{"id":9,"date":"2024-02-14T15:23:56","date_gmt":"2024-02-14T15:23:56","guid":{"rendered":"http:\/\/localhost:8888\/marketing-website\/?page_id=9"},"modified":"2025-12-17T14:52:13","modified_gmt":"2025-12-17T13:52:13","slug":"services","status":"publish","type":"page","link":"https:\/\/clue.de\/en\/services\/","title":{"rendered":"Services"},"content":{"rendered":"<h1>Unsere Services<\/h1>\n<div>\n<p>In einem un\u00fcberschaubaren Angebot an technologischen L\u00f6sungen haben wir sorgf\u00e4ltig die besten ausgew\u00e4hlt. Unsere L\u00f6sungen sind nicht statisch; sie passen sich an und entwickeln sich weiter.<\/p>\n<p>Mit unseren aktiv verwalteten Diensten werden \u00c4nderungen je nach Bedarf vorgenommen, so dass Ihre Sicherheit immer auf dem h\u00f6chsten Stand ist.<\/p>\n<\/div>\n<p>\n    <a href=\"\/contact\/\">Kontaktieren Sie uns<\/a>\n<\/p>\n<ul>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/10\/CYDEH_3D@0.3x.png\" alt=\"\"><\/p>\n<h4>Cyber<br \/>Defense Hub<\/h4>\n<div>Gew\u00e4hrleistete Kontinuit\u00e4t dank 24\/7-\u00dcberwachung,<br \/>\nschnelle Reaktion und fundierter Analyse.<\/div>\n<p><a href=\"\/services\/cyber-defense-hub\/\">Mehr Erfahren<\/a><\/p>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/site_protection_web.png\" alt=\"\"><\/p>\n<h4>Site <br \/>Protection<\/h4>\n<div>Dynamische, sichere Standortverbindungen mit mobilem Zugriff und Cloud-Integration<\/div>\n<p><a href=\"\/services\/site-protection\/\">Mehr Erfahren<\/a><\/p>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/AITHD_web.png\" alt=\"\"><\/p>\n<h4>AI Based <br \/>Threat Detection<\/h4>\n<div>\n<p>Nutzen Sie KI zur pr\u00e4ventiven Erkennung und Neutralisierung von Cyber-Bedrohungen<\/p>\n<\/div>\n<p><a href=\"\/services\/ai-based-threat-detection\/\">Mehr Erfahren<\/a><\/p>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/advanced_endpoint_protecttion_web.png\" alt=\"\"><\/p>\n<h3>Advanced Endpoint Protection<\/h3>\n<div>\n<p>Bek\u00e4mpfen Sie anspruchsvolle Cyber-Bedrohungen mit KI-gesteuertem Endpunktschutz.<\/p>\n<\/div>\n<p><a href=\"\/services\/advanced-endpoint-protection\/\">Mehr Erfahren<\/a><\/p>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/vulnerability_management_web.png\" alt=\"\"><\/p>\n<h3>Vulnerability <br \/>Management<\/h3>\n<div>\n<p>Steuern Sie Ihre Sicherheitslandschaft mit Echtzeit- Einsichten.<\/p>\n<\/div>\n<p><a href=\"\/services\/vulnerability-management\/\">Mehr Erfahren<\/a><\/p>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/MFAUT_web.png\" alt=\"\"><\/p>\n<h3>Multi-Factor <br \/>Authentication<\/h3>\n<div>\n<p>Verbesserte Benutzerverifikation f\u00fcr zuverl\u00e4ssigen Schutz \u00fcber Anwendungen und Systeme hinweg.<\/p>\n<\/div>\n<p><a href=\"\/services\/multifactor-authentication\/\">Mehr Erfahren<\/a><\/p>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/application_protection-sm.png\" alt=\"\"><\/p>\n<h3>Application Protection<\/h3>\n<div>\n<p>Sch\u00fctzen Sie Ihre Webanwendungen vor raffinierten Cyberangriffen.<\/p>\n<\/div>\n<p><a href=\"\/services\/multifactor-authentication\/\">Mehr Erfahren<\/a><\/p>\n<\/li>\n<\/ul>\n<p><!--more--><br \/>\n<!-- {\"type\":\"layout\",\"children\":[{\"name\":\"Banner\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"header_transparent\":true,\"height\":\"pixels\",\"height_offset_top\":true,\"height_viewport\":800,\"image_loading\":true,\"image_position\":\"center-center\",\"image_size\":\"cover\",\"image_width\":\"2560\",\"overlap\":false,\"preserve_color\":true,\"style\":\"primary\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"slide-bottom-small\",\"content\":\"Unsere Services\",\"content_en_gb\":\"Our Services\",\"text_align\":\"left\",\"title_element\":\"h1\"}},{\"type\":\"text\",\"props\":{\"animation\":\"slide-top-small\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>In einem un\\u00fcberschaubaren Angebot an technologischen L\\u00f6sungen haben wir sorgf\\u00e4ltig die besten ausgew\\u00e4hlt. Unsere L\\u00f6sungen sind nicht statisch; sie passen sich an und entwickeln sich weiter.<\\\/p>\\n\n\n<p>Mit unseren aktiv verwalteten Diensten werden \\u00c4nderungen je nach Bedarf vorgenommen, so dass Ihre Sicherheit immer auf dem h\\u00f6chsten Stand ist.<\\\/p>\",\"content_en_gb\":\"\n\n<p>In a sea of tech options, we\\u2019ve meticulously selected the best. Our solutions aren\\u2019t static; they adapt and evolve.<\\\/p>\\n\n\n<p>With our actively managed services, changes are made as and when needed, ensuring that your security posture is always at its peak.<\\\/p>\",\"dropcap\":false,\"margin\":\"default\",\"text_align\":\"left\"}},{\"type\":\"button\",\"props\":{\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"default\",\"content\":\"Kontaktieren Sie uns\",\"content_en_gb\":\"Get in touch\",\"icon_align\":\"left\",\"link\":\"\\\/contact\\\/\",\"link_en_gb\":\"\\\/en\\\/contact\\\/\"}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"}}],\"props\":{\"layout\":\"1-2,1-2\"}}]},{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"padding\":\"xlarge\",\"padding_remove_top\":true,\"style\":\"primary\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"3\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_width\":\"100\",\"item_animation\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":false,\"panel_padding\":\"small\",\"panel_style\":\"card-default\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"text_align\":\"center\",\"title_align\":\"top\",\"title_element\":\"h4\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h4\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"Gew\\u00e4hrleistete Kontinuit\\u00e4t dank 24\\\/7-\\u00dcberwachung,\\nschnelle Reaktion und fundierter Analyse.\",\"content_en_gb\":\"Guaranteed continuity thanks to 24\\\/7 monitoring,\\nrapid response, and in-depth analysis.\\n\",\"image\":\"wp-content\\\/uploads\\\/2025\\\/10\\\/CYDEH_3D@0.3x.png\",\"link\":\"services\\\/cyber-defense-hub\\\/\",\"link_en_gb\":\"\\\/en\\\/services\\\/cyber-defense-hub\\\/\",\"link_text\":\"Mehr Erfahren\",\"link_text_en_gb\":\"Learn More\",\"title\":\"Cyber<br \/>Defense Hub\",\"title_en_gb\":\"Cyber<br \/>Defense Hub\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"Dynamische, sichere Standortverbindungen mit mobilem Zugriff und Cloud-Integration\",\"content_en_gb\":\"Dynamic, secure site connections with mobile access and cloud integration\\n\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/07\\\/site_protection_web.png\",\"link\":\"services\\\/site-protection\\\/\",\"link_en_gb\":\"\\\/en\\\/services\\\/site-protection\\\/\",\"link_text\":\"Mehr Erfahren\",\"link_text_en_gb\":\"Learn More\",\"title\":\"Site <br \/>Protection\",\"title_en_gb\":\"Site <br \/>Protection\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Nutzen Sie KI zur pr\\u00e4ventiven Erkennung und Neutralisierung von Cyber-Bedrohungen<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Harness AI to preemptively detect and neutralize cyber threats.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/07\\\/AITHD_web.png\",\"link\":\"services\\\/ai-based-threat-detection\\\/\",\"link_en_gb\":\"\\\/en\\\/services\\\/ai-based-threat-detection\\\/\",\"link_text\":\"Mehr Erfahren\",\"link_text_en_gb\":\"Learn More\",\"title\":\"AI Based <br \/>Threat Detection\",\"title_en_gb\":\"AI Based <br \/>Threat Detection\"}}]}]}]},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":false,\"grid_default\":\"1\",\"grid_medium\":\"4\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_width\":\"100\",\"item_animation\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_expand\":\"content\",\"panel_image_no_padding\":false,\"panel_link\":false,\"panel_padding\":\"small\",\"panel_style\":\"card-default\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"text_align\":\"center\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h4\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Bek\\u00e4mpfen Sie anspruchsvolle Cyber-Bedrohungen mit KI-gesteuertem Endpunktschutz.<\\\/p>\",\"content_en_gb\":\"Combat sophisticated cyber threats with AI-driven endpoint protection.\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/07\\\/advanced_endpoint_protecttion_web.png\",\"link\":\"services\\\/advanced-endpoint-protection\\\/\",\"link_en_gb\":\"\\\/en\\\/services\\\/advanced-endpoint-protection\\\/\",\"link_text\":\"Mehr Erfahren\",\"link_text_en_gb\":\"Learn More\",\"title\":\"Advanced Endpoint Protection\",\"title_en_gb\":\"Advanced Endpoint Protection\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Steuern Sie Ihre Sicherheitslandschaft mit Echtzeit- Einsichten.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Master your security landscape with real-time insights.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/07\\\/vulnerability_management_web.png\",\"link\":\"services\\\/vulnerability-management\\\/\",\"link_en_gb\":\"en\\\/services\\\/vulnerability-management\\\/\",\"link_text\":\"Mehr Erfahren\",\"link_text_en_gb\":\"Learn More\",\"title\":\"Vulnerability <br \/>Management\",\"title_en_gb\":\"Vulnerability <br \/>Management\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Verbesserte Benutzerverifikation f\\u00fcr zuverl\\u00e4ssigen Schutz \\u00fcber Anwendungen und Systeme hinweg.<\\\/p>\",\"content_en_gb\":\"Enhance user verification for robust protection across applications and systems.\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/07\\\/MFAUT_web.png\",\"link\":\"services\\\/multifactor-authentication\\\/\",\"link_en_gb\":\"\\\/en\\\/services\\\/multifactor-authentication\\\/\",\"link_text\":\"Mehr Erfahren\",\"link_text_en_gb\":\"Learn More\",\"title\":\"Multi-Factor <br \/>Authentication\",\"title_en_gb\":\"Multi-Factor <br \/>Authentication\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Sch\\u00fctzen Sie Ihre Webanwendungen vor raffinierten Cyberangriffen.<\\\/p>\",\"content_en_gb\":\"Safeguard your web applications from sophisticated cyber attacks.\\n\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/07\\\/application_protection-sm.png\",\"link\":\"services\\\/multifactor-authentication\\\/\",\"link_en_gb\":\"services\\\/application-protection\\\/\",\"link_text\":\"Mehr Erfahren\",\"link_text_en_gb\":\"Learn More\",\"title\":\"Application Protection\",\"title_en_gb\":\"Application Protection\"}}]}]}]}],\"name\":\"Features\"}],\"version\":\"4.4.5\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unsere Services In einem un\u00fcberschaubaren Angebot an technologischen L\u00f6sungen haben wir sorgf\u00e4ltig die besten ausgew\u00e4hlt. Unsere L\u00f6sungen sind nicht statisch; sie passen sich an und entwickeln sich weiter. Mit unseren aktiv verwalteten Diensten werden \u00c4nderungen je nach Bedarf vorgenommen, so dass Ihre Sicherheit immer auf dem h\u00f6chsten Stand ist. Kontaktieren Sie uns CyberDefense Hub Gew\u00e4hrleistete [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-9","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Services &#8211; CLUE<\/title>\n<meta name=\"description\" content=\"Security solutions tailored to safeguard your business from cyber threats\u2014efficient, reliable, and hassle-free.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clue.ch\/\/clue.ch\/\/clue.ch\/en\/services\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Services &#8211; CLUE\" \/>\n<meta property=\"og:description\" content=\"Security solutions tailored to safeguard your business from cyber threats\u2014efficient, reliable, and hassle-free.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/clue.ch\/services\/\" \/>\n<meta property=\"og:site_name\" content=\"CLUE\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.instagram.com\/clue.security\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-17T13:52:13+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clue.de\/en\/services\/\",\"url\":\"https:\/\/clue.ch\/services\/\",\"name\":\"Services &#8211; CLUE\",\"isPartOf\":{\"@id\":\"https:\/\/clue.ch\/#website\"},\"datePublished\":\"2024-02-14T15:23:56+00:00\",\"dateModified\":\"2025-12-17T13:52:13+00:00\",\"description\":\"Massgeschneiderte Sicherheitsl\u00f6sungen, um Ihr Unternehmen vor Cyber-Bedrohungen zu sch\u00fctzen - effizient, zuverl\u00e4ssig und m\u00fchelos.\",\"breadcrumb\":{\"@id\":\"https:\/\/clue.ch\/services\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clue.ch\/services\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clue.ch\/services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clue.ch\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clue.ch\/#website\",\"url\":\"https:\/\/clue.ch\/\",\"name\":\"CLUE\",\"description\":\"Cyber Secure\",\"publisher\":{\"@id\":\"https:\/\/clue.ch\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clue.ch\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/clue.ch\/#organization\",\"name\":\"CLUE Security Services\",\"url\":\"https:\/\/clue.ch\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/clue.ch\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg\",\"contentUrl\":\"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg\",\"width\":1,\"height\":1,\"caption\":\"CLUE Security Services\"},\"image\":{\"@id\":\"https:\/\/clue.ch\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/clue.security\/\",\"https:\/\/www.linkedin.com\/company\/clue-security-services\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Services &#8211; CLUE","description":"Security solutions tailored to safeguard your business from cyber threats\u2014efficient, reliable, and hassle-free.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\\\/\\\/clue.ch\/\/clue.ch\/\/clue.ch\/en\/services\/","og_locale":"en_GB","og_type":"article","og_title":"Services &#8211; CLUE","og_description":"Security solutions tailored to safeguard your business from cyber threats\u2014efficient, reliable, and hassle-free.","og_url":"https:\/\/clue.ch\/services\/","og_site_name":"CLUE","article_publisher":"https:\/\/www.instagram.com\/clue.security\/","article_modified_time":"2025-12-17T13:52:13+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clue.de\/en\/services\/","url":"https:\/\/clue.ch\/services\/","name":"Services &#8211; CLUE","isPartOf":{"@id":"https:\/\/clue.ch\/#website"},"datePublished":"2024-02-14T15:23:56+00:00","dateModified":"2025-12-17T13:52:13+00:00","description":"Massgeschneiderte Sicherheitsl\u00f6sungen, um Ihr Unternehmen vor Cyber-Bedrohungen zu sch\u00fctzen - effizient, zuverl\u00e4ssig und m\u00fchelos.","breadcrumb":{"@id":"https:\/\/clue.ch\/services\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clue.ch\/services\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clue.ch\/services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clue.ch\/"},{"@type":"ListItem","position":2,"name":"Services"}]},{"@type":"WebSite","@id":"https:\/\/clue.ch\/#website","url":"https:\/\/clue.ch\/","name":"CLUE","description":"Cyber Secure","publisher":{"@id":"https:\/\/clue.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clue.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/clue.ch\/#organization","name":"CLUE Security Services","url":"https:\/\/clue.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/clue.ch\/#\/schema\/logo\/image\/","url":"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg","contentUrl":"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg","width":1,"height":1,"caption":"CLUE Security Services"},"image":{"@id":"https:\/\/clue.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/clue.security\/","https:\/\/www.linkedin.com\/company\/clue-security-services\/"]}]}},"_links":{"self":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/9","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/comments?post=9"}],"version-history":[{"count":8,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/9\/revisions"}],"predecessor-version":[{"id":14907,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/9\/revisions\/14907"}],"wp:attachment":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/media?parent=9"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}