{"id":930,"date":"2024-06-26T08:57:23","date_gmt":"2024-06-26T07:57:23","guid":{"rendered":"https:\/\/clue.ch\/?page_id=930"},"modified":"2025-12-17T14:59:10","modified_gmt":"2025-12-17T13:59:10","slug":"vulnerability-management","status":"publish","type":"page","link":"https:\/\/clue.de\/en\/services\/vulnerability-management\/","title":{"rendered":"Vulnerability Management"},"content":{"rendered":"<h1>Vulnerability Management<\/h1>\n<div>\n<p>Meistern Sie Ihr Sicherheitsrisiko mit Echtzeit-Einblicken.<\/p>\n<\/div>\n<p>\n    <a href=\"\/contact\/\">Entdecken Sie Clue<\/a>\n<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/vulnerability_management_web.png\" alt=\"\"><\/p>\n<h2>Benefits<\/h2>\n<ul>\n<li>\n<h3>Erkennung von Bedrohungen in Echtzeit<\/h3>\n<div>\n<p>Kontinuierliche \u00dcberwachung Ihrer IT-Infrastruktur, um Bedrohungen zu erkennen und zu beseitigen, bevor sie eskalieren.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Kosteneffiziente <br \/>Compliance<\/h3>\n<div>\n<p>Optimieren Sie Revisionen und erf\u00fcllen Sie Konformit\u00e4tsstandards wie ISO27001 oder PCI-DSS und senken Sie die Betriebskosten.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Transparente &#038; faire Preisgestaltung<\/h3>\n<div>\n<p><span>Geniessen Sie ein klarer, flat-fee Service ohne versteckte Kosten. Pr\u00fcfen Sie transparent unsere Leistung und stellen Sie sicher, dass wir Ihre Erwartungen erf\u00fcllen oder \u00fcbertreffen.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<div>\n<p>\u00abDas Vulnerability Management von CLUE war f\u00fcr uns ein entscheidender Faktor, da es uns einen beispiellosen Einblick in unsere Sicherheitslage bietet und uns hilft, Bedrohungen immer zwei Schritte voraus zu sein.\u00bb<\/p>\n<p><strong>A.S. &#8211; IT Director<\/strong><\/p>\n<\/div>\n<\/div>\n<h2>Features<\/h2>\n<ul>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/06\/scanning_vulnm_feature.svg\" alt=\"\"><\/p>\n<h4>Umfangreiches Scanning<\/h4>\n<div>\n<p>Nutzt Cloud-, On-Premise- und passive Scanner, um einen umfassenden \u00dcberblick \u00fcber Ihre Schwachstellen zu erhalten und sicherzustellen, dass nichts unentdeckt bleibt.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/06\/agents_vulnm_feature.svg\" alt=\"\"><\/p>\n<h4>Erweiterte Agenten<\/h4>\n<div>\n<p>Bieten Sie externen und mobilen Ger\u00e4ten unabh\u00e4ngig von ihrem Standort zuverl\u00e4ssige Sicherheit, damit Ihre gesamte IT-Landschaft sicher und konform ist.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/06\/cloud_vulnm_feature.svg\" alt=\"\"><\/p>\n<h4>Sicherheit von Cloud-Diensten<\/h4>\n<div>\n<p>Massgeschneiderte Schwachstellenbewertungen f\u00fcr Cloud-Umgebungen wie AWS und Azure, um sicherzustellen, dass Ihre Cloud-Ressourcen rigoros gesch\u00fctzt sind.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/06\/report_vulnm_feature.svg\" alt=\"\"><\/p>\n<h4>Aufschlussreiches Reporting<\/h4>\n<div>\n<p><span>Bietet ein modulares Reporting f\u00fcr verschiedene Abteilungen, das relevante, umsetzbare Erkenntnisse f\u00fcr strategische und operative Entscheidungen liefert.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<h4>Weitere Informationen zu diesem Service finden Sie in unserem Factsheet.<\/h4>\n<p><a href=\"\/wp-content\/uploads\/2024\/09\/Fact-Sheet-Vulnerability-Management_11_2022_DE_web.pdf\">Download<\/a><\/p>\n<\/div>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/Portal-Illustration.png\" alt=\"\"><\/p>\n<h3>Erhalten Sie Echtzeit-Einblicke mit unserem Portal<\/h3>\n<p><a href=\"\/portal-intro\/\">Zum Portal<\/a><\/p>\n<\/div>\n<div>\n<h5>Erfahren Sie, wie wir die Cyber-Sicherheit einer Non-Profit-Organisation optimierten.<\/h5>\n<\/div>\n<div>\n<h5>Erfahren Sie, wie wir die Cyber-Sicherheit einer Non-Profit-Organisation optimierten<\/h5>\n<\/div>\n<p>\n    <a href=\"\/blog\/customer_reviews\/ngo-security-consultig\/\">Zur Story<\/a>\n<\/p>\n<p>\n    <a href=\"\/blog\/customer_reviews\/ngo-security-consultig\/\">Zur Story<\/a>\n<\/p>\n<p><!--more--><br \/>\n<!-- {\"type\":\"layout\",\"children\":[{\"name\":\"Banner\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"header_transparent\":false,\"height\":\"pixels\",\"height_offset_top\":true,\"height_viewport\":800,\"image_loading\":true,\"image_position\":\"center-center\",\"image_size\":\"cover\",\"image_width\":\"2560\",\"overlap\":false,\"preserve_color\":true,\"style\":\"default\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"slide-bottom-small\",\"content\":\"Vulnerability Management\",\"content_en_gb\":\"Vulnerability Management\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"title_element\":\"h1\"}},{\"type\":\"text\",\"props\":{\"animation\":\"slide-top-small\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Meistern Sie Ihr Sicherheitsrisiko mit Echtzeit-Einblicken.<\\\/p>\",\"content_en_gb\":\"\n\n<p>Master your security exposure with real-time insights.<\\\/p>\",\"dropcap\":false,\"margin\":\"default\",\"text_align\":\"left\",\"text_style\":\"large\"}},{\"type\":\"button\",\"props\":{\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"default\",\"content\":\"Entdecken Sie Clue\",\"content_en_gb\":\"Explore CLUE Today\",\"icon\":\"\",\"icon_align\":\"left\",\"link\":\"contact\\\/\",\"link_en_gb\":\"en\\\/contact\\\/\"}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"image\",\"props\":{\"id\":\"apprt_service_icon\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/07\\\/vulnerability_management_web.png\",\"image_focal_point\":\"top-left\",\"image_svg_color\":\"emphasis\",\"margin\":\"default\",\"margin_remove_top\":false}}]}],\"props\":{\"layout\":\"2-3,1-3\"}}]},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"100\",\"image_position\":\"center-center\",\"padding_remove_bottom\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"fade\",\"block_align\":\"center\",\"content\":\"Benefits\",\"content_en_gb\":\"Benefits\",\"margin\":\"large\",\"maxwidth\":\"2xlarge\",\"text_align\":\"center\",\"title_color\":\"secondary\",\"title_element\":\"h2\"}},{\"type\":\"grid\",\"props\":{\"content_align\":false,\"content_column_breakpoint\":\"m\",\"content_dropcap\":false,\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":false,\"grid_default\":\"1\",\"grid_medium\":\"3\",\"grid_parallax\":\"0\",\"grid_row_align\":false,\"icon_width\":80,\"id\":\"benefits_service_card\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"link_style\":\"text\",\"link_text\":\"Read more\",\"margin\":\"\",\"margin_remove_top\":false,\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":false,\"panel_padding\":\"small\",\"panel_style\":\"card-default\",\"position_left\":\"10\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_margin\":\"small\",\"title_style\":\"h4\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Kontinuierliche \\u00dcberwachung Ihrer IT-Infrastruktur, um Bedrohungen zu erkennen und zu beseitigen, bevor sie eskalieren.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Constantly monitors your IT infrastructure to identify and resolve threats before they escalate.<\\\/span><\\\/p>\",\"icon\":\"\",\"link_text\":\"Learn More\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Erkennung von Bedrohungen in Echtzeit\",\"title_en_gb\":\"Real-Time Threat Detection\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Optimieren Sie Revisionen und erf\\u00fcllen Sie Konformit\\u00e4tsstandards wie ISO27001 oder PCI-DSS und senken Sie die Betriebskosten.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Streamline audits and meet compliance standards like ISO27001 or PCI-DSS, reducing operational costs.<\\\/span><\\\/p>\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Kosteneffiziente <br \/>Compliance\",\"title_en_gb\":\"Cost-Effective Compliance\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p><span>Geniessen Sie ein klarer, flat-fee Service ohne versteckte Kosten. Pr\\u00fcfen Sie transparent unsere Leistung und stellen Sie sicher, dass wir Ihre Erwartungen erf\\u00fcllen oder \\u00fcbertreffen.<\\\/span><\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Enjoy a clear, flat-fee subscription without hidden costs. Monitor our performance openly, ensuring we meet or exceed your expectations.<\\\/span><\\\/p>\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Transparente & faire Preisgestaltung\",\"title_en_gb\":\"Transparent & Fair Pricing\"}}]}]}],\"props\":{\"margin\":\"large\",\"row_gap\":\"large\",\"width\":\"default\"}}],\"name\":\"Benefits\"},{\"type\":\"section\",\"props\":{\"class\":\"quote_card\",\"image_position\":\"center-center\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content\":\"\n\n<p>\\u00abDas Vulnerability Management von CLUE war f\\u00fcr uns ein entscheidender Faktor, da es uns einen beispiellosen Einblick in unsere Sicherheitslage bietet und uns hilft, Bedrohungen immer zwei Schritte voraus zu sein.\\u00bb<\\\/p>\\n\n\n<p><strong>A.S. - IT Director<\\\/strong><\\\/p>\",\"content_column_breakpoint\":\"m\",\"content_en_gb\":\"\n\n<p>\\\"CLUE's Vulnerability Management was a game-changer for us, offering unparalleled visibility into our security posture and helping us stay two steps ahead of threats.\\\"<\\\/p>\\n\n\n<p><strong>A.S. \\u2013 IT Director<\\\/strong><\\\/p>\",\"content_margin\":\"small\",\"css\":\"div.uk-card-body {\\n\\tpadding-top: 20px;\\n}\",\"height_expand\":false,\"icon_width\":80,\"image\":\"\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"xlarge\",\"meta\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":true,\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"position_bottom\":\"-130\",\"title\":\"\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"}}]}],\"props\":{\"alignment\":\"center\",\"margin\":\"medium\"}}],\"name\":\"section_quote_service\"},{\"type\":\"section\",\"props\":{\"id\":\"radial_bg_row_features_apprt\",\"image_position\":\"center-center\",\"padding_remove_bottom\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Features\",\"content_en_gb\":\"Features\",\"text_align\":\"center\",\"title_element\":\"h2\"}},{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_width\":\"42\",\"item_animation\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"xlarge\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h4\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Nutzt Cloud-, On-Premise- und passive Scanner, um einen umfassenden \\u00dcberblick \\u00fcber Ihre Schwachstellen zu erhalten und sicherzustellen, dass nichts unentdeckt bleibt.<\\\/p>\",\"content_en_gb\":\"\n\n<p>Utilizes cloud, on-premise, and passive scanners to provide a full spectrum view of your vulnerabilities, ensuring no stone is left unturned.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/06\\\/scanning_vulnm_feature.svg\",\"title\":\"Umfangreiches Scanning\",\"title_en_gb\":\"Comprehensive Scanning\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Bieten Sie externen und mobilen Ger\\u00e4ten unabh\\u00e4ngig von ihrem Standort zuverl\\u00e4ssige Sicherheit, damit Ihre gesamte IT-Landschaft sicher und konform ist.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Empower off-site and mobile devices with robust security, regardless of their location, making your entire IT landscape secure and compliant.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/06\\\/agents_vulnm_feature.svg\",\"title\":\"Erweiterte Agenten\",\"title_en_gb\":\"Advanced Agents\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Massgeschneiderte Schwachstellenbewertungen f\\u00fcr Cloud-Umgebungen wie AWS und Azure, um sicherzustellen, dass Ihre Cloud-Ressourcen rigoros gesch\\u00fctzt sind.<\\\/p>\",\"content_en_gb\":\"\n\n<div class=\\\"uk-grid-margin uk-first-column\\\">\\n\n\n<div class=\\\"el-item uk-panel uk-margin-remove-first-child\\\">\\n\n\n<div class=\\\"el-content uk-panel uk-margin-top\\\">\\n\n\n<p><span>Tailors vulnerability assessments for cloud environments like AWS and Azure, ensuring your cloud assets are rigorously protected.<\\\/span><\\\/p>\\n<\\\/div>\\n<\\\/div>\\n<\\\/div>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/06\\\/cloud_vulnm_feature.svg\",\"title\":\"Sicherheit von Cloud-Diensten\",\"title_en_gb\":\"Cloud Service Security\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p><span>Bietet ein modulares Reporting f\\u00fcr verschiedene Abteilungen, das relevante, umsetzbare Erkenntnisse f\\u00fcr strategische und operative Entscheidungen liefert.<\\\/span><\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Offers modular reporting for different departments, ensuring relevant, actionable insights for both strategic and operational decision-making.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/06\\\/report_vulnm_feature.svg\",\"title\":\"Aufschlussreiches Reporting\",\"title_en_gb\":\"Insightful Reporting\"}}]}]}],\"props\":{\"id\":\"features_apprt_row\",\"margin\":\"default\",\"margin_remove_top\":false}}],\"name\":\"Features\"},{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content\":\"\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/Fact-Sheet-Vulnerability-Management_11_2022_DE_web.pdf\",\"link_en_gb\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/Fact-Sheet-Vulnerability-Management_11_2022_EN_web.pdf\",\"link_style\":\"default\",\"link_text\":\"Download\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"text_align\":\"center\",\"title\":\"Weitere Informationen zu diesem Service finden Sie in unserem Factsheet.\",\"title_align\":\"top\",\"title_element\":\"h4\",\"title_en_gb\":\"Explore more about this service by reading our fact sheet.\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h4\"},\"name\":\"Factsheet CTA_2\"},{\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/Portal-Illustration.png\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link\":\"portal-intro\\\/\",\"link_en_gb\":\"\\\/en\\\/portal-intro\\\/\",\"link_style\":\"secondary\",\"link_text\":\"Zum Portal\",\"link_text_en_gb\":\"To the Portal\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"2xlarge\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"position\":\"relative\",\"position_top\":\"310\",\"text_align\":\"center\",\"title\":\"Erhalten Sie Echtzeit-Einblicke mit unserem Portal\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_en_gb\":\"Get Real-Time Insights with our Portal\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h4\"}}]}]}]},{\"type\":\"section\",\"props\":{\"height\":\"pixels\",\"height_offset_top\":false,\"height_viewport\":650,\"id\":\"real_time_portal_feature_apprt\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/10\\\/GR_SA_bw-scaled.jpg\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"media_focal_point\":\"top-center\",\"padding\":\"large\",\"style\":\"primary\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<h5>Erfahren Sie, wie wir die Cyber-Sicherheit einer Non-Profit-Organisation optimierten.<\\\/h5>\",\"content_en_gb\":\"\n\n<h5>Find out how we optimized the cyber security of a non-profit organization.<\\\/h5>\",\"margin\":\"default\",\"maxwidth\":\"xlarge\",\"position\":\"relative\",\"position_top\":\"260\",\"text_align\":\"center\",\"text_style\":\"large\",\"visibility\":\"m\"}},{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<h5>Erfahren Sie, wie wir die Cyber-Sicherheit einer Non-Profit-Organisation optimierten<\\\/h5>\",\"content_en_gb\":\"\n\n<h5>Find out how we optimized the cyber security of a non-profit organization.<\\\/h5>\",\"margin\":\"default\",\"maxwidth\":\"xlarge\",\"position\":\"relative\",\"position_top\":\"210\",\"text_align\":\"center\",\"text_color\":\"secondary\",\"text_style\":\"meta\",\"visibility\":\"hidden-m\"}},{\"type\":\"button\",\"props\":{\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"position\":\"relative\",\"position_top\":\"260\",\"text_align\":\"center\",\"visibility\":\"m\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"text\",\"content\":\"Zur Story\",\"icon_align\":\"left\",\"link\":\"blog\\\/customer_reviews\\\/ngo-security-consultig\\\/\",\"link_en_gb\":\"en\\\/blog\\\/customer_reviews\\\/ngo-security-consultig\\\/\"}}],\"name\":\"Button Desktop\"},{\"type\":\"button\",\"props\":{\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"position\":\"relative\",\"position_top\":\"300\",\"text_align\":\"center\",\"visibility\":\"hidden-m\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"text\",\"content\":\"Zur Story\",\"icon_align\":\"left\",\"link\":\"blog\\\/customer_reviews\\\/ngo-security-consultig\\\/\",\"link_en_gb\":\"en\\\/blog\\\/customer_reviews\\\/ngo-security-consultig\\\/\"}}],\"name\":\"Button Mobile\"}]}]}],\"name\":\"Portal Feature_D\"},{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"padding\":\"large\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"module\",\"props\":{\"menu_image_align\":\"center\",\"menu_image_margin\":true,\"menu_style\":\"default\",\"menu_type\":\"nav\",\"type\":\"builderwidget\",\"widget\":\"builderwidget-11\"}}]}]}],\"name\":\"Contact Form\"}],\"version\":\"4.4.5\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Management Meistern Sie Ihr Sicherheitsrisiko mit Echtzeit-Einblicken. Entdecken Sie Clue Benefits Erkennung von Bedrohungen in Echtzeit Kontinuierliche \u00dcberwachung Ihrer IT-Infrastruktur, um Bedrohungen zu erkennen und zu beseitigen, bevor sie eskalieren. Kosteneffiziente Compliance Optimieren Sie Revisionen und erf\u00fcllen Sie Konformit\u00e4tsstandards wie ISO27001 oder PCI-DSS und senken Sie die Betriebskosten. Transparente &#038; faire Preisgestaltung Geniessen Sie [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":9,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-930","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vulnerability Management &#8211; CLUE<\/title>\n<meta name=\"description\" content=\"Stay ahead of threats by identifying and fixing security gaps before they can be exploited.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clue.ch\/\/clue.ch\/\/clue.ch\/en\/services\/vulnerability-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Management &#8211; CLUE\" \/>\n<meta property=\"og:description\" content=\"Stay ahead of threats by identifying and fixing security gaps before they can be exploited.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/clue.ch\/services\/vulnerability-management\/\" \/>\n<meta property=\"og:site_name\" content=\"CLUE\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.instagram.com\/clue.security\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-17T13:59:10+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clue.de\/en\/services\/vulnerability-management\/\",\"url\":\"https:\/\/clue.ch\/services\/vulnerability-management\/\",\"name\":\"Vulnerability Management &#8211; CLUE\",\"isPartOf\":{\"@id\":\"https:\/\/clue.ch\/#website\"},\"datePublished\":\"2024-06-26T07:57:23+00:00\",\"dateModified\":\"2025-12-17T13:59:10+00:00\",\"description\":\"Schwachstellen erkennen und schliessen, bevor sie zur Gefahr werden \u2013 f\u00fcr eine proaktive IT-Sicherheit.\",\"breadcrumb\":{\"@id\":\"https:\/\/clue.ch\/services\/vulnerability-management\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clue.ch\/services\/vulnerability-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clue.ch\/services\/vulnerability-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clue.ch\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/clue.ch\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Vulnerability Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clue.ch\/#website\",\"url\":\"https:\/\/clue.ch\/\",\"name\":\"CLUE\",\"description\":\"Cyber Secure\",\"publisher\":{\"@id\":\"https:\/\/clue.ch\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clue.ch\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/clue.ch\/#organization\",\"name\":\"CLUE Security Services\",\"url\":\"https:\/\/clue.ch\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/clue.ch\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg\",\"contentUrl\":\"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg\",\"width\":1,\"height\":1,\"caption\":\"CLUE Security Services\"},\"image\":{\"@id\":\"https:\/\/clue.ch\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/clue.security\/\",\"https:\/\/www.linkedin.com\/company\/clue-security-services\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Management &#8211; CLUE","description":"Stay ahead of threats by identifying and fixing security gaps before they can be exploited.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\\\/\\\/clue.ch\/\/clue.ch\/\/clue.ch\/en\/services\/vulnerability-management\/","og_locale":"en_GB","og_type":"article","og_title":"Vulnerability Management &#8211; CLUE","og_description":"Stay ahead of threats by identifying and fixing security gaps before they can be exploited.","og_url":"https:\/\/clue.ch\/services\/vulnerability-management\/","og_site_name":"CLUE","article_publisher":"https:\/\/www.instagram.com\/clue.security\/","article_modified_time":"2025-12-17T13:59:10+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clue.de\/en\/services\/vulnerability-management\/","url":"https:\/\/clue.ch\/services\/vulnerability-management\/","name":"Vulnerability Management &#8211; CLUE","isPartOf":{"@id":"https:\/\/clue.ch\/#website"},"datePublished":"2024-06-26T07:57:23+00:00","dateModified":"2025-12-17T13:59:10+00:00","description":"Schwachstellen erkennen und schliessen, bevor sie zur Gefahr werden \u2013 f\u00fcr eine proaktive IT-Sicherheit.","breadcrumb":{"@id":"https:\/\/clue.ch\/services\/vulnerability-management\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clue.ch\/services\/vulnerability-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clue.ch\/services\/vulnerability-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clue.ch\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/clue.ch\/services\/"},{"@type":"ListItem","position":3,"name":"Vulnerability Management"}]},{"@type":"WebSite","@id":"https:\/\/clue.ch\/#website","url":"https:\/\/clue.ch\/","name":"CLUE","description":"Cyber Secure","publisher":{"@id":"https:\/\/clue.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clue.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/clue.ch\/#organization","name":"CLUE Security Services","url":"https:\/\/clue.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/clue.ch\/#\/schema\/logo\/image\/","url":"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg","contentUrl":"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg","width":1,"height":1,"caption":"CLUE Security Services"},"image":{"@id":"https:\/\/clue.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/clue.security\/","https:\/\/www.linkedin.com\/company\/clue-security-services\/"]}]}},"_links":{"self":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/comments?post=930"}],"version-history":[{"count":1,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/930\/revisions"}],"predecessor-version":[{"id":14942,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/930\/revisions\/14942"}],"up":[{"embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/9"}],"wp:attachment":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/media?parent=930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}