.at-yet.de\/en"},{"@type":"ListItem","position":2,"name":"IT security","item":"https:\/\/www.at-yet.de\/en\/it-security"},{"@type":"ListItem","position":3,"name":"Secure Infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/www.at-yet.de\/en#website","url":"https:\/\/www.at-yet.de\/en","name":"@-yet","description":"","publisher":{"@id":"https:\/\/www.at-yet.de\/en#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.at-yet.de\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.at-yet.de\/en#organization","name":"@-yet","url":"https:\/\/www.at-yet.de\/en","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.at-yet.de\/en#\/schema\/logo\/image\/","url":"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/07\/add_yet_Logo.svg","contentUrl":"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/07\/add_yet_Logo.svg","caption":"@-yet"},"image":{"@id":"https:\/\/www.at-yet.de\/en#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/at-yet\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/1185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/comments?post=1185"}],"version-history":[{"count":6,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/1185\/revisions"}],"predecessor-version":[{"id":1798,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/1185\/revisions\/1798"}],"up":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/887"}],"wp:attachment":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/media?parent=1185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}