{"id":10,"date":"2024-02-14T15:23:27","date_gmt":"2024-02-14T15:23:27","guid":{"rendered":"http:\/\/localhost:8888\/marketing-website\/?page_id=10"},"modified":"2025-12-17T14:54:16","modified_gmt":"2025-12-17T13:54:16","slug":"application-protection","status":"publish","type":"page","link":"https:\/\/clue.de\/en\/services\/application-protection\/","title":{"rendered":"Application Protection"},"content":{"rendered":"<h1>Application Protection<\/h1>\n<div>\n<p>Sch\u00fctzen Sie Ihre Webanwendungen vor raffinierten Cyberangriffen.<\/p>\n<\/div>\n<p>\n    <a href=\"\/contact\/\">Entdecken Sie Clue<\/a>\n<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/application_protection-sm.png\" alt=\"\"><\/p>\n<h2>Benefits<\/h2>\n<ul>\n<li>\n<h3>Umfassende Abwehr<\/h3>\n<div>\n<p>Web Application Firewalls (WAFs) bieten eine wichtige Sicherheitsebene, um Ihre Webanwendungen vor einer Vielzahl von Cyber-Bedrohungen zu sch\u00fctzen.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Effizienter und schneller Schutz<\/h3>\n<div>\n<p>Sorgt f\u00fcr sofortigen Schutz vor Schwachstellen, selbst wenn Software-Updates ausstehen oder unzureichend sind.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Transparente und faire Preisgestaltung<\/h3>\n<div>\n<p>Ein klares, pauschales Abonnement ohne versteckte Kosten. Offene \u00dcberwachung unserer Leistung damit wir Ihre Erwartungen erf\u00fcllen oder \u00fcbertreffen.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<div>\n<p>\u00abDas Vulnerability Management von Clue war f\u00fcr uns ein entscheidender Faktor, da es uns einen beispiellosen Einblick in unsere Sicherheitslage bietet und uns hilft, Bedrohungen immer zwei Schritte voraus zu sein.\u00bb<\/p>\n<p><strong>A.S. &#8211; IT Director<\/strong><\/p>\n<\/div>\n<\/div>\n<h2>Features<\/h2>\n<ul>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/03\/features_apprt_1.svg\" alt=\"\"><\/p>\n<h4>Schutz vor Angriffen auf Applikationen<\/h4>\n<div>\n<p>Sch\u00fctzt vor den OWASP Top 10-Bedrohungen wie SQL Injection und XSS, mit detaillierter Protokollierung und granularer Kontrolle.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/03\/features_apprt_2.svg\" alt=\"\"><\/p>\n<h4>Indentit\u00e4s-<br \/>Management<\/h4>\n<div>\n<p>Erh\u00f6ht die Sicherheit durch robuste Authentifizierungsmethoden, einschliesslich SAMLv2, LDAP und Entra ID f\u00fcr eine vielseitige Benutzer\u00fcberpr\u00fcfung.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/03\/features_apprt_3.svg\" alt=\"\"><\/p>\n<h4>REST-API <br \/>Security<\/h4>\n<div>\n<p>Erweitert den Schutz auf APIs, sichert die Maschine-zu-Maschine-Kommunikation und gew\u00e4hrleistet umfassende Anwendungssicherheit.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/03\/features_apprt_4.svg\" alt=\"\"><\/p>\n<h4>Compliance <br \/>Support<\/h4>\n<div>\n<p>Hilft bei der Erf\u00fcllung wichtiger Compliance-Anforderungen wie PCI-DSS und HIPAA und stellt sicher, dass Ihre Webanwendungen die Branchenstandards einhalten.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/03\/features_apprt_5.svg\" alt=\"\"><\/p>\n<h4>Integration von Vulnerability-Scanner<\/h4>\n<div>\n<p>Nahtlose Integration von Scanergebnissen in Policies zur Verbesserung des Sicherheitsrahmens auf der Grundlage realer Daten.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/03\/features_apprt_6.svg\" alt=\"\"><\/p>\n<h4>Detaillierte Berichterstattung<\/h4>\n<div>\n<p>Bietet aufschlussreiche Berichte \u00fcber Sicherheitsvorf\u00e4lle, Angriffsarten und Verkehrsdaten und l\u00e4sst sich nahtlos in SIEM-Systeme integrieren.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<h4>Weitere Informationen zu diesem Service finden Sie in unserem Factsheet.<\/h4>\n<p><a href=\"\/wp-content\/uploads\/2024\/09\/Fact-Sheet-Managed-Application-Protection_11_2022_DE_web-1.pdf\">Download<\/a><\/p>\n<\/div>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/Portal-Illustration.png\" alt=\"\"><\/p>\n<h4>Erhalten Sie Echtzeit-Einblicke <br \/>mit unserem Portal<\/h4>\n<p><a href=\"\/portal-intro\/\">Zum Portal<\/a><\/p>\n<\/div>\n<div>\n<h5>Erfahren Sie, wie wir die Cybersicherheit eines Herstellers medizinischer Produkte verbesserten.<\/h5>\n<\/div>\n<div>\n<p>Erfahren Sie, wie wir die Cybersicherheit eines Herstellers medizinischer Produkte verbesserten.<\/p>\n<\/div>\n<p>\n    <a href=\"\/blog\/customer_reviews\/medizin-security\/\">ZUR STORY<\/a>\n<\/p>\n<p>\n    <a href=\"\/blog\/customer_reviews\/medizin-security\/\">Zur Story<\/a>\n<\/p>\n<p><!--more--><br \/>\n<!-- {\"type\":\"layout\",\"children\":[{\"name\":\"Banner\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"header_transparent\":false,\"height\":\"pixels\",\"height_offset_top\":true,\"height_viewport\":800,\"image_loading\":true,\"image_position\":\"center-center\",\"image_size\":\"cover\",\"image_width\":\"2560\",\"overlap\":false,\"preserve_color\":true,\"style\":\"default\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"slide-bottom-small\",\"content\":\"Application Protection\",\"content_en_gb\":\"Application Protection\",\"text_align\":\"left\",\"title_element\":\"h1\"}},{\"type\":\"text\",\"props\":{\"animation\":\"slide-top-small\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Sch\\u00fctzen Sie Ihre Webanwendungen vor raffinierten Cyberangriffen.<\\\/p>\",\"content_en_gb\":\"\n\n<p>Safeguard your web applications from sophisticated cyber attacks.<\\\/p>\",\"dropcap\":false,\"margin\":\"default\",\"text_align\":\"left\",\"text_style\":\"large\"}},{\"type\":\"button\",\"props\":{\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"default\",\"content\":\"Entdecken Sie Clue\",\"content_en_gb\":\"Explore CLUE today\",\"icon\":\"\",\"icon_align\":\"left\",\"link\":\"contact\\\/\",\"link_en_gb\":\"en\\\/contact\\\/\"}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"image\",\"props\":{\"id\":\"apprt_service_icon\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/07\\\/application_protection-sm.png\",\"image_focal_point\":\"top-left\",\"image_svg_color\":\"emphasis\",\"margin\":\"default\",\"margin_remove_top\":false}}]}],\"props\":{\"layout\":\"2-3,1-3\"}}]},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"100\",\"image_position\":\"center-center\",\"padding_remove_bottom\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"fade\",\"block_align\":\"center\",\"content\":\"Benefits\",\"margin\":\"large\",\"maxwidth\":\"2xlarge\",\"text_align\":\"center\",\"title_color\":\"secondary\",\"title_element\":\"h2\"}},{\"type\":\"grid\",\"props\":{\"content_align\":false,\"content_column_breakpoint\":\"m\",\"content_dropcap\":false,\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":false,\"grid_default\":\"1\",\"grid_medium\":\"3\",\"grid_parallax\":\"0\",\"grid_row_align\":false,\"icon_width\":80,\"id\":\"benefits_service_card\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"link_style\":\"text\",\"link_text\":\"Read more\",\"margin\":\"\",\"margin_remove_top\":false,\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":false,\"panel_padding\":\"small\",\"panel_style\":\"card-default\",\"position_left\":\"10\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_margin\":\"small\",\"title_style\":\"h4\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Web Application Firewalls (WAFs) bieten eine wichtige Sicherheitsebene, um Ihre Webanwendungen vor einer Vielzahl von Cyber-Bedrohungen zu sch\\u00fctzen.<\\\/p>\",\"content_en_gb\":\"Web Application Firewalls (WAFs) provide a critical security layer to shield your web apps from a myriad of cyber threats.\",\"icon\":\"\",\"link_text\":\"Learn More\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Umfassende Abwehr\",\"title_en_gb\":\"Comprehensive Defense\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Sorgt f\\u00fcr sofortigen Schutz vor Schwachstellen, selbst wenn Software-Updates ausstehen oder unzureichend sind.<\\\/p>\",\"content_en_gb\":\"Ensures immediate defense against vulnerabilities, even when software updates are pending or insufficient.\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Effizienter und schneller Schutz\",\"title_en_gb\":\"Efficient and Fast Protection\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Ein klares, pauschales Abonnement ohne versteckte Kosten. Offene \\u00dcberwachung unserer Leistung damit wir Ihre Erwartungen erf\\u00fcllen oder \\u00fcbertreffen.<\\\/p>\",\"content_en_gb\":\"A clear, flat-fee subscription without hidden costs. Monitor our performance openly, ensuring we meet or exceed your expectations.\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Transparente und faire Preisgestaltung\",\"title_en_gb\":\"Transparent and Fair Pricing\"}}]}]}],\"props\":{\"margin\":\"large\",\"row_gap\":\"large\",\"width\":\"default\"}}],\"name\":\"Benefits\"},{\"type\":\"section\",\"props\":{\"class\":\"quote_card\",\"image_position\":\"center-center\",\"padding\":\"none\",\"padding_remove_bottom\":true,\"padding_remove_top\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content\":\"\n\n<p>\\u00abDas Vulnerability Management von Clue war f\\u00fcr uns ein entscheidender Faktor, da es uns einen beispiellosen Einblick in unsere Sicherheitslage bietet und uns hilft, Bedrohungen immer zwei Schritte voraus zu sein.\\u00bb<\\\/p>\\n\n\n<p><strong>A.S. - IT Director<\\\/strong><\\\/p>\",\"content_column_breakpoint\":\"m\",\"content_en_gb\":\"\n\n<p>\\u201cClue's Vulnerability Management has been a game changer for us as it gives us unprecedented visibility into our security posture and helps us stay two steps ahead of threats.\\u201d<\\\/p>\\n\n\n<p><strong>A.S. - IT Director<\\\/strong><\\\/p>\",\"content_margin\":\"small\",\"css\":\"div.uk-card-body {\\n\\tpadding-top: 20px;\\n}\",\"height_expand\":false,\"icon_width\":80,\"image\":\"\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"xlarge\",\"meta\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":true,\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"position\":\"relative\",\"position_bottom\":\"-100\",\"title\":\"\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"name\":\"Customer Testimonial\"}]}]}],\"name\":\"section_quote_service\"},{\"type\":\"section\",\"props\":{\"id\":\"radial_bg_row_features_apprt\",\"image_position\":\"center-center\",\"padding\":\"xlarge\",\"padding_remove_bottom\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Features\",\"text_align\":\"center\",\"title_element\":\"h2\"}},{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_large\":\"3\",\"grid_medium\":\"\",\"grid_small\":\"1\",\"icon_width\":\"\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_width\":\"42\",\"item_animation\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h4\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Sch\\u00fctzt vor den OWASP Top 10-Bedrohungen wie SQL Injection und XSS, mit detaillierter Protokollierung und granularer Kontrolle.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Guards against OWASP Top 10 threats like SQL Injection and XSS, with detailed logging and granular control.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/03\\\/features_apprt_1.svg\",\"title\":\"Schutz vor Angriffen auf Applikationen\",\"title_en_gb\":\"Application Attack <br \/>Protection\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Erh\\u00f6ht die Sicherheit durch robuste Authentifizierungsmethoden, einschliesslich SAMLv2, LDAP und Entra ID f\\u00fcr eine vielseitige Benutzer\\u00fcberpr\\u00fcfung.<\\\/p>\",\"content_en_gb\":\"Enhances security with robust authentication methods, including SAMLv2, LDAP, and Entra ID for versatile user verification.\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/03\\\/features_apprt_2.svg\",\"title\":\"Indentit\\u00e4s-<br \/>Management\",\"title_en_gb\":\"Identity<br \/>Management\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Erweitert den Schutz auf APIs, sichert die Maschine-zu-Maschine-Kommunikation und gew\\u00e4hrleistet umfassende Anwendungssicherheit.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Extends protection to cover APIs, securing machine-to-machine communications and ensuring comprehensive application security.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/03\\\/features_apprt_3.svg\",\"title\":\"REST-API <br \/>Security\",\"title_en_gb\":\"REST-API <br \/>Security\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Hilft bei der Erf\\u00fcllung wichtiger Compliance-Anforderungen wie PCI-DSS und HIPAA und stellt sicher, dass Ihre Webanwendungen die Branchenstandards einhalten.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Aids in meeting key compliance requirements like PCI-DSS, HIPAA, ensuring your web applications adhere to industry standards.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/03\\\/features_apprt_4.svg\",\"title\":\"Compliance <br \/>Support\",\"title_en_gb\":\"Compliance <br \/>Support\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Nahtlose Integration von Scanergebnissen in Policies zur Verbesserung des Sicherheitsrahmens auf der Grundlage realer Daten.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Seamlessly incorporates scan results into policies, enhancing the security framework based on real-world data.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/03\\\/features_apprt_5.svg\",\"title\":\"Integration von Vulnerability-Scanner\",\"title_en_gb\":\"Vulnerability <br \/>Scanner Integration\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Bietet aufschlussreiche Berichte \\u00fcber Sicherheitsvorf\\u00e4lle, Angriffsarten und Verkehrsdaten und l\\u00e4sst sich nahtlos in SIEM-Systeme integrieren.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Offers insightful reports on security incidents, attack types, and traffic data, integrating seamlessly with SIEM systems.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/03\\\/features_apprt_6.svg\",\"title\":\"Detaillierte Berichterstattung\",\"title_en_gb\":\"Detailed <br \/>Reporting\"}}]}]}],\"props\":{\"id\":\"features_apprt_row\",\"margin\":\"xlarge\",\"margin_remove_top\":false}},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content\":\"\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/Fact-Sheet-Managed-Application-Protection_11_2022_DE_web-1.pdf\",\"link_en_gb\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/Fact-Sheet-Managed-Application-Protection_11_2022_EN_web.pdf\",\"link_style\":\"default\",\"link_text\":\"Download\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"text_align\":\"center\",\"title\":\"Weitere Informationen zu diesem Service finden Sie in unserem Factsheet.\",\"title_align\":\"top\",\"title_element\":\"h4\",\"title_en_gb\":\"Explore more about this service by reading our fact sheet.\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h4\"},\"name\":\"Factsheet CTA_2\"}]}]},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/Portal-Illustration.png\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link\":\"portal-intro\\\/\",\"link_en_gb\":\"\\\/en\\\/portal-intro\\\/\",\"link_style\":\"secondary\",\"link_text\":\"Zum Portal\",\"link_text_en_gb\":\"To the Portal\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"2xlarge\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"position\":\"relative\",\"position_top\":\"310\",\"text_align\":\"center\",\"title\":\"Erhalten Sie Echtzeit-Einblicke <br \/>mit unserem Portal\",\"title_align\":\"top\",\"title_element\":\"h4\",\"title_en_gb\":\"Get real-time insights with our Portal\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h4\"}}]}]}],\"name\":\"Features\"},{\"type\":\"section\",\"props\":{\"height\":\"pixels\",\"height_offset_top\":false,\"height_viewport\":650,\"id\":\"real_time_portal_feature_apprt\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/10\\\/Med.jpg\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"media_focal_point\":\"top-center\",\"padding\":\"large\",\"style\":\"primary\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<h5>Erfahren Sie, wie wir die Cybersicherheit eines Herstellers medizinischer Produkte verbesserten.<\\\/h5>\",\"content_en_gb\":\"\n\n<h5>Find out how we improved the cyber security of a medical device manufacturer.<\\\/h5>\",\"margin\":\"default\",\"maxwidth\":\"xlarge\",\"position\":\"relative\",\"position_top\":\"260\",\"text_align\":\"center\",\"text_style\":\"large\",\"visibility\":\"m\"}},{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Erfahren Sie, wie wir die Cybersicherheit eines Herstellers medizinischer Produkte verbesserten.<\\\/p>\",\"content_en_gb\":\"\n\n<p>Find out how we improved the cyber security of a medical device manufacturer.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"xlarge\",\"position\":\"relative\",\"position_top\":\"300\",\"text_align\":\"center\",\"text_color\":\"secondary\",\"text_style\":\"meta\",\"visibility\":\"hidden-m\"}},{\"type\":\"button\",\"props\":{\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"position\":\"relative\",\"position_top\":\"260\",\"text_align\":\"center\",\"visibility\":\"m\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"text\",\"content\":\"ZUR STORY\",\"content_en_gb\":\"Read More\",\"icon_align\":\"left\",\"link\":\"blog\\\/customer_reviews\\\/medizin-security\\\/\",\"link_en_gb\":\"en\\\/blog\\\/customer_reviews\\\/medizin-security\\\/\"}}],\"name\":\"Button Desktop\"},{\"type\":\"button\",\"props\":{\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"position\":\"relative\",\"position_top\":\"300\",\"text_align\":\"center\",\"visibility\":\"hidden-m\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"primary\",\"content\":\"Zur Story\",\"icon_align\":\"left\",\"link\":\"blog\\\/customer_reviews\\\/medizin-security\\\/\",\"link_en_gb\":\"en\\\/blog\\\/customer_reviews\\\/medizin-security\\\/\"}}],\"name\":\"Button Mobile\"}]}]}],\"name\":\"Portal Feature_D\"},{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_bottom\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"module\",\"props\":{\"menu_image_align\":\"center\",\"menu_image_margin\":true,\"menu_style\":\"default\",\"menu_type\":\"nav\",\"type\":\"builderwidget\",\"widget\":\"builderwidget-11\"}}]}]}],\"name\":\"Contact Form\"}],\"version\":\"4.4.5\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Application Protection Sch\u00fctzen Sie Ihre Webanwendungen vor raffinierten Cyberangriffen. Entdecken Sie Clue Benefits Umfassende Abwehr Web Application Firewalls (WAFs) bieten eine wichtige Sicherheitsebene, um Ihre Webanwendungen vor einer Vielzahl von Cyber-Bedrohungen zu sch\u00fctzen. Effizienter und schneller Schutz Sorgt f\u00fcr sofortigen Schutz vor Schwachstellen, selbst wenn Software-Updates ausstehen oder unzureichend sind. Transparente und faire Preisgestaltung Ein [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":9,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-10","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Application Protection &#8211; CLUE<\/title>\n<meta name=\"description\" content=\"Safeguard your web applications from sophisticated cyber attacks with our comprehensive protection solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clue.ch\/\/clue.ch\/\/clue.ch\/en\/services\/application-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Application Protection &#8211; CLUE\" \/>\n<meta property=\"og:description\" content=\"Safeguard your web applications from sophisticated cyber attacks with our comprehensive protection solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/clue.ch\/services\/application-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"CLUE\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.instagram.com\/clue.security\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-17T13:54:16+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clue.de\/en\/services\/application-protection\/\",\"url\":\"https:\/\/clue.ch\/services\/application-protection\/\",\"name\":\"Application Protection &#8211; CLUE\",\"isPartOf\":{\"@id\":\"https:\/\/clue.ch\/#website\"},\"datePublished\":\"2024-02-14T15:23:27+00:00\",\"dateModified\":\"2025-12-17T13:54:16+00:00\",\"description\":\"Sch\u00fctzen Sie Ihre Webanwendungen vor raffinierten Cyberangriffen mit unseren umfassenden Schutzl\u00f6sungen.\",\"breadcrumb\":{\"@id\":\"https:\/\/clue.ch\/services\/application-protection\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clue.ch\/services\/application-protection\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clue.ch\/services\/application-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clue.ch\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/clue.ch\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Application Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clue.ch\/#website\",\"url\":\"https:\/\/clue.ch\/\",\"name\":\"CLUE\",\"description\":\"Cyber Secure\",\"publisher\":{\"@id\":\"https:\/\/clue.ch\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clue.ch\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/clue.ch\/#organization\",\"name\":\"CLUE Security Services\",\"url\":\"https:\/\/clue.ch\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/clue.ch\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg\",\"contentUrl\":\"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg\",\"width\":1,\"height\":1,\"caption\":\"CLUE Security Services\"},\"image\":{\"@id\":\"https:\/\/clue.ch\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/clue.security\/\",\"https:\/\/www.linkedin.com\/company\/clue-security-services\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Application Protection &#8211; CLUE","description":"Safeguard your web applications from sophisticated cyber attacks with our comprehensive protection solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\\\/\\\/clue.ch\/\/clue.ch\/\/clue.ch\/en\/services\/application-protection\/","og_locale":"en_GB","og_type":"article","og_title":"Application Protection &#8211; CLUE","og_description":"Safeguard your web applications from sophisticated cyber attacks with our comprehensive protection solutions.","og_url":"https:\/\/clue.ch\/services\/application-protection\/","og_site_name":"CLUE","article_publisher":"https:\/\/www.instagram.com\/clue.security\/","article_modified_time":"2025-12-17T13:54:16+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clue.de\/en\/services\/application-protection\/","url":"https:\/\/clue.ch\/services\/application-protection\/","name":"Application Protection &#8211; CLUE","isPartOf":{"@id":"https:\/\/clue.ch\/#website"},"datePublished":"2024-02-14T15:23:27+00:00","dateModified":"2025-12-17T13:54:16+00:00","description":"Sch\u00fctzen Sie Ihre Webanwendungen vor raffinierten Cyberangriffen mit unseren umfassenden Schutzl\u00f6sungen.","breadcrumb":{"@id":"https:\/\/clue.ch\/services\/application-protection\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clue.ch\/services\/application-protection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clue.ch\/services\/application-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clue.ch\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/clue.ch\/services\/"},{"@type":"ListItem","position":3,"name":"Application Protection"}]},{"@type":"WebSite","@id":"https:\/\/clue.ch\/#website","url":"https:\/\/clue.ch\/","name":"CLUE","description":"Cyber Secure","publisher":{"@id":"https:\/\/clue.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clue.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/clue.ch\/#organization","name":"CLUE Security Services","url":"https:\/\/clue.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/clue.ch\/#\/schema\/logo\/image\/","url":"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg","contentUrl":"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg","width":1,"height":1,"caption":"CLUE Security Services"},"image":{"@id":"https:\/\/clue.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/clue.security\/","https:\/\/www.linkedin.com\/company\/clue-security-services\/"]}]}},"_links":{"self":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/10","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/comments?post=10"}],"version-history":[{"count":1,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/10\/revisions"}],"predecessor-version":[{"id":14939,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/10\/revisions\/14939"}],"up":[{"embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/9"}],"wp:attachment":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/media?parent=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}