{"id":97,"date":"2024-02-21T13:32:41","date_gmt":"2024-02-21T13:32:41","guid":{"rendered":"http:\/\/localhost:8888\/marketing-website\/?page_id=97"},"modified":"2025-12-17T14:42:20","modified_gmt":"2025-12-17T13:42:20","slug":"consulting","status":"publish","type":"page","link":"https:\/\/clue.de\/en\/consulting\/","title":{"rendered":"Consulting"},"content":{"rendered":"<h1>Application Security Consulting<\/h1>\n<div>Expertenberatung, die Ihre Anwendungen von Grund auf st\u00e4rkt.<\/div>\n<p>\n    <a href=\"\/contact\/\">Entdecken Sie Clue<\/a>\n<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/application_security_consulting-web.png\" alt=\"\"><\/p>\n<h2>Benefits<\/h2>\n<ul>\n<li>\n<h3>Holistische Sicherheitsstrategie <\/h3>\n<div>Unser Ansatz geht \u00fcber Penetrationstests hinaus und identifiziert und behebt die Ursachen von Schwachstellen.<\/div>\n<\/li>\n<li>\n<h3>Kosteneffiziente Entwicklung<\/h3>\n<div>Steigern Sie die Effizienz und senken Sie die Kosten, indem Sie bew\u00e4hrte Sicherheitsverfahren in Ihren Entwicklungszyklus integrieren.<\/div>\n<\/li>\n<li>\n<h3>Nachhaltige Sicherheitsverbesserungen<\/h3>\n<div>Erzielen Sie durch individuell zugeschnittene Workshops und Beratung langfristige Verbesserungen der Sicherheitslage Ihrer Software.<\/div>\n<\/li>\n<\/ul>\n<div>\n<div>\n<p>\u00ab<span>Clue\u2019s Application Security Consulting hat uns tiefe Einblicke in unsere Entwicklungsprozesse gegeben und so unsere Sicherheit und Effizienz deutlich verbessert.<\/span>\u00bb<\/p>\n<div><strong>A.R. \u2013 Development Manager<\/strong><\/div>\n<\/div>\n<\/div>\n<h2>Features<\/h2>\n<ul>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/checklist_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h4>Allgemeine \u00dcberpr\u00fcfung der Sicherheitslage<\/h4>\n<div>\n<p>Bewertet die derzeitige Sicherheitslage Ihrer Applikation und legt damit die Grundlage f\u00fcr gezielte Verbesserungen.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/view_module_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.png\" alt=\"\"><\/p>\n<h4>Massgeschneiderte Sicherheitsmodule<\/h4>\n<div>\n<p>W\u00e4hlen Sie zwischen der Analyse der Anwendungssicherheit, der komponentenbasierten Sicherheitsanalyse oder der tiefgreifenden Analyse der Anwendungssicherheit, je nach Ihren spezifischen Anforderungen.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/groups_3_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h4>Kollaborative <br \/>Workshops<\/h4>\n<div>\n<p>Arbeiten Sie gemeinsam mit unseren Experten in regelm\u00e4ssigen Workshops an der Umsetzung nachhaltiger Sicherheitsmassnahmen in Ihren Entwicklungsprozessen.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/deployed_code_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h4>Sicherer Software-Entwicklungszyklus<\/h4>\n<div>\n<p>Einf\u00fchrung und Verfeinerung von SSDLC-Verfahren f\u00fcr messbare Sicherheitsverbesserungen und eine sicherere Produktentwicklung.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/psychology_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h4>Umfassendes Schwachstellen-Management<\/h4>\n<div>\n<p>Identifizieren Sie nicht nur Schwachstellen, sondern verstehen Sie auch deren Ursachen und wie Sie sie in Zukunft verhindern k\u00f6nnen, um die Widerstandsf\u00e4higkeit Ihrer Anwendung zu erh\u00f6hen.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<h3>Weitere Informationen zu diesem Service finden Sie in unserem Factsheet.<\/h3>\n<p><a href=\"\/wp-content\/uploads\/2024\/10\/Fact-Sheet-Application-Security-Consulting_2024-10_DE.pdf\">Downloaden<\/a><\/p>\n<\/div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/08\/swipe_down.svg\" alt=\"\"><\/p>\n<h1>Security <br \/>Implementation<\/h1>\n<div>\n<p>Fachwissen und Innovation bei der Umsetzung und Verwaltung der Sicherheit.<\/p>\n<\/div>\n<p>\n    <a href=\"\/contact\/\">Entdecken Sie Clue<\/a>\n<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/security_consulting_web.png\" alt=\"\"><\/p>\n<h2>Benefits<\/h2>\n<ul>\n<li>\n<h3>Erfahrene Fachleute<\/h3>\n<div>\n<p>Unser Team verf\u00fcgt \u00fcber jahrelange Erfahrung mit Sicherheitstechnologien, um schnelle und nachhaltige L\u00f6sungen zu gew\u00e4hrleisten.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Individuelle Unterst\u00fctzung<\/h3>\n<div>\n<p>Massgeschneiderte Dienstleistungen vom Konzept bis zum Betrieb, einschliesslich Schulung und detaillierter Dokumentation f\u00fcr die laufende Systempflege.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Umfassende L\u00f6sungen<\/h3>\n<div>\n<p>Von der Netzwerksicherheit bis zum Identit\u00e4tsmanagement bieten wir eine breite Palette von Dienstleistungen zum Schutz aller Aspekte Ihrer IT-Umgebung.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<div>\n<p>\u00abDas Clue-Implementierungsteam integrierte nahtlos fortschrittliche Sicherheitsmassnahmen, die die Widerstandsf\u00e4higkeit unserer IT-Infrastruktur erheblich verbesserten.\u00bb<\/p>\n<p><strong>J.K. \u2013 IT Direktor<\/strong><\/p>\n<\/div>\n<\/div>\n<h2>Features<\/h2>\n<ul>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/08\/blog_about_icon.svg\" alt=\"\"><\/p>\n<h4>Netzwerksicherheit<\/h4>\n<div>\n<p>Wir entwickeln, implementieren und integrieren Firewalls der n\u00e4chsten Generation, Intrusion-Prevention-Systeme und vieles mehr, um Ihr Netzwerk auf jeder Ebene zu sch\u00fctzen.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/mfaut_feature_2.svg\" alt=\"\"><\/p>\n<h4>Sicherheit f\u00fcr Content und Endpunkte<\/h4>\n<div>\n<p>Von Web- und E-Mail-Sicherheit bis hin zu Sandboxing und Endpunktschutz &#8211; wir sorgen daf\u00fcr, dass Ihre Daten sicher bleiben.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/sitep_feature_2.svg\" alt=\"\"><\/p>\n<h4>Applikations-Sicherheit<\/h4>\n<div>\n<p>Implementieren Sie Web Application Firewalls und Schwachstellenmanagement, um Ihre Anwendungen vor komplexen Bedrohungen zu sch\u00fctzen.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/06\/report_vulnm_feature.svg\" alt=\"\"><\/p>\n<h4>Identit\u00e4ts- und Personenmanagement<\/h4>\n<div>\n<p>St\u00e4rken Sie Ihre Sicherheitslage mit einem umfassenden Identit\u00e4ts- und Zugriffsmanagement, einschliesslich Multi-Faktor-Authentifizierung.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/08\/swipe_down.svg\" alt=\"\"><\/p>\n<h1>Security Assessment<\/h1>\n<div>\n<p>Proaktive Sicherheitsanalysen zur Ermittlung und Minderung von Risiken in Ihrer IT-Landschaft.<\/p>\n<\/div>\n<p>\n    <a href=\"\/contact\/\">Entdecken Sie Clue<\/a>\n<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/security_assesment_web.png\" alt=\"\"><\/p>\n<h2>Benefits<\/h2>\n<ul>\n<li>\n<h3>Massgeschneiderte Sicherheitseinblicke<\/h3>\n<div>\n<p>Kundenspezifische Analysen liefern ein klares Verst\u00e4ndnis der Schwachstellen und Risiken Ihrer individuellen IT-Umgebung.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Umfassendes Risikomanagement<\/h3>\n<div>\n<p>Von der Erkennung kleinerer Bedrohungen bis hin zu eingehenden Penetrationstests decken wir alle Aspekte von Sicherheitsl\u00fccken ab.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Strategische Verbesserungen der Sicherheit<\/h3>\n<div>\n<p>Unsere Analysen f\u00fchren zu nachhaltigen Verbesserungen Ihrer Sicherheitslage und verringern k\u00fcnftige Schwachstellen.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<div>\n<p>\u00abDas Security Assessment von Clue hat uns wichtige Einblicke in unsere IT-Infrastruktur gegeben, die es uns erm\u00f6glicht haben, unsere Abwehrmassnahmen proaktiv zu verbessern.\u00bb<\/p>\n<p><strong>S.C.\u00a0\u2013 CISO<\/strong><\/p>\n<\/div>\n<\/div>\n<h2>Features<\/h2>\n<ul>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/tune_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h3>Individuelle Auswertungen<\/h3>\n<div>\n<p>Sicherheitsbewertungen, die auf die spezifischen betrieblichen Rahmenbedingungen und Bed\u00fcrfnisse Ihres Unternehmens zugeschnitten sind.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/aedpr_feature_2.svg\" alt=\"\"><\/p>\n<h3>Vielf\u00e4ltige Testdienstleistungen<\/h3>\n<div>\n<p>Wir bieten Schwachstellenbewertungen, Ransomware-Bewertungen und Penetrationstests an, um verschiedene Sicherheitsprobleme anzugehen.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/support_agent_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h3>Laufende Supportleistungen<\/h3>\n<div>\n<p>Kontinuierliche Unterst\u00fctzung \u00fcber die erste Bewertung hinaus, um langfristige Sicherheitsverbesserungen und Compliance zu gew\u00e4hrleisten.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/workspace_premium_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h3>Fachkundige Umsetzung<\/h3>\n<div>\n<p>Durchf\u00fchrung nach anerkannten Standards wie OSSTMM und OWASP, um zuverl\u00e4ssige und aussagekr\u00e4ftige Erkenntnisse zu gew\u00e4hrleisten.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/06\/report_vulnm_feature.svg\" alt=\"\"><\/p>\n<h3>Umsetzbare Reports<\/h3>\n<div>\n<p>Detaillierte Berichte liefern eine nach Priorit\u00e4ten geordnete Liste von Schwachstellen mit Empfehlungen zur Optimierung Ihrer IT-Infrastruktur.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/08\/swipe_down.svg\" alt=\"\"><\/p>\n<h1>Security Awareness Training<\/h1>\n<div>\n<p>Bereiten Sie Ihr Team darauf vor, Cyber-Bedrohungen zu erkennen und wirksam zu bek\u00e4mpfen.<\/p>\n<\/div>\n<p>\n    <a href=\"\/contact\/\">Entdecken Sie Clue<\/a>\n<\/p>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/awareness_training_web.png\" alt=\"\"><\/p>\n<h2>Benefits<\/h2>\n<ul>\n<li>\n<h3>Umfassende <br \/>Schulungsmodule<\/h3>\n<div>\n<p>Zugeschnittene Schulungen zu den spezifischen Cyberrisiken f\u00fcr alle Unternehmensebenen, vom breiten Personal bis zu den F\u00fchrungskr\u00e4ften.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Kontinuierliches <br \/>Lernen<\/h3>\n<div>Laufende Schulungen und Neubewertungen sorgen f\u00fcr dauerhafte Wachsamkeit gegen\u00fcber Phishing, Malware und anderen Cyber-Bedrohungen.<\/div>\n<\/li>\n<li>\n<h3>Messbarer <br \/>Erfolg<\/h3>\n<div>\n<p>Verfolgen Sie die Effektivit\u00e4t von Schulungskampagnen anhand detaillierter Metriken, von der E-Mail-Beteiligung bis hin zu Verhaltens\u00e4nderungen.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<div>\n<p>\u00abDas Awareness-Training von Clue hat die F\u00e4higkeit unseres Teams, Cyber-Bedrohungen zu erkennen und darauf zu reagieren, deutlich verbessert und damit unser Risikoprofil erheblich reduziert.\u00bb<\/p>\n<div><strong>E.T.\u00a0\u2013 HR Direktor<\/strong><\/div>\n<\/div>\n<\/div>\n<h2>Features<\/h2>\n<ul>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/school_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h3>Funktionsspezifische <br \/>Schulung<\/h3>\n<div>\n<p>Massgeschneiderte Schulungen, die auf die besonderen Anforderungen und Verantwortlichkeiten der verschiedenen Rollen innerhalb Ihres Unternehmens eingehen.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/business_center_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h3>Fokus auf Manager <br \/>und F\u00fchrungskr\u00e4fte<\/h3>\n<div>\n<p>Spezielle Schulungen f\u00fcr Personen mit hohem Risiko, um gezielte Angriffe wie CEO- Fraud zu verhindern und eine Sicherheitskultur von der obersten Ebene an zu f\u00f6rdern.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/08\/call_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h3>Unterst\u00fctzung nach <br \/>der Schulung<\/h3>\n<div>\n<p>Kontinuierliche Auffrischungen und Updates, damit das Sicherheitsbewusstsein Ihrer Mitarbeiter stets im Mittelpunkt steht.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/phishing_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\" alt=\"\"><\/p>\n<h3>Realistische<br \/> Phishing-Simulationen<\/h3>\n<div>\n<p>Nutzen Sie eine umfangreiche Bibliothek von Phishing-Vorlagen, um reale Angriffe zu simulieren und so Ihre praktischen Abwehrf\u00e4higkeiten zu verbessern.<\/p>\n<\/div>\n<\/li>\n<li>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/aithd_feature_1.svg\" alt=\"\"><\/p>\n<h3>Effiziente <br \/>Messmethoden<\/h3>\n<div>\n<p>Bewerten Sie die Auswirkungen von Schulungsinitiativen mit pr\u00e4zisen Analysen und richten Sie den Fokus auf zuk\u00fcnftige Sicherheitsmassnahmen.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2025\/01\/Portal-Illustration.png\" alt=\"\"><\/p>\n<h4>Erhalten Sie Echtzeit-Einblicke mit unserem Portal<\/h4>\n<p><a href=\"\/portal-intro\/\">Zum Portal<\/a><\/p>\n<\/div>\n<div>\n<h5>Erfahren Sie, wie wir die Cyber-Sicherheit einer Non-Profit-Organisation optimierten<\/h5>\n<\/div>\n<div>\n<h5>Erfahren Sie, wie wir die Antivirenl\u00f6sung eines IT-Dienstleisters nahtlos austauschten.<\/h5>\n<\/div>\n<p>\n    <a href=\"\/about-clue\/customer-success-stories\/umfassendes-cyber-security-assessment-und-massnahmenplan\/\">Zur Story<\/a>\n<\/p>\n<p>\n    <a href=\"\/about-clue\/customer-success-stories\/umfassendes-cyber-security-assessment-und-massnahmenplan\/\">Zur Story<\/a>\n<\/p>\n<p><!--more--><br \/>\n<!-- {\"type\":\"layout\",\"children\":[{\"name\":\"Banner\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"header_transparent\":false,\"height_offset_top\":true,\"height_viewport\":800,\"id\":\"application-security-consulting\",\"image_loading\":true,\"image_position\":\"center-center\",\"image_size\":\"cover\",\"image_width\":\"2560\",\"overlap\":false,\"padding\":\"large\",\"preserve_color\":true,\"style\":\"default\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"slide-bottom-small\",\"content\":\"Application Security Consulting\",\"text_align\":\"left\",\"title_element\":\"h1\"}},{\"type\":\"text\",\"props\":{\"animation\":\"slide-top-small\",\"column_breakpoint\":\"m\",\"content\":\"Expertenberatung, die Ihre Anwendungen von Grund auf st\\u00e4rkt.\",\"content_en_gb\":\"Expert consulting to fortify your applications from the ground up.\",\"dropcap\":false,\"margin\":\"default\",\"text_align\":\"left\",\"text_style\":\"large\"}},{\"type\":\"button\",\"props\":{\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"default\",\"content\":\"Entdecken Sie Clue\",\"content_en_gb\":\"Explore CLUE Today\",\"icon\":\"\",\"icon_align\":\"left\",\"link\":\"contact\\\/\",\"link_en_gb\":\"en\\\/contact\\\/\"}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"image\",\"props\":{\"id\":\"apprt_service_icon\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/07\\\/application_security_consulting-web.png\",\"image_focal_point\":\"top-left\",\"image_svg_color\":\"emphasis\",\"margin\":\"default\",\"margin_remove_top\":false}}]}],\"props\":{\"layout\":\"2-3,1-3\"}}]},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"100\",\"image_position\":\"center-center\",\"padding_remove_bottom\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"fade\",\"block_align\":\"center\",\"content\":\"Benefits\",\"margin\":\"large\",\"maxwidth\":\"2xlarge\",\"text_align\":\"center\",\"title_color\":\"secondary\",\"title_element\":\"h2\"}},{\"type\":\"grid\",\"props\":{\"content_align\":false,\"content_column_breakpoint\":\"m\",\"content_dropcap\":false,\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":false,\"grid_default\":\"1\",\"grid_medium\":\"3\",\"grid_parallax\":\"0\",\"grid_row_align\":false,\"icon_width\":80,\"id\":\"benefits_service_card\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"link_style\":\"text\",\"link_text\":\"Read more\",\"margin\":\"\",\"margin_remove_top\":false,\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":false,\"panel_padding\":\"small\",\"panel_style\":\"card-default\",\"position_left\":\"10\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_margin\":\"small\",\"title_style\":\"h4\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"Unser Ansatz geht \\u00fcber Penetrationstests hinaus und identifiziert und behebt die Ursachen von Schwachstellen.\",\"content_en_gb\":\"\n\n<p><span>Beyond just penetration testing, our approach identifies and addresses the root causes of vulnerabilities.<\\\/span><\\\/p>\",\"icon\":\"\",\"link_text\":\"Learn More\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Holistische Sicherheitsstrategie \",\"title_en_gb\":\"Holistic Security Strategy\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"Steigern Sie die Effizienz und senken Sie die Kosten, indem Sie bew\\u00e4hrte Sicherheitsverfahren in Ihren Entwicklungszyklus integrieren.\",\"content_en_gb\":\"Increase efficiency and reduce costs by integrating security best practices into your development lifecycle.\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Kosteneffiziente Entwicklung\",\"title_en_gb\":\"Cost-Effective Development\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"Erzielen Sie durch individuell zugeschnittene Workshops und Beratung langfristige Verbesserungen der Sicherheitslage Ihrer Software.\",\"content_en_gb\":\"Achieve long-term improvements in your software\\u2019s security posture through tailored workshops and consulting.\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Nachhaltige Sicherheitsverbesserungen\",\"title_en_gb\":\"Sustainable Security Enhancements\"}}]}]}],\"props\":{\"margin\":\"large\",\"row_gap\":\"large\",\"width\":\"default\"}}],\"name\":\"Benefits\"},{\"type\":\"section\",\"props\":{\"class\":\"quote_card\",\"image_position\":\"center-center\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content\":\"\n\n<p>\\u00ab<span>Clue\\u2019s Application Security Consulting hat uns tiefe Einblicke in unsere Entwicklungsprozesse gegeben und so unsere Sicherheit und Effizienz deutlich verbessert.<\\\/span>\\u00bb<\\\/p>\\n\n\n<div><strong>A.R. \\u2013 Development Manager<\\\/strong><\\\/div>\",\"content_column_breakpoint\":\"m\",\"content_en_gb\":\"\n\n<p><span>\\u201cClue\\u2019s Application Security Consulting provided deep insights into our development processes, significantly improving our security and efficiency.\\u201d<\\\/span><\\\/p>\\n\n\n<p><strong>A.R. \\u2013 Development Manager<\\\/strong><\\\/p>\",\"content_margin\":\"small\",\"css\":\"div.uk-card-body {\\n\\tpadding-top: 20px;\\n}\",\"height_expand\":false,\"icon_width\":80,\"image\":\"\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"xlarge\",\"meta\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":true,\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"position_bottom\":\"-130\",\"title\":\"\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"name\":\"Customer Testimonial\"}]}]}],\"name\":\"Customer Testimonial\"},{\"type\":\"section\",\"props\":{\"id\":\"radial_bg_row_features_apprt\",\"image_position\":\"center-center\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Features\",\"text_align\":\"center\",\"title_element\":\"h2\"}},{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":true,\"grid_default\":\"1\",\"grid_medium\":\"3\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_width\":\"42\",\"item_animation\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"xlarge\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h4\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Bewertet die derzeitige Sicherheitslage Ihrer Applikation und legt damit die Grundlage f\\u00fcr gezielte Verbesserungen.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Evaluates your current application security stance, setting a foundation for targeted improvements.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/checklist_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Allgemeine \\u00dcberpr\\u00fcfung der Sicherheitslage\",\"title_en_gb\":\"General Security <br \/>Posture Assessment\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>W\\u00e4hlen Sie zwischen der Analyse der Anwendungssicherheit, der komponentenbasierten Sicherheitsanalyse oder der tiefgreifenden Analyse der Anwendungssicherheit, je nach Ihren spezifischen Anforderungen.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Choose from application security analysis, component based security analysis, or deep application security analysis based on your specific needs.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/view_module_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.png\",\"title\":\"Massgeschneiderte Sicherheitsmodule\",\"title_en_gb\":\"Customized Security <br \/>Modules\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Arbeiten Sie gemeinsam mit unseren Experten in regelm\\u00e4ssigen Workshops an der Umsetzung nachhaltiger Sicherheitsmassnahmen in Ihren Entwicklungsprozessen.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Work side-by-side with our experts in regular workshops to implement sustainable security measures in your development processes.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/groups_3_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Kollaborative <br \/>Workshops\",\"title_en_gb\":\"Collaborative <br \/>Workshops\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Einf\\u00fchrung und Verfeinerung von SSDLC-Verfahren f\\u00fcr messbare Sicherheitsverbesserungen und eine sicherere Produktentwicklung.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Establish and refine SSDLC practices for measurable security improvements and more secure product development.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/deployed_code_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Sicherer Software-Entwicklungszyklus\",\"title_en_gb\":\"Secure Software <br \/>Development Lifecycle (SSDLC)\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Identifizieren Sie nicht nur Schwachstellen, sondern verstehen Sie auch deren Ursachen und wie Sie sie in Zukunft verhindern k\\u00f6nnen, um die Widerstandsf\\u00e4higkeit Ihrer Anwendung zu erh\\u00f6hen.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Not only identify vulnerabilities but understand their origins and how to prevent them in the future, enhancing your application\\u2019s resilience.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/psychology_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Umfassendes Schwachstellen-Management\",\"title_en_gb\":\"Comprehensive Vulnerability Management\"}}]},{\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content\":\"\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link\":\"wp-content\\\/uploads\\\/2024\\\/10\\\/Fact-Sheet-Application-Security-Consulting_2024-10_DE.pdf\",\"link_en_gb\":\"wp-content\\\/uploads\\\/2024\\\/10\\\/Fact-Sheet-Application-Security-Consulting_2022-08_EN.pdf\",\"link_style\":\"default\",\"link_text\":\"Downloaden\",\"link_text_en_gb\":\"Read More\",\"margin\":\"xlarge\",\"maxwidth\":\"2xlarge\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"text_align\":\"center\",\"title\":\"Weitere Informationen zu diesem Service finden Sie in unserem Factsheet.\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_en_gb\":\"Explore more about this service by reading our fact sheet.\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h4\"},\"name\":\"Factsheet CTA\"}]}],\"props\":{\"id\":\"features_apprt_row\",\"margin\":\"default\",\"margin_remove_top\":false}}],\"name\":\"Features\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-top\",\"height\":\"pixels\",\"height_viewport\":300,\"id\":\"security_implementation_consulting_prescroll\",\"image_position\":\"center-center\",\"padding\":\"xlarge\",\"sticky\":\"cover\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2024\\\/08\\\/swipe_down.svg\",\"image_svg_color\":\"emphasis\",\"image_width\":60,\"margin\":\"default\",\"position_top\":\"80px\",\"text_align\":\"center\"}}]}]}],\"name\":\"Scroll Down Section\"},{\"name\":\"Banner\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"header_transparent\":true,\"height_offset_top\":true,\"height_viewport\":500,\"id\":\"security-implementation\",\"image_loading\":true,\"image_position\":\"center-center\",\"image_size\":\"cover\",\"image_width\":\"2560\",\"overlap\":false,\"padding\":\"large\",\"preserve_color\":true,\"style\":\"default\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"slide-bottom-small\",\"content\":\"Security <br \\\/>Implementation\",\"content_en_gb\":\"Security <br \/>Implementation\",\"text_align\":\"left\",\"title_element\":\"h1\"}},{\"type\":\"text\",\"props\":{\"animation\":\"slide-top-small\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Fachwissen und Innovation bei der Umsetzung und Verwaltung der Sicherheit.<\\\/p>\",\"content_en_gb\":\"\n\n<p>Expertise and innovation in security implementation and management.<\\\/p>\",\"dropcap\":false,\"margin\":\"default\",\"maxwidth\":\"xlarge\",\"text_align\":\"left\",\"text_style\":\"large\"}},{\"type\":\"button\",\"props\":{\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"default\",\"content\":\"Entdecken Sie Clue\",\"content_en_gb\":\"Explore CLUE Today\",\"icon\":\"\",\"icon_align\":\"left\",\"link\":\"contact\\\/\",\"link_en_gb\":\"en\\\/contact\\\/\"}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"image\",\"props\":{\"id\":\"apprt_service_icon\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/07\\\/security_consulting_web.png\",\"image_focal_point\":\"top-left\",\"image_svg_color\":\"emphasis\",\"margin\":\"default\",\"margin_remove_top\":false,\"position\":\"relative\",\"position_top\":\"-20\"}}]}],\"props\":{\"layout\":\"2-3,1-3\"}}]},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"100\",\"image_position\":\"center-center\",\"padding_remove_bottom\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"fade\",\"block_align\":\"center\",\"content\":\"Benefits\",\"margin\":\"large\",\"maxwidth\":\"2xlarge\",\"text_align\":\"center\",\"title_color\":\"secondary\",\"title_element\":\"h2\"}},{\"type\":\"grid\",\"props\":{\"content_align\":false,\"content_column_breakpoint\":\"m\",\"content_dropcap\":false,\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":false,\"grid_default\":\"1\",\"grid_medium\":\"3\",\"grid_parallax\":\"0\",\"grid_row_align\":false,\"icon_width\":80,\"id\":\"benefits_service_card\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"link_style\":\"text\",\"link_text\":\"Read more\",\"margin\":\"\",\"margin_remove_top\":false,\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":false,\"panel_padding\":\"small\",\"panel_style\":\"card-default\",\"position_left\":\"10\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_margin\":\"small\",\"title_style\":\"h4\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Unser Team verf\\u00fcgt \\u00fcber jahrelange Erfahrung mit Sicherheitstechnologien, um schnelle und nachhaltige L\\u00f6sungen zu gew\\u00e4hrleisten.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Our team brings years of experience in security technologies to ensure quick and sustainable solutions.<\\\/span><\\\/p>\",\"icon\":\"\",\"link_text\":\"Learn More\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Erfahrene Fachleute\",\"title_en_gb\":\"Experienced Professionals\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Massgeschneiderte Dienstleistungen vom Konzept bis zum Betrieb, einschliesslich Schulung und detaillierter Dokumentation f\\u00fcr die laufende Systempflege.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Tailor-made services from concept to operation, including training and detailed documentation for ongoing system maintenance.<\\\/span><\\\/p>\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Individuelle Unterst\\u00fctzung\",\"title_en_gb\":\"Customized Support\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Von der Netzwerksicherheit bis zum Identit\\u00e4tsmanagement bieten wir eine breite Palette von Dienstleistungen zum Schutz aller Aspekte Ihrer IT-Umgebung.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>From network security to identity management, we offer a wide range of services to protect every aspect of your IT environment.<\\\/span><\\\/p>\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Umfassende L\\u00f6sungen\",\"title_en_gb\":\"Comprehensive Solutions\"}}]}]}],\"props\":{\"margin\":\"large\",\"row_gap\":\"large\",\"width\":\"default\"}}],\"name\":\"Benefits\"},{\"type\":\"section\",\"props\":{\"class\":\"quote_card\",\"image_position\":\"center-center\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content\":\"\n\n<p>\\u00abDas Clue-Implementierungsteam integrierte nahtlos fortschrittliche Sicherheitsmassnahmen, die die Widerstandsf\\u00e4higkeit unserer IT-Infrastruktur erheblich verbesserten.\\u00bb<\\\/p>\\n\n\n<p><strong>J.K. \\u2013 IT Direktor<\\\/strong><\\\/p>\",\"content_column_breakpoint\":\"m\",\"content_en_gb\":\"\n\n<p>\\u201cCLUE\\u2019s implementation team seamlessly integrated advanced security measures, greatly enhancing our IT infrastructure\\u2019s resilience\\u201d<\\\/p>\\n\n\n<p><strong>J.K. \\u2013 IT Director<\\\/strong><\\\/p>\",\"content_margin\":\"small\",\"css\":\"div.uk-card-body {\\n\\tpadding-top: 20px;\\n}\",\"height_expand\":false,\"icon_width\":80,\"image\":\"\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"xlarge\",\"meta\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":true,\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"position_bottom\":\"-130\",\"title\":\"\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"name\":\"Customer Testimonial\"}]}]}],\"name\":\"Customer Testimonial\"},{\"type\":\"section\",\"props\":{\"id\":\"radial_bg_row_features_apprt\",\"image_position\":\"center-center\",\"padding_remove_bottom\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Features\",\"text_align\":\"center\",\"title_element\":\"h2\"}},{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_medium\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_width\":\"42\",\"item_animation\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"xlarge\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h4\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Wir entwickeln, implementieren und integrieren Firewalls der n\\u00e4chsten Generation, Intrusion-Prevention-Systeme und vieles mehr, um Ihr Netzwerk auf jeder Ebene zu sch\\u00fctzen.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>We deploy next-gen firewalls, intrusion prevention, and more to safeguard your network at every level.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/08\\\/blog_about_icon.svg\",\"title\":\"Netzwerksicherheit\",\"title_en_gb\":\"Network security\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Von Web- und E-Mail-Sicherheit bis hin zu Sandboxing und Endpunktschutz - wir sorgen daf\\u00fcr, dass Ihre Daten sicher bleiben.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>From web and email security to sandboxing and endpoint protection, we ensure your data remains secure.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/07\\\/mfaut_feature_2.svg\",\"title\":\"Sicherheit f\\u00fcr Content und Endpunkte\",\"title_en_gb\":\"Content and Endpoint Security\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Implementieren Sie Web Application Firewalls und Schwachstellenmanagement, um Ihre Anwendungen vor komplexen Bedrohungen zu sch\\u00fctzen.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Implement web application firewalls and vulnerability management to protect your applications from sophisticated threats.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/07\\\/sitep_feature_2.svg\",\"title\":\"Applikations-Sicherheit\",\"title_en_gb\":\"Application Security\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>St\\u00e4rken Sie Ihre Sicherheitslage mit einem umfassenden Identit\\u00e4ts- und Zugriffsmanagement, einschliesslich Multi-Faktor-Authentifizierung.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Strengthen your security posture with comprehensive identity and access management, including multi-factor authentication.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/06\\\/report_vulnm_feature.svg\",\"title\":\"Identit\\u00e4ts- und Personenmanagement\",\"title_en_gb\":\"Identity and People\"}}]},{\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content\":\"\n\n<p><span>Learn what Clue\\u2019s Security Implementation Consulting offers in even more detail with our downloadable and sharable datasheet.<\\\/span><\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link\":\"this is a download\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"status\":\"disabled\",\"text_align\":\"center\",\"title\":\"Get the \\u201eSecurity Implementation Consulting\\u201c datasheet\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"},\"name\":\"Factsheet CTA\"}]}],\"props\":{\"id\":\"features_apprt_row\",\"margin\":\"default\",\"margin_remove_top\":false}}],\"name\":\"Features\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-top\",\"height\":\"pixels\",\"height_viewport\":300,\"id\":\"security_assesment_consulting_prescroll\",\"image_position\":\"center-center\",\"padding\":\"xlarge\",\"sticky\":\"cover\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2024\\\/08\\\/swipe_down.svg\",\"image_svg_color\":\"emphasis\",\"image_width\":60,\"margin\":\"default\",\"position_top\":\"80px\",\"text_align\":\"center\"}}]}]}],\"name\":\"Scroll Down Section\"},{\"name\":\"Banner\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"header_transparent\":true,\"height_offset_top\":true,\"height_viewport\":500,\"id\":\"security-assessment\",\"image_loading\":true,\"image_position\":\"center-center\",\"image_size\":\"cover\",\"image_width\":\"2560\",\"overlap\":false,\"padding\":\"large\",\"preserve_color\":true,\"style\":\"default\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"slide-bottom-small\",\"content\":\"Security Assessment\",\"text_align\":\"left\",\"title_element\":\"h1\"}},{\"type\":\"text\",\"props\":{\"animation\":\"slide-top-small\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Proaktive Sicherheitsanalysen zur Ermittlung und Minderung von Risiken in Ihrer IT-Landschaft.<\\\/p>\",\"content_en_gb\":\"Proactive security assessments to identify and mitigate risks in your IT landscape.\",\"dropcap\":false,\"margin\":\"default\",\"maxwidth\":\"xlarge\",\"text_align\":\"left\",\"text_style\":\"large\"}},{\"type\":\"button\",\"props\":{\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"default\",\"content\":\"Entdecken Sie Clue\",\"content_en_gb\":\"Explore Clue Today\",\"icon\":\"\",\"icon_align\":\"left\",\"link\":\"contact\\\/\",\"link_en_gb\":\"en\\\/contact\\\/\"}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"image\",\"props\":{\"id\":\"apprt_service_icon\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/07\\\/security_assesment_web.png\",\"image_focal_point\":\"top-left\",\"image_svg_color\":\"emphasis\",\"margin\":\"default\",\"margin_remove_top\":false}}]}],\"props\":{\"layout\":\"2-3,1-3\"}}]},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"100\",\"image_position\":\"center-center\",\"padding_remove_bottom\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"fade\",\"block_align\":\"center\",\"content\":\"Benefits\",\"margin\":\"large\",\"maxwidth\":\"2xlarge\",\"text_align\":\"center\",\"title_color\":\"secondary\",\"title_element\":\"h2\"}},{\"type\":\"grid\",\"props\":{\"content_align\":false,\"content_column_breakpoint\":\"m\",\"content_dropcap\":false,\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":false,\"grid_default\":\"1\",\"grid_medium\":\"3\",\"grid_parallax\":\"0\",\"grid_row_align\":false,\"icon_width\":80,\"id\":\"benefits_service_card\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"link_style\":\"text\",\"link_text\":\"Read more\",\"margin\":\"\",\"margin_remove_top\":false,\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":false,\"panel_padding\":\"small\",\"panel_style\":\"card-default\",\"position_left\":\"10\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_margin\":\"small\",\"title_style\":\"h4\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Kundenspezifische Analysen liefern ein klares Verst\\u00e4ndnis der Schwachstellen und Risiken Ihrer individuellen IT-Umgebung.<\\\/p>\",\"content_en_gb\":\"Custom assessments provide a clear understanding of your unique IT environment\\u2019s vulnerabilities and risks.\",\"icon\":\"\",\"link_text\":\"Learn More\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Massgeschneiderte Sicherheitseinblicke\",\"title_en_gb\":\"Tailored Security <br \/>Insights\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Von der Erkennung kleinerer Bedrohungen bis hin zu eingehenden Penetrationstests decken wir alle Aspekte von Sicherheitsl\\u00fccken ab.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span style=\\\"font-weight: 400;\\\">From minor threat detection to in-depth penetration testing, we cover all aspects of security vulnerabilities.<\\\/span><\\\/p>\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Umfassendes Risikomanagement\",\"title_en_gb\":\"Comprehensive Risk Management\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Unsere Analysen f\\u00fchren zu nachhaltigen Verbesserungen Ihrer Sicherheitslage und verringern k\\u00fcnftige Schwachstellen.<\\\/p>\",\"content_en_gb\":\"\n\n<p>Our assessments inform sustainable improvements in your security posture, reducing future vulnerabilities.<\\\/p>\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Strategische Verbesserungen der Sicherheit\",\"title_en_gb\":\"Strategic Security Enhancements\"}}]}]}],\"props\":{\"margin\":\"large\",\"row_gap\":\"large\",\"width\":\"default\"}}],\"name\":\"Benefits\"},{\"type\":\"section\",\"props\":{\"class\":\"quote_card\",\"image_position\":\"center-center\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content\":\"\n\n<p>\\u00abDas Security Assessment von Clue hat uns wichtige Einblicke in unsere IT-Infrastruktur gegeben, die es uns erm\\u00f6glicht haben, unsere Abwehrmassnahmen proaktiv zu verbessern.\\u00bb<\\\/p>\\n\n\n<p><strong>S.C.\\u00a0\\u2013 CISO<\\\/strong><\\\/p>\",\"content_column_breakpoint\":\"m\",\"content_en_gb\":\"\n\n<p><span>\\u201cClue\\u2019s Security Assessment revealed critical insights into our IT infrastructure, enabling us to proactively enhance our defenses.\\u201d<\\\/span><\\\/p>\\n\n\n<p><strong>S.C.\\u00a0\\u2013 CISO<\\\/strong><\\\/p>\",\"content_margin\":\"small\",\"css\":\"div.uk-card-body {\\n\\tpadding-top: 20px;\\n}\",\"height_expand\":false,\"icon_width\":80,\"image\":\"\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"xlarge\",\"meta\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":true,\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"position_bottom\":\"-130\",\"title\":\"\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"name\":\"Customer Testimonial\"}]}]}],\"name\":\"Customer Testimonial\"},{\"type\":\"section\",\"props\":{\"id\":\"radial_bg_row_features_apprt\",\"image_position\":\"center-center\",\"padding_remove_bottom\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Features\",\"text_align\":\"center\",\"title_element\":\"h2\"}},{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":true,\"grid_default\":\"1\",\"grid_medium\":\"3\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_width\":\"42\",\"item_animation\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"xlarge\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h4\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Sicherheitsbewertungen, die auf die spezifischen betrieblichen Rahmenbedingungen und Bed\\u00fcrfnisse Ihres Unternehmens zugeschnitten sind.<\\\/p>\",\"content_en_gb\":\"Security evaluations tailored to your company\\u2019s specific operational framework and needs.\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/tune_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Individuelle Auswertungen\",\"title_en_gb\":\"Customized Assessments\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Wir bieten Schwachstellenbewertungen, Ransomware-Bewertungen und Penetrationstests an, um verschiedene Sicherheitsprobleme anzugehen.<\\\/p>\",\"content_en_gb\":\"Offering vulnerability assessments, ransomware assessments, and penetration testing to address various security concerns.\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/07\\\/aedpr_feature_2.svg\",\"title\":\"Vielf\\u00e4ltige Testdienstleistungen\",\"title_en_gb\":\"Diverse Testing Services\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Kontinuierliche Unterst\\u00fctzung \\u00fcber die erste Bewertung hinaus, um langfristige Sicherheitsverbesserungen und Compliance zu gew\\u00e4hrleisten.<\\\/p>\",\"content_en_gb\":\"Continuous assistance beyond the initial assessment to ensure long-term security improvements and compliance.\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/support_agent_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Laufende Supportleistungen\",\"title_en_gb\":\"Ongoing Support\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Durchf\\u00fchrung nach anerkannten Standards wie OSSTMM und OWASP, um zuverl\\u00e4ssige und aussagekr\\u00e4ftige Erkenntnisse zu gew\\u00e4hrleisten.<\\\/p>\",\"content_en_gb\":\"Performed according to recognized standards like OSSTMM and OWASP, ensuring reliable and meaningful insights.\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/workspace_premium_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Fachkundige Umsetzung\",\"title_en_gb\":\"Expert Execution\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Detaillierte Berichte liefern eine nach Priorit\\u00e4ten geordnete Liste von Schwachstellen mit Empfehlungen zur Optimierung Ihrer IT-Infrastruktur.<\\\/p>\",\"content_en_gb\":\"Detailed reports provide a prioritized list of vulnerabilities with recommendations for optimizing your IT infrastructure.\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/06\\\/report_vulnm_feature.svg\",\"title\":\"Umsetzbare Reports\",\"title_en_gb\":\"Actionable Reports\"}}]},{\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content\":\"\n\n<p><span>Erfahren Sie mehr \\u00fcber das Clue Security Assessment Consulting in unserem Factsheet, das Sie herunterladen und teilen k\\u00f6nnen.<\\\/span><\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link\":\"wp-content\\\/uploads\\\/2024\\\/10\\\/Fact-Sheet-Security-Assessment_2023-03_DE.pdf\",\"link_style\":\"default\",\"link_text\":\"Download\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"status\":\"disabled\",\"text_align\":\"center\",\"title\":\"Entdecken Sie jetzt unser \\u201eSecurity Assessment Consulting\\u201c Factsheet\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h4\"},\"name\":\"Factsheet CTA\"}]}],\"props\":{\"id\":\"features_apprt_row\",\"margin\":\"default\",\"margin_remove_top\":false}}],\"name\":\"Features\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-top\",\"height\":\"pixels\",\"height_viewport\":300,\"id\":\"security_awareness_consulting_prescroll\",\"image_position\":\"center-center\",\"padding\":\"xlarge\",\"sticky\":\"cover\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2024\\\/08\\\/swipe_down.svg\",\"image_svg_color\":\"emphasis\",\"image_width\":60,\"margin\":\"default\",\"position_top\":\"80px\",\"text_align\":\"center\"}}]}]}],\"name\":\"Scroll Down Section\"},{\"name\":\"Banner\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"header_transparent\":true,\"height_offset_top\":true,\"height_viewport\":500,\"id\":\"awareness-training\",\"image_loading\":true,\"image_position\":\"center-center\",\"image_size\":\"cover\",\"image_width\":\"2560\",\"overlap\":false,\"padding\":\"large\",\"preserve_color\":true,\"style\":\"default\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"slide-bottom-small\",\"content\":\"Security Awareness Training\",\"text_align\":\"left\",\"title_element\":\"h1\"}},{\"type\":\"text\",\"props\":{\"animation\":\"slide-top-small\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Bereiten Sie Ihr Team darauf vor, Cyber-Bedrohungen zu erkennen und wirksam zu bek\\u00e4mpfen.<\\\/p>\",\"content_en_gb\":\"Equip your team to recognize and counter cyber threats effectively.\\n\",\"dropcap\":false,\"margin\":\"default\",\"maxwidth\":\"xlarge\",\"text_align\":\"left\",\"text_style\":\"large\"}},{\"type\":\"button\",\"props\":{\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"default\",\"content\":\"Entdecken Sie Clue\",\"content_en_gb\":\"Explore CLUE Today\",\"icon\":\"\",\"icon_align\":\"left\",\"link\":\"contact\\\/\",\"link_en_gb\":\"contact\\\/\"}}]}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"image\",\"props\":{\"id\":\"apprt_service_icon\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/07\\\/awareness_training_web.png\",\"image_focal_point\":\"top-left\",\"image_svg_color\":\"emphasis\",\"margin\":\"default\",\"margin_remove_top\":false}}]}],\"props\":{\"layout\":\"2-3,1-3\"}}]},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"100\",\"image_position\":\"center-center\",\"padding_remove_bottom\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"animation\":\"fade\",\"block_align\":\"center\",\"content\":\"Benefits\",\"margin\":\"large\",\"maxwidth\":\"2xlarge\",\"text_align\":\"center\",\"title_color\":\"secondary\",\"title_element\":\"h2\"}},{\"type\":\"grid\",\"props\":{\"content_align\":false,\"content_column_breakpoint\":\"m\",\"content_dropcap\":false,\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":false,\"grid_default\":\"1\",\"grid_medium\":\"3\",\"grid_parallax\":\"0\",\"grid_row_align\":false,\"icon_width\":80,\"id\":\"benefits_service_card\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"link_style\":\"text\",\"link_text\":\"Read more\",\"margin\":\"\",\"margin_remove_top\":false,\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":false,\"panel_padding\":\"small\",\"panel_style\":\"card-default\",\"position_left\":\"10\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_margin\":\"small\",\"title_style\":\"h4\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Zugeschnittene Schulungen zu den spezifischen Cyberrisiken f\\u00fcr alle Unternehmensebenen, vom breiten Personal bis zu den F\\u00fchrungskr\\u00e4ften.<\\\/p>\",\"content_en_gb\":\"Tailored training for all company levels, from general staff to executives, addressing specific cyber risks.\",\"icon\":\"\",\"link_text\":\"Learn More\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Umfassende <br \/>Schulungsmodule\",\"title_en_gb\":\"Comprehensive <br \/>Training Modules\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"Laufende Schulungen und Neubewertungen sorgen f\\u00fcr dauerhafte Wachsamkeit gegen\\u00fcber Phishing, Malware und anderen Cyber-Bedrohungen.\",\"content_en_gb\":\"Ongoing training and re-assessments ensure lasting vigilance against phishing, malware, and other cyber threats.\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Kontinuierliches <br \/>Lernen\",\"title_en_gb\":\"Continuous <br \/>Learning\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Verfolgen Sie die Effektivit\\u00e4t von Schulungskampagnen anhand detaillierter Metriken, von der E-Mail-Beteiligung bis hin zu Verhaltens\\u00e4nderungen.<\\\/p>\",\"content_en_gb\":\"Track the effectiveness of training campaigns through detailed metrics, from email engagement to behavioral changes.\",\"meta\":\"\",\"panel_style\":\"card-default\",\"title\":\"Messbarer <br \/>Erfolg\",\"title_en_gb\":\"Measurable <br \/>Success\"}}]}]}],\"props\":{\"margin\":\"large\",\"row_gap\":\"large\",\"width\":\"default\"}}],\"name\":\"Benefits\"},{\"type\":\"section\",\"props\":{\"class\":\"quote_card\",\"image_position\":\"center-center\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content\":\"\n\n<p>\\u00abDas Awareness-Training von Clue hat die F\\u00e4higkeit unseres Teams, Cyber-Bedrohungen zu erkennen und darauf zu reagieren, deutlich verbessert und damit unser Risikoprofil erheblich reduziert.\\u00bb<\\\/p>\\n\n\n<div><strong>E.T.\\u00a0\\u2013 HR Direktor<\\\/strong><\\\/div>\",\"content_column_breakpoint\":\"m\",\"content_en_gb\":\"\n\n<p>\\\"Clue\\u2019s Awareness Training has markedly improved our team\\u2019s ability to spot and respond to cyber threats, significantly reducing our risk profile.\\\"<\\\/p>\\n\n\n<div><strong>E.T.\\u00a0\\u2013 HR Director<\\\/strong><\\\/div>\",\"content_margin\":\"small\",\"css\":\"div.uk-card-body {\\n\\tpadding-top: 20px;\\n}\",\"height_expand\":false,\"icon_width\":80,\"image\":\"\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":false,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"xlarge\",\"meta\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":true,\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"position_bottom\":\"-130\",\"title\":\"\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"name\":\"Customer Testimonial\"}]}]}],\"name\":\"Customer Testimonial\"},{\"type\":\"section\",\"props\":{\"id\":\"radial_bg_row_features_apprt\",\"image_position\":\"center-center\",\"padding_remove_bottom\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Features\",\"text_align\":\"center\",\"title_element\":\"h2\"}},{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":true,\"grid_default\":\"1\",\"grid_divider\":false,\"grid_medium\":\"3\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"image_width\":\"42\",\"item_animation\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"xlarge\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h4\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Massgeschneiderte Schulungen, die auf die besonderen Anforderungen und Verantwortlichkeiten der verschiedenen Rollen innerhalb Ihres Unternehmens eingehen.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Customized sessions that address the unique exposure and responsibilities of different roles within your organization.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/school_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Funktionsspezifische <br \/>Schulung\",\"title_en_gb\":\"Role-Specific <br \/>Training\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Spezielle Schulungen f\\u00fcr Personen mit hohem Risiko, um gezielte Angriffe wie CEO- Fraud zu verhindern und eine Sicherheitskultur von der obersten Ebene an zu f\\u00f6rdern.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Specialized training for high-risk individuals to prevent targeted attacks like CEO fraud, fostering a culture of security from the top down.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/business_center_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Fokus auf Manager <br \/>und F\\u00fchrungskr\\u00e4fte\",\"title_en_gb\":\"Managerial and <br \/>Executive Focus\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Kontinuierliche Auffrischungen und Updates, damit das Sicherheitsbewusstsein Ihrer Mitarbeiter stets im Mittelpunkt steht.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Continuous refreshers and updates to keep security awareness front and center in your employees\\u2019 daily routines.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/08\\\/call_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Unterst\\u00fctzung nach <br \/>der Schulung\",\"title_en_gb\":\"Post-Training <br \/>Support\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Nutzen Sie eine umfangreiche Bibliothek von Phishing-Vorlagen, um reale Angriffe zu simulieren und so Ihre praktischen Abwehrf\\u00e4higkeiten zu verbessern.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Utilize an extensive library of phishing templates to simulate real-world attacks, enhancing practical defense skills.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/phishing_42dp_00C0AA_FILL0_wght400_GRAD0_opsz40.svg\",\"title\":\"Realistische<br \/> Phishing-Simulationen\",\"title_en_gb\":\"Realistic Phishing Simulations\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Bewerten Sie die Auswirkungen von Schulungsinitiativen mit pr\\u00e4zisen Analysen und richten Sie den Fokus auf zuk\\u00fcnftige Sicherheitsmassnahmen.<\\\/p>\",\"content_en_gb\":\"\n\n<p><span>Evaluate the impact of training initiatives with precise analytics, guiding the focus of future security measures.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/07\\\/aithd_feature_1.svg\",\"title\":\"Effiziente <br \/>Messmethoden\",\"title_en_gb\":\"Efficient <br \/>Measurement Tools\"}}]},{\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content\":\"\n\n<p><span>Learn what Clue's Security Awareness Training offers in even more detail with our downloadable and sharable datasheet.<\\\/span><\\\/p>\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link\":\"this is a download\",\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"status\":\"disabled\",\"text_align\":\"center\",\"title\":\"Get the \\u201eSecurity Awareness Training\\u201c datasheet\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h3\"},\"name\":\"Factsheet CTA\"}]}],\"props\":{\"id\":\"features_apprt_row\",\"margin\":\"default\",\"margin_remove_top\":false}},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2025\\\/01\\\/Portal-Illustration.png\",\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link\":\"portal-intro\\\/\",\"link_en_gb\":\"\\\/en\\\/portal-intro\\\/\",\"link_style\":\"secondary\",\"link_text\":\"Zum Portal\",\"link_text_en_gb\":\"to the portal\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"2xlarge\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"position\":\"relative\",\"position_top\":\"310\",\"text_align\":\"center\",\"title\":\"Erhalten Sie Echtzeit-Einblicke mit unserem Portal\",\"title_align\":\"top\",\"title_element\":\"h4\",\"title_en_gb\":\"Get real-time insights with our Portal\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h4\"},\"name\":\"Portal CTA\"}]}]}],\"name\":\"Features\"},{\"type\":\"section\",\"props\":{\"height\":\"pixels\",\"height_offset_top\":false,\"height_viewport\":650,\"id\":\"real_time_portal_feature_apprt\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/10\\\/GR_SA_bw-scaled.jpg\",\"image_position\":\"center-right\",\"image_size\":\"cover\",\"media_focal_point\":\"top-center\",\"style\":\"primary\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<h5>Erfahren Sie, wie wir die Cyber-Sicherheit einer Non-Profit-Organisation optimierten<\\\/h5>\",\"content_en_gb\":\"\n\n<h5>Find out how we optimized the cyber security of a non-profit organization.<\\\/h5>\",\"margin\":\"default\",\"maxwidth\":\"xlarge\",\"position\":\"relative\",\"position_top\":\"300\",\"text_align\":\"center\",\"text_style\":\"large\",\"visibility\":\"m\"}},{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<h5>Erfahren Sie, wie wir die Antivirenl\\u00f6sung eines IT-Dienstleisters nahtlos austauschten.<\\\/h5>\",\"content_en_gb\":\"\n\n<h5>Find out how we seamlessly replaced an IT service provider\\u2019s antivirus solution.<\\\/h5>\",\"margin\":\"default\",\"maxwidth\":\"xlarge\",\"position\":\"relative\",\"position_top\":\"300\",\"text_align\":\"center\",\"text_color\":\"secondary\",\"text_style\":\"meta\",\"visibility\":\"hidden-m\"}},{\"type\":\"button\",\"props\":{\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"position\":\"relative\",\"position_top\":\"300\",\"text_align\":\"center\",\"visibility\":\"m\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"text\",\"content\":\"Zur Story\",\"content_en_gb\":\"Read More\",\"icon_align\":\"left\",\"link\":\"about-clue\\\/customer-success-stories\\\/umfassendes-cyber-security-assessment-und-massnahmenplan\\\/\",\"link_en_gb\":\"about-clue\\\/customer-success-stories\\\/umfassendes-cyber-security-assessment-und-massnahmenplan\\\/\"}}],\"name\":\"Button Desktop\"},{\"type\":\"button\",\"props\":{\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"position\":\"relative\",\"position_top\":\"300\",\"text_align\":\"center\",\"visibility\":\"hidden-m\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"text\",\"content\":\"Zur Story\",\"content_en_gb\":\"Read More\",\"icon_align\":\"left\",\"link\":\"about-clue\\\/customer-success-stories\\\/umfassendes-cyber-security-assessment-und-massnahmenplan\\\/\",\"link_en_gb\":\"about-clue\\\/customer-success-stories\\\/umfassendes-cyber-security-assessment-und-massnahmenplan\\\/\"}}],\"name\":\"Button Mobile\"}]}]}],\"name\":\"Success Story CTA_1\"},{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"module\",\"props\":{\"menu_image_align\":\"center\",\"menu_image_margin\":true,\"menu_style\":\"default\",\"menu_type\":\"nav\",\"type\":\"builderwidget\",\"widget\":\"builderwidget-11\"}}]}]}]}],\"version\":\"4.4.5\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Application Security Consulting Expertenberatung, die Ihre Anwendungen von Grund auf st\u00e4rkt. Entdecken Sie Clue Benefits Holistische Sicherheitsstrategie Unser Ansatz geht \u00fcber Penetrationstests hinaus und identifiziert und behebt die Ursachen von Schwachstellen. Kosteneffiziente Entwicklung Steigern Sie die Effizienz und senken Sie die Kosten, indem Sie bew\u00e4hrte Sicherheitsverfahren in Ihren Entwicklungszyklus integrieren. Nachhaltige Sicherheitsverbesserungen Erzielen Sie durch [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-97","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Consulting &#8211; CLUE<\/title>\n<meta name=\"description\" content=\"Expert cybersecurity consulting services to assess, implement, and enhance your IT security posture.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clue.ch\/\/clue.ch\/\/clue.ch\/en\/consulting\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Consulting &#8211; CLUE\" \/>\n<meta property=\"og:description\" content=\"Expert cybersecurity consulting services to assess, implement, and enhance your IT security posture.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/clue.ch\/consulting\/\" \/>\n<meta property=\"og:site_name\" content=\"CLUE\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.instagram.com\/clue.security\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-17T13:42:20+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clue.de\/en\/consulting\/\",\"url\":\"https:\/\/clue.ch\/consulting\/\",\"name\":\"Consulting &#8211; CLUE\",\"isPartOf\":{\"@id\":\"https:\/\/clue.ch\/#website\"},\"datePublished\":\"2024-02-21T13:32:41+00:00\",\"dateModified\":\"2025-12-17T13:42:20+00:00\",\"description\":\"Beratung durch Experten f\u00fcr Cybersicherheit zur Bewertung, Umsetzung und Verbesserung Ihrer IT-Sicherheitslage\",\"breadcrumb\":{\"@id\":\"https:\/\/clue.ch\/consulting\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clue.ch\/consulting\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clue.ch\/consulting\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clue.ch\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Consulting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clue.ch\/#website\",\"url\":\"https:\/\/clue.ch\/\",\"name\":\"CLUE\",\"description\":\"Cyber Secure\",\"publisher\":{\"@id\":\"https:\/\/clue.ch\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clue.ch\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/clue.ch\/#organization\",\"name\":\"CLUE Security Services\",\"url\":\"https:\/\/clue.ch\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/clue.ch\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg\",\"contentUrl\":\"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg\",\"width\":1,\"height\":1,\"caption\":\"CLUE Security Services\"},\"image\":{\"@id\":\"https:\/\/clue.ch\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/clue.security\/\",\"https:\/\/www.linkedin.com\/company\/clue-security-services\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Consulting &#8211; CLUE","description":"Expert cybersecurity consulting services to assess, implement, and enhance your IT security posture.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\\\/\\\/clue.ch\/\/clue.ch\/\/clue.ch\/en\/consulting\/","og_locale":"en_GB","og_type":"article","og_title":"Consulting &#8211; CLUE","og_description":"Expert cybersecurity consulting services to assess, implement, and enhance your IT security posture.","og_url":"https:\/\/clue.ch\/consulting\/","og_site_name":"CLUE","article_publisher":"https:\/\/www.instagram.com\/clue.security\/","article_modified_time":"2025-12-17T13:42:20+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clue.de\/en\/consulting\/","url":"https:\/\/clue.ch\/consulting\/","name":"Consulting &#8211; CLUE","isPartOf":{"@id":"https:\/\/clue.ch\/#website"},"datePublished":"2024-02-21T13:32:41+00:00","dateModified":"2025-12-17T13:42:20+00:00","description":"Beratung durch Experten f\u00fcr Cybersicherheit zur Bewertung, Umsetzung und Verbesserung Ihrer IT-Sicherheitslage","breadcrumb":{"@id":"https:\/\/clue.ch\/consulting\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clue.ch\/consulting\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clue.ch\/consulting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clue.ch\/"},{"@type":"ListItem","position":2,"name":"Consulting"}]},{"@type":"WebSite","@id":"https:\/\/clue.ch\/#website","url":"https:\/\/clue.ch\/","name":"CLUE","description":"Cyber Secure","publisher":{"@id":"https:\/\/clue.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clue.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/clue.ch\/#organization","name":"CLUE Security Services","url":"https:\/\/clue.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/clue.ch\/#\/schema\/logo\/image\/","url":"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg","contentUrl":"https:\/\/clue.ch\/wp-content\/uploads\/2024\/02\/CLUE_Logo_Claim_RGB_Color.svg","width":1,"height":1,"caption":"CLUE Security Services"},"image":{"@id":"https:\/\/clue.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/clue.security\/","https:\/\/www.linkedin.com\/company\/clue-security-services\/"]}]}},"_links":{"self":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/97","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/comments?post=97"}],"version-history":[{"count":1,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/97\/revisions"}],"predecessor-version":[{"id":14928,"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/pages\/97\/revisions\/14928"}],"wp:attachment":[{"href":"https:\/\/clue.de\/en\/wp-json\/wp\/v2\/media?parent=97"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}