{"id":7052,"date":"2024-08-29T11:34:15","date_gmt":"2024-08-29T10:34:15","guid":{"rendered":"https:\/\/clue.ch\/?page_id=7052"},"modified":"2025-12-17T15:00:25","modified_gmt":"2025-12-17T14:00:25","slug":"managed-detection-and-response","status":"publish","type":"page","link":"https:\/\/clue.de\/en\/solutions\/managed-detection-and-response\/","title":{"rendered":"Managed Detection and Response"},"content":{"rendered":"<h1>Managed Detection <br \/>and Response<\/h1>\n<div>\n<p>Kontinuierliche Sicherheit in allen Umgebungen.<\/p>\n<\/div>\n<h2>Benefits<\/h2>\n<div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/MDR_1@3x.png\" alt=\"\"><\/p>\n<h3>Umfassendes Portfolio<\/h3>\n<div>\n<p>Wir bieten eine breite Palette von Erkennungs- und Abwehrservices, bei denen fortschrittliche Technologien und Expertenanalysen zur schnellen Behebung von Bedrohungen eingesetzt werden.<\/p>\n<\/div>\n<\/div>\n<div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/MDR_2@3x.png\" alt=\"\"><\/p>\n<h3>24\/7 Erkennung und Reaktion<\/h3>\n<div>\n<p>Kontinuierliche \u00dcberwachung, wobei False Positives herausgefiltert werden, um nur relevante Warnmeldungen zu liefern.<\/p>\n<\/div>\n<\/div>\n<div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/MDR_3@3x.png\" alt=\"\"><\/p>\n<h3>Integration von IT und OT<\/h3>\n<div>\n<p><span style=\"font-weight: 400;\">Vereinheitlichung des Bedrohungsmanagements \u00fcber IT- und OT-Umgebungen hinweg, was den Bedarf nach mehreren Sicherheitsanbietern vermeidet.<\/span><\/p>\n<\/div>\n<\/div>\n<div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/MDR_4@3x.png\" alt=\"\"><\/p>\n<h3>Plug-and-Protect-Ansatz<\/h3>\n<div>\n<p><span>Vereinfachung der Cybersicherheit durch schnell einsetzbare Technologien und transparente, verbrauchsabh\u00e4ngige Preise, die von KMUs bis zu Grossunternehmen skalierbar sind, ohne versteckte Kosten.<\/span><\/p>\n<\/div>\n<\/div>\n<div>\n<\/div>\n<h2>Features<\/h2>\n<div>\n<p>Unser MDR-Service integriert wesentliche Komponenten, die von der Industrie verlangt werden, und stellt Unternehmen die notwendigen Werkzeuge zur Verf\u00fcgung, um eine effektive Cyberabwehr \u00fcber alle Angriffsphasen hinweg gem\u00e4ss dem MITRE-Framework durchzuf\u00fchren:<\/p>\n<\/div>\n<ul>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/dvr_42dp_000000_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h3>Security Information and <br \/>Event Management (SIEM)<\/h3>\n<div>\n<p>Sammelt und analysiert Sicherheitsdaten aus dem gesamten Unternehmen, um potenzielle Sicherheitsvorf\u00e4lle zu identifizieren.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/automation_42dp_000000_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h3>Security Orchestration, Automation<br \/>and Response (SOAR)<\/h3>\n<div>\n<p>Automatisiert die Reaktion auf Cyber-Vorf\u00e4lle und reduziert die Reaktionszeiten und den manuellen Arbeitsaufwand.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/08\/segment_42dp_000000_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h3>Endpoint Detection and <br \/>Response (EDR)<\/h3>\n<div>\n<p>\u00dcberwacht Endpunkt- und Netzwerkereignisse und speichert die Informationen in einer Datenbank zur weiteren Analyse, Untersuchung und Berichterstattung.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/policy_42dp_000000_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h3>Network detection <br \/>and response (NDR)<\/h3>\n<div>\n<p>Bietet Einblick in den Netzwerkverkehr und hilft dabei, Bedrohungen zu erkennen und darauf zu reagieren, bevor sie Schaden anrichten.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/phishing_42dp_000000_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h3>Schutz von E-Mails <br \/>und Inhalten<\/h3>\n<div>\n<p>Filtert Phishing-Versuche und b\u00f6sartige E-Mails aus und entfernt potenziell sch\u00e4dlichen Code aus Anh\u00e4ngen mithilfe von Content Disarm and Reconstruction (CDR).<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/08\/security_42dp_000000_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h3>Schwachstellen- und <br \/>Threat-Management<\/h3>\n<div>\n<p><strong><\/strong>Identifiziert, klassifiziert und priorisiert Schwachstellen und liefert Erkenntnisse und Strategien zur Verteidigung.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/tactic_42dp_000000_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h3>Incident <br \/>Response<\/h3>\n<div>\n<p>Sorgt f\u00fcr ein geplantes, kontrolliertes Vorgehen nach einem Security Breach oder einem Cyberangriff.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/psychology_42dp_000000_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h3>KI-gest\u00fctzte <br \/>Erkennung<\/h3>\n<div>\n<p>Nutzt k\u00fcnstliche Intelligenz zur schnellen Vorhersage und Erkennung von Cyber-Bedrohungen.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/radar_42dp_000000_FILL0_wght400_GRAD0_opsz40-1.svg\" alt=\"\"><\/p>\n<h3>Integrierte <br \/>Cyberabwehr<\/h3>\n<div>\n<p>Sorgt f\u00fcr nahtlosen Schutz auf allen Ebenen durch die Integration mehrerer Sicherheitstools und -mechanismen.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p><!--more--><br \/>\n<!-- {\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"media_overlay\":\"rgba(7, 7, 7, 0.38)\",\"padding\":\"xlarge\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"video\":\"wp-content\\\/uploads\\\/2024\\\/10\\\/MDR_lo.mp4\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"2-3,1-3\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Managed Detection <br \\\/>and Response\",\"title_element\":\"h1\",\"title_style\":\"h1\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Kontinuierliche Sicherheit in allen Umgebungen.<\\\/p>\",\"content_en_gb\":\"\n\n<p>Continuously secure across all environments.<\\\/p>\",\"margin\":\"default\",\"text_style\":\"large\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"}}]}],\"name\":\"Header \"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"image_position\":\"center-center\",\"padding_remove_bottom\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"small\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Benefits\",\"margin\":\"medium\",\"text_align\":\"center\",\"title_element\":\"h2\",\"title_style\":\"h2\"}},{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"1\",\"icon_width\":\"\",\"image_align\":\"left\",\"image_grid_breakpoint\":\"\",\"image_grid_width\":\"1-5\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"large\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_expand\":\"image\",\"panel_image_no_padding\":true,\"panel_padding\":\"small\",\"panel_style\":\"card-default\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Wir bieten eine breite Palette von Erkennungs- und Abwehrservices, bei denen fortschrittliche Technologien und Expertenanalysen zur schnellen Behebung von Bedrohungen eingesetzt werden.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Providing a broad range of detection and response services using advanced technology and expert analysis for rapid threat mitigation.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/MDR_1@3x.png\",\"panel_style\":\"card-default\",\"title\":\"Umfassendes Portfolio\",\"title_en_gb\":\"Comprehensive Portfolio\"}}]},{\"type\":\"grid\",\"props\":{\"blend\":false,\"content_column_breakpoint\":\"m\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"1\",\"icon_width\":\"\",\"image_align\":\"right\",\"image_grid_breakpoint\":\"\",\"image_grid_width\":\"1-5\",\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"item_animation\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"large\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_expand\":\"image\",\"panel_image_no_padding\":true,\"panel_padding\":\"small\",\"panel_style\":\"card-default\",\"position_right\":\"70\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Kontinuierliche \\u00dcberwachung, wobei False Positives herausgefiltert werden, um nur relevante Warnmeldungen zu liefern.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span style=\\\"font-weight: 400;\\\">Permanently on guard, filtering out false positives to deliver only relevant alerts.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/MDR_2@3x.png\",\"title\":\"24\\\/7 Erkennung und Reaktion\",\"title_en_gb\":\"24\\\/7 Detection and Response\"}}]},{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"1\",\"icon_width\":\"\",\"image_align\":\"left\",\"image_grid_breakpoint\":\"\",\"image_grid_width\":\"1-5\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_expand\":\"both\",\"panel_image_no_padding\":true,\"panel_padding\":\"small\",\"panel_style\":\"card-default\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p><span style=\\\"font-weight: 400;\\\">Vereinheitlichung des Bedrohungsmanagements \\u00fcber IT- und OT-Umgebungen hinweg, was den Bedarf nach mehreren Sicherheitsanbietern vermeidet.<\\\/span><\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Achieving unified threat management across IT and OT environments, eliminating the need for multiple security providers.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/MDR_3@3x.png\",\"title\":\"Integration von IT und OT\",\"title_en_gb\":\"IT and OT Integration\"}}]},{\"type\":\"grid\",\"props\":{\"blend\":false,\"content_column_breakpoint\":\"m\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"1\",\"icon_width\":\"\",\"image_align\":\"right\",\"image_grid_breakpoint\":\"\",\"image_grid_width\":\"1-5\",\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"item_animation\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"large\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_expand\":\"image\",\"panel_image_no_padding\":true,\"panel_padding\":\"small\",\"panel_style\":\"card-default\",\"position_right\":\"70\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p><span>Vereinfachung der Cybersicherheit durch schnell einsetzbare Technologien und transparente, verbrauchsabh\\u00e4ngige Preise, die von KMUs bis zu Grossunternehmen skalierbar sind, ohne versteckte Kosten.<\\\/span><\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Simplifying cybersecurity with ready-to-deploy technologies and transparent, consumption-based pricing that scales from SMEs to large enterprises without hidden costs.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/MDR_4@3x.png\",\"title\":\"Plug-and-Protect-Ansatz\",\"title_en_gb\":\"Plug and Protect Approach\"}}]}]}]}],\"name\":\"Benefits\"},{\"type\":\"section\",\"props\":{\"class\":\"quote_card\",\"image_position\":\"center-center\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"1\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"item_maxwidth\":\"2xlarge\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"margin_remove_top\":false,\"meta_align\":\"below-content\",\"meta_element\":\"div\",\"meta_style\":\"h6\",\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"position_top\":\"60\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"panel_style\":\"card-default\",\"title\":\"\"},\"source\":{\"query\":{\"name\":\"customerReviewss.customCustomerReviews\",\"arguments\":{\"users\":[],\"users_operator\":\"IN\",\"offset\":0,\"order\":\"date\",\"order_direction\":\"DESC\",\"id\":9406}},\"props\":{\"meta\":{\"filters\":{\"search\":\"\"},\"name\":\"field.quote_credit\"},\"content\":{\"filters\":{\"search\":\"\"},\"name\":\"field.quote\"}}}}]}]}]}],\"name\":\"section_quote_service\"},{\"type\":\"section\",\"props\":{\"id\":\"radial_bg_row_features_apprt\",\"image_position\":\"center-center\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Features\",\"margin\":\"large\",\"text_align\":\"center\",\"title_element\":\"h2\",\"title_style\":\"h2\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Unser MDR-Service integriert wesentliche Komponenten, die von der Industrie verlangt werden, und stellt Unternehmen die notwendigen Werkzeuge zur Verf\\u00fcgung, um eine effektive Cyberabwehr \\u00fcber alle Angriffsphasen hinweg gem\\u00e4ss dem MITRE-Framework durchzuf\\u00fchren:<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Our MDR service integrates essential components demanded by the industry, providing enterprises with the necessary tools to conduct effective cyber defense across all attack phases according to the MITRE framework:<\\\/span><\\\/p>\",\"margin\":\"large\",\"text_align\":\"center\"}}]}]},{\"type\":\"row\",\"props\":{\"row_gap\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"content_margin\":\"small\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"3\",\"grid_parallax\":\"0\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":false,\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_width\":\"42\",\"item_animation\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_margin\":\"remove\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":false,\"panel_padding\":\"small\",\"parallax_easing\":\"1\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_margin\":\"small\",\"title_style\":\"h5\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Sammelt und analysiert Sicherheitsdaten aus dem gesamten Unternehmen, um potenzielle Sicherheitsvorf\\u00e4lle zu identifizieren.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Collects and analyzes security data from across your organization to identify potential security incidents.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/dvr_42dp_000000_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Security Information and <br \/>Event Management (SIEM)\",\"title_en_gb\":\"Security Information and Event Management (SIEM)\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Automatisiert die Reaktion auf Cyber-Vorf\\u00e4lle und reduziert die Reaktionszeiten und den manuellen Arbeitsaufwand.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Automates responses to cyber incidents, reducing response times and manual workloads.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/automation_42dp_000000_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Security Orchestration, Automation<br \/>and Response (SOAR)\",\"title_en_gb\":\"Security Orchestration, Automation, and Response (SOAR)\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>\\u00dcberwacht Endpunkt- und Netzwerkereignisse und speichert die Informationen in einer Datenbank zur weiteren Analyse, Untersuchung und Berichterstattung.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Monitors endpoint and network events and records the information in a database for further analysis, investigation, and reporting.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/08\\\/segment_42dp_000000_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Endpoint Detection and <br \/>Response (EDR)\",\"title_en_gb\":\"Endpoint Detection and <br \/>Response (EDR)\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Bietet Einblick in den Netzwerkverkehr und hilft dabei, Bedrohungen zu erkennen und darauf zu reagieren, bevor sie Schaden anrichten.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Provides visibility into your network traffic, helping to detect and respond to threats before they cause harm.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/policy_42dp_000000_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Network detection <br \/>and response (NDR)\",\"title_en_gb\":\"Network Detection <br \/>and Response (NDR)\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Filtert Phishing-Versuche und b\\u00f6sartige E-Mails aus und entfernt potenziell sch\\u00e4dlichen Code aus Anh\\u00e4ngen mithilfe von Content Disarm and Reconstruction (CDR).<\\\/p>\",\"content_en_gb\":\"Filters out phishing attempts, malicious emails, and removes potentially harmful code from attachments using content disarm and reconstruction (CDR).\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/phishing_42dp_000000_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Schutz von E-Mails <br \/>und Inhalten\",\"title_en_gb\":\"Email and Content <br \/> Protection\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p><strong><\\\/strong>Identifiziert, klassifiziert und priorisiert Schwachstellen und liefert Erkenntnisse und Strategien zur Verteidigung.<\\\/p>\",\"content_en_gb\":\"Identifies, classifies, and prioritizes vulnerabilities while providing insights and strategies for defense.\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/08\\\/security_42dp_000000_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Schwachstellen- und <br \/>Threat-Management\",\"title_en_gb\":\"Vulnerability and Threat <br \/>Management\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Sorgt f\\u00fcr ein geplantes, kontrolliertes Vorgehen nach einem Security Breach oder einem Cyberangriff.<\\\/p>\",\"content_en_gb\":\"Ensures a planned, managed approach to the aftermath of a security breach or cyber attack.\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/tactic_42dp_000000_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Incident <br \/>Response\",\"title_en_gb\":\"Incident <br \/>Response\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Nutzt k\\u00fcnstliche Intelligenz zur schnellen Vorhersage und Erkennung von Cyber-Bedrohungen.<\\\/p>\",\"content_en_gb\":\"Leverages artificial intelligence to predict and identify cyber threats rapidly.\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/psychology_42dp_000000_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"KI-gest\\u00fctzte <br \/>Erkennung\",\"title_en_gb\":\"AI-Based Detection<br \/> Mechanisms\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Sorgt f\\u00fcr nahtlosen Schutz auf allen Ebenen durch die Integration mehrerer Sicherheitstools und -mechanismen.<\\\/p>\",\"content_en_gb\":\"Ensures seamless protection across all layers by integrating multiple security tools and mechanisms.\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/radar_42dp_000000_FILL0_wght400_GRAD0_opsz40-1.svg\",\"title\":\"Integrierte <br \/>Cyberabwehr\",\"title_en_gb\":\"Cyber Defense <br \/>Integration\"}}],\"name\":\"Grid\"}]}]}]},{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"padding\":\"xlarge\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"module\",\"props\":{\"menu_image_align\":\"center\",\"menu_image_margin\":true,\"menu_style\":\"default\",\"menu_type\":\"nav\",\"type\":\"builderwidget\",\"widget\":\"builderwidget-11\"}}]}],\"props\":{\"margin_remove_bottom\":false}}],\"name\":\"Contact Us\"}],\"version\":\"4.4.5\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Managed Detection and Response Kontinuierliche Sicherheit in allen Umgebungen. Benefits Umfassendes Portfolio Wir bieten eine breite Palette von Erkennungs- und Abwehrservices, bei denen fortschrittliche Technologien und Expertenanalysen zur schnellen Behebung von Bedrohungen eingesetzt werden. 24\/7 Erkennung und Reaktion Kontinuierliche \u00dcberwachung, wobei False Positives herausgefiltert werden, um nur relevante Warnmeldungen zu liefern. Integration von IT und [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":1156,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7052","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Managed Detection and Response &#8211; CLUE<\/title>\n<meta name=\"description\" content=\"Real-time threat detection and rapid response to stop cyberattacks before they cause damage.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clue.ch\/\/clue.ch\/\/clue.ch\/en\/solutions\/managed-detection-and-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managed Detection and Response &#8211; CLUE\" \/>\n<meta property=\"og:description\" content=\"Real-time threat detection and rapid response to stop cyberattacks before they cause damage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/clue.ch\/solutions\/managed-detection-and-response\/\" \/>\n<meta property=\"og:site_name\" content=\"CLUE\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.instagram.com\/clue.security\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-17T14:00:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clue.de\/en\/solutions\/managed-detection-and-response\/\",\"url\":\"https:\/\/clue.ch\/solutions\/managed-detection-and-response\/\",\"name\":\"Managed Detection and Response &#8211; CLUE\",\"isPartOf\":{\"@id\":\"https:\/\/clue.ch\/#website\"},\"datePublished\":\"2024-08-29T10:34:15+00:00\",\"dateModified\":\"2025-12-17T14:00:25+00:00\",\"description\":\"Echtzeit-Erkennung und schnelle Reaktion \u2013 Cyberangriffe stoppen, bevor sie Schaden anrichten.\",\"breadcrumb\":{\"@id\":\"https:\/\/clue.ch\/solutions\/managed-detection-and-response\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clue.ch\/solutions\/managed-detection-and-response\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clue.ch\/solutions\/managed-detection-and-response\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clue.ch\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\/\/clue.de\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Managed Detection and Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clue.ch\/#website\",\"url\":\"https:\/\/clue.ch\/\",\"name\":\"CLUE\",\"description\":\"Cyber Secure\",\"publisher\":{\"@id\":\"https:\/\/clue.ch\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clue.ch\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/clue.ch\/#organization\",\"name\":\"CLUE Security Services\",\"url\":\"https:\/\/clue.ch\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/clue.ch\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg\",\"contentUrl\":\"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg\",\"width\":1,\"height\":1,\"caption\":\"CLUE Security Services\"},\"image\":{\"@id\":\"https:\/\/clue.ch\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/clue.security\/\",\"https:\/\/www.linkedin.com\/company\/clue-security-services\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Managed Detection and Response &#8211; CLUE","description":"Real-time threat detection and rapid response to stop cyberattacks before they cause damage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\\\/\\\/clue.ch\/\/clue.ch\/\/clue.ch\/en\/solutions\/managed-detection-and-response\/","og_locale":"en_GB","og_type":"article","og_title":"Managed Detection and Response &#8211; CLUE","og_description":"Real-time threat detection and rapid response to stop cyberattacks before they cause damage.","og_url":"https:\/\/clue.ch\/solutions\/managed-detection-and-response\/","og_site_name":"CLUE","article_publisher":"https:\/\/www.instagram.com\/clue.security\/","article_modified_time":"2025-12-17T14:00:25+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clue.de\/en\/solutions\/managed-detection-and-response\/","url":"https:\/\/clue.ch\/solutions\/managed-detection-and-response\/","name":"Managed Detection and Response &#8211; CLUE","isPartOf":{"@id":"https:\/\/clue.ch\/#website"},"datePublished":"2024-08-29T10:34:15+00:00","dateModified":"2025-12-17T14:00:25+00:00","description":"Echtzeit-Erkennung und schnelle Reaktion \u2013 Cyberangriffe stoppen, bevor sie Schaden anrichten.","breadcrumb":{"@id":"https:\/\/clue.ch\/solutions\/managed-detection-and-response\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clue.ch\/solutions\/managed-detection-and-response\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clue.ch\/solutions\/managed-detection-and-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clue.ch\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/clue.de\/solutions\/"},{"@type":"ListItem","position":3,"name":"Managed Detection and Response"}]},{"@type":"WebSite","@id":"https:\/\/clue.ch\/#website","url":"https:\/\/clue.ch\/","name":"CLUE","description":"Cyber Secure","publisher":{"@id":"https:\/\/clue.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clue.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/clue.ch\/#organization","name":"CLUE Security Services","url":"https:\/\/clue.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/clue.ch\/#\/schema\/logo\/image\/","url":"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg","contentUrl":"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg","width":1,"height":1,"caption":"CLUE Security Services"},"image":{"@id":"https:\/\/clue.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/clue.security\/","https:\/\/www.linkedin.com\/company\/clue-security-services\/"]}]}},"_links":{"self":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/7052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/comments?post=7052"}],"version-history":[{"count":1,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/7052\/revisions"}],"predecessor-version":[{"id":14945,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/7052\/revisions\/14945"}],"up":[{"embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/1156"}],"wp:attachment":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/media?parent=7052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}