{"id":1971,"date":"2025-07-28T21:47:38","date_gmt":"2025-07-28T19:47:38","guid":{"rendered":"https:\/\/net-e.de\/?page_id=1971"},"modified":"2025-07-29T09:40:42","modified_gmt":"2025-07-29T07:40:42","slug":"soc","status":"publish","type":"page","link":"https:\/\/net-e.de\/en\/soc\/","title":{"rendered":"soc"},"content":{"rendered":"<style type=\"text\/css\">\n\t#hero-small-block_a6948c223afac27a66656c247c9025bc {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Small Hero******************* -->\n<div id=\"hero-small-block_a6948c223afac27a66656c247c9025bc\" class=\"block-hero-small alignfull\">\n\n\t\t\t<div class=\"jumbotron jumbotron-small d-flex align-items-center text-center rounded-0 px-0\" style=\"background-image: url('https:\/\/net-e.de\/wp-content\/uploads\/2021\/12\/img_head-start.svg');\">\n\n\t\t\t<div class=\"container-fluid overlay\">\n\t\t\t\t<div class=\"row h-100\">\n\t\t\t\t\t<div class=\"col-12 overlay-col\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"container container-mt text-container\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-12\">\n\t\t\t\t\t\t<div class=\"font-small-hero-responsive regular text-white text-left w-75\">\n\t\t\t\t\t\t\t<b style=\"color:#cc5e24\">Security Operations Center (SOC) \u2013 Sicherheit. Sichtbarkeit. Kontrolle.<\/b> \t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_cbc0a91ede4facef0cb664be81a2d4c0 {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_cbc0a91ede4facef0cb664be81a2d4c0\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: \">\n    \n\n<style type=\"text\/css\">\n\t#text-bild-block_c7d548963d0e5dfdc5f9d43670619fbe {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_c7d548963d0e5dfdc5f9d43670619fbe\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"row flex-wrap-reverse\">\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-right text-col-padding my-auto\">\n\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"415\" data-end=\"469\"><span style=\"color: #cc5e24\"><strong data-start=\"419\" data-end=\"469\">Angriffe erkennen, bevor sie Schaden anrichten<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t<h3 data-start=\"415\" data-end=\"469\"><\/h3>\n<p data-start=\"471\" data-end=\"821\">Die Frage ist nicht, <strong data-start=\"492\" data-end=\"498\">ob<\/strong>, sondern <strong data-start=\"508\" data-end=\"516\">wann<\/strong> ein Sicherheitsvorfall eintritt. Mit unserem <strong data-start=\"562\" data-end=\"587\">modularen SOC-Service<\/strong> erkennen Sie Angriffe, Anomalien und Bedrohungen fr\u00fchzeitig \u2013 bevor sie zu echten Problemen werden. Wir analysieren sicherheitsrelevante Ereignisse, alarmieren bei kritischen Vorf\u00e4llen und unterst\u00fctzen Sie bei der schnellen Reaktion.<\/p>\n<p data-start=\"823\" data-end=\"1063\">Ob als Erweiterung Ihrer bestehenden IT oder als vollst\u00e4ndig ausgelagerter Service: Mit unserem <strong data-start=\"919\" data-end=\"949\">Security Operations Center<\/strong> behalten Sie Ihre digitale Umgebung rund um die Uhr im Blick \u2013 zuverl\u00e4ssig, skalierbar und individuell anpassbar.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding right-bg-padding text-center right-bg\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1456\" height=\"816\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_illustration_of_an_IT_security_08aa1a22-a3e5-4e7a-a8c4-72ba367e5ccf_2.png\" class=\"attachment-full img-right size-full img-right\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_illustration_of_an_IT_security_08aa1a22-a3e5-4e7a-a8c4-72ba367e5ccf_2.png 1456w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_illustration_of_an_IT_security_08aa1a22-a3e5-4e7a-a8c4-72ba367e5ccf_2-300x168.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_illustration_of_an_IT_security_08aa1a22-a3e5-4e7a-a8c4-72ba367e5ccf_2-1024x574.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_illustration_of_an_IT_security_08aa1a22-a3e5-4e7a-a8c4-72ba367e5ccf_2-768x430.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_illustration_of_an_IT_security_08aa1a22-a3e5-4e7a-a8c4-72ba367e5ccf_2-18x10.png 18w\" sizes=\"(max-width: 1456px) 100vw, 1456px\" \/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_f8ddb52e7bc2f92bc565c8f83df6ada1 {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_f8ddb52e7bc2f92bc565c8f83df6ada1\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: #ffffff\">\n    \n\n<style type=\"text\/css\">\n\t#text-bild-block_0ee0fad71af87b70be13a90867dcfcc4 {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_0ee0fad71af87b70be13a90867dcfcc4\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t\t<div class=\"container\">\n\t\t\t\t\t<div class=\"row\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding left-bg-padding text-center left-bg\">\n\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1456\" height=\"816\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_scene_representing_IT_Incident_925e3d81-a105-4332-b97e-1738bc298a89_1.png\" class=\"attachment-full img-left size-full img-left\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_scene_representing_IT_Incident_925e3d81-a105-4332-b97e-1738bc298a89_1.png 1456w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_scene_representing_IT_Incident_925e3d81-a105-4332-b97e-1738bc298a89_1-300x168.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_scene_representing_IT_Incident_925e3d81-a105-4332-b97e-1738bc298a89_1-1024x574.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_scene_representing_IT_Incident_925e3d81-a105-4332-b97e-1738bc298a89_1-768x430.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_scene_representing_IT_Incident_925e3d81-a105-4332-b97e-1738bc298a89_1-18x10.png 18w\" sizes=\"(max-width: 1456px) 100vw, 1456px\" \/>\n\t\t\t\t\t\t\t \n\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-left text-col-padding my-auto\">\n\t\t\t\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"1070\" data-end=\"1096\"><span style=\"color: #cc5e24\"><strong data-start=\"1074\" data-end=\"1096\">Was macht ein SOC?<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t\t\t\t<h3 data-start=\"1070\" data-end=\"1096\"><\/h3>\n<p data-start=\"1098\" data-end=\"1340\">Ein Security Operations Center (SOC) ist die zentrale Schaltstelle f\u00fcr Ihre IT-Sicherheit. Hier laufen alle F\u00e4den zusammen: Logdaten, Sicherheitswarnungen, Netzwerkverkehr und verd\u00e4chtige Aktivit\u00e4ten werden gesammelt, analysiert und bewertet.<\/p>\n<p data-start=\"1342\" data-end=\"1511\">Unser SOC-Team reagiert nicht nur auf Vorf\u00e4lle \u2013 es <strong data-start=\"1394\" data-end=\"1416\">arbeitet pr\u00e4ventiv<\/strong>, bewertet Risiken im Kontext und unterst\u00fctzt aktiv bei der Verteidigung Ihrer Infrastruktur.<\/p>\n<hr data-start=\"1513\" data-end=\"1516\" \/>\n<h3 data-start=\"1518\" data-end=\"1556\"><span style=\"color: #cc5e24\"><strong data-start=\"1522\" data-end=\"1556\">Unsere Leistungen im \u00dcberblick<\/strong><\/span><\/h3>\n<ul data-start=\"1558\" data-end=\"2331\">\n<li data-start=\"1558\" data-end=\"1712\">\n<p data-start=\"1560\" data-end=\"1712\"><strong data-start=\"1560\" data-end=\"1617\">Sicherheits\u00fcberwachung Ihrer Systeme &amp; Netzwerke<\/strong><br data-start=\"1617\" data-end=\"1620\" \/>Analyse sicherheitsrelevanter Ereignisse \u2013 lokal, hybrid oder cloudbasiert<\/p>\n<\/li>\n<li data-start=\"1714\" data-end=\"1835\">\n<p data-start=\"1716\" data-end=\"1835\"><strong data-start=\"1716\" data-end=\"1756\">Analyse und Korrelation von Logdaten<\/strong><br data-start=\"1756\" data-end=\"1759\" \/>Zentrale Auswertung und Anomalie-Erkennung auf Basis definierter Use Cases<\/p>\n<\/li>\n<li data-start=\"1837\" data-end=\"1981\">\n<p data-start=\"1839\" data-end=\"1981\"><strong data-start=\"1839\" data-end=\"1903\">Alarmierung &amp; Eskalation bei sicherheitskritischen Vorf\u00e4llen<\/strong><br data-start=\"1903\" data-end=\"1906\" \/>Schnelle Reaktion auf konkrete Bedrohungen \u2013 abgestimmt auf Ihre Prozesse<\/p>\n<\/li>\n<li data-start=\"1983\" data-end=\"2105\">\n<p data-start=\"1985\" data-end=\"2105\"><strong data-start=\"1985\" data-end=\"2045\">Incident Handling &amp; Unterst\u00fctzung bei Reaktionsma\u00dfnahmen<\/strong><br data-start=\"2045\" data-end=\"2048\" \/>Enge Zusammenarbeit mit internen oder externen IT-Teams<\/p>\n<\/li>\n<li data-start=\"2107\" data-end=\"2214\">\n<p data-start=\"2109\" data-end=\"2214\"><strong data-start=\"2109\" data-end=\"2138\">Reporting &amp; Dokumentation<\/strong><br data-start=\"2138\" data-end=\"2141\" \/>Regelm\u00e4\u00dfige Reports mit Handlungsempfehlungen und Compliance-Nachweisen<\/p>\n<\/li>\n<li data-start=\"2216\" data-end=\"2331\">\n<p data-start=\"2218\" data-end=\"2331\"><strong data-start=\"2218\" data-end=\"2247\">SIEM-Integration &amp; Tuning<\/strong><br data-start=\"2247\" data-end=\"2250\" \/>Wir binden Ihr bestehendes System an \u2013 oder stellen ein SIEM als Service bereit<\/p>\n<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<\/div>\n\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_f8ddb52e7bc2f92bc565c8f83df6ada1 {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_f8ddb52e7bc2f92bc565c8f83df6ada1\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: #ffffff\">\n    \n\n<style type=\"text\/css\">\n\t#text-bild-block_9fcae1ab616609079810c0d1ad57af69 {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_9fcae1ab616609079810c0d1ad57af69\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"row flex-wrap-reverse\">\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-right text-col-padding my-auto\">\n\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"2716\" data-end=\"2755\"><span style=\"color: #cc5e24\"><strong data-start=\"2720\" data-end=\"2755\">F\u00fcr wen ist unser SOC geeignet?<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t<h3 data-start=\"2716\" data-end=\"2755\"><\/h3>\n<p data-start=\"2757\" data-end=\"2800\">Unser SOC richtet sich an Unternehmen, die:<\/p>\n<ul data-start=\"2801\" data-end=\"3022\">\n<li data-start=\"2801\" data-end=\"2848\">\n<p data-start=\"2803\" data-end=\"2848\">sensible Daten und Prozesse sch\u00fctzen wollen<\/p>\n<\/li>\n<li data-start=\"2801\" data-end=\"2848\">weitere Schutzmechanismen implementieren wollen<\/li>\n<li data-start=\"2849\" data-end=\"2924\">\n<p data-start=\"2851\" data-end=\"2924\">regulatorische Vorgaben (z.\u202fB. KRITIS, ISO 27001, NIS2) erf\u00fcllen wollen<\/p>\n<\/li>\n<li data-start=\"2925\" data-end=\"2972\">\n<p data-start=\"2927\" data-end=\"2972\">bestehende IT-Abteilungen entlasten m\u00f6chten<\/p>\n<\/li>\n<li data-start=\"2973\" data-end=\"3022\">\n<p data-start=\"2975\" data-end=\"3022\">keinen eigenen SOC betreiben wollen oder k\u00f6nnen<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"3024\" data-end=\"3027\" \/>\n<h3 data-start=\"3029\" data-end=\"3087\"><span style=\"color: #cc5e24\"><strong data-start=\"3033\" data-end=\"3087\">Sichtbarkeit ist die Grundlage jeder IT-Sicherheit<\/strong><\/span><\/h3>\n<p data-start=\"3089\" data-end=\"3249\">Angreifer nutzen blinde Flecken.<br \/>\nUnser SOC sorgt daf\u00fcr, dass Sie wissen, <strong data-start=\"3162\" data-end=\"3249\">was in Ihrer Infrastruktur passiert \u2013 in Echtzeit, nachvollziehbar und priorisiert.<\/strong><\/p>\n<p data-start=\"3251\" data-end=\"3344\"><strong data-start=\"3254\" data-end=\"3344\">Sprechen Sie uns an \u2013 wir zeigen Ihnen, wie modernes Security Monitoring funktioniert.<\/strong><\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding right-bg-padding text-center right-bg\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1456\" height=\"816\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_clean_digital_illustration_showing_a_modular_se_ece66b5c-bc17-4de5-989b-887f6ad831c4_1.png\" class=\"attachment-full img-right size-full img-right\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_clean_digital_illustration_showing_a_modular_se_ece66b5c-bc17-4de5-989b-887f6ad831c4_1.png 1456w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_clean_digital_illustration_showing_a_modular_se_ece66b5c-bc17-4de5-989b-887f6ad831c4_1-300x168.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_clean_digital_illustration_showing_a_modular_se_ece66b5c-bc17-4de5-989b-887f6ad831c4_1-1024x574.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_clean_digital_illustration_showing_a_modular_se_ece66b5c-bc17-4de5-989b-887f6ad831c4_1-768x430.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_clean_digital_illustration_showing_a_modular_se_ece66b5c-bc17-4de5-989b-887f6ad831c4_1-18x10.png 18w\" sizes=\"(max-width: 1456px) 100vw, 1456px\" \/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n\n<style type=\"text\/css\">\n\t#text-bild-block_0ae94e22a8c371aa64fc464792207a19 {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_0ae94e22a8c371aa64fc464792207a19\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t\t<div class=\"container\">\n\t\t\t\t\t<div class=\"row\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding left-bg-padding text-center left-bg\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1456\" height=\"816\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_dramatic_and_realistic_digital_scene_symbolizin_ced6ce6e-af8a-4922-b2e5-e1e914d5c5f8_0.png\" class=\"attachment-full img-left size-full img-left\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_dramatic_and_realistic_digital_scene_symbolizin_ced6ce6e-af8a-4922-b2e5-e1e914d5c5f8_0.png 1456w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_dramatic_and_realistic_digital_scene_symbolizin_ced6ce6e-af8a-4922-b2e5-e1e914d5c5f8_0-300x168.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_dramatic_and_realistic_digital_scene_symbolizin_ced6ce6e-af8a-4922-b2e5-e1e914d5c5f8_0-1024x574.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_dramatic_and_realistic_digital_scene_symbolizin_ced6ce6e-af8a-4922-b2e5-e1e914d5c5f8_0-768x430.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_dramatic_and_realistic_digital_scene_symbolizin_ced6ce6e-af8a-4922-b2e5-e1e914d5c5f8_0-18x10.png 18w\" sizes=\"(max-width: 1456px) 100vw, 1456px\" \/>\n\t\t\t\t\t\t\t \n\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-left text-col-padding my-auto\">\n\t\t\t\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"224\" data-end=\"284\"><span style=\"color: #cc5e24\"><strong data-start=\"228\" data-end=\"284\">SOC f\u00fcr den Mittelstand \u2013 einfach, sicher, bezahlbar<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t\t\t\t<h3 data-start=\"224\" data-end=\"284\"><\/h3>\n<p data-start=\"286\" data-end=\"613\">Nicht jedes Unternehmen braucht ein komplexes Gro\u00dfkonzern-SOC \u2013 aber jedes Unternehmen braucht Sichtbarkeit \u00fcber seine IT-Sicherheit.<\/p>\n<p data-start=\"286\" data-end=\"613\">Deshalb haben wir ein <strong data-start=\"442\" data-end=\"538\">SOC-Modell entwickelt, das speziell auf die Anforderungen des Mittelstands zugeschnitten ist<\/strong>: <strong data-start=\"542\" data-end=\"613\">klar strukturiert, schnell einsatzbereit und zu fairen Konditionen.<\/strong><\/p>\n<p data-start=\"964\" data-end=\"1139\"><strong data-start=\"964\" data-end=\"1077\">Keine komplizierten Tools, keine \u00fcberdimensionierten Prozesse \u2013 sondern ein pragmatischer Sicherheitsbaustein<\/strong>, der funktioniert und mitw\u00e4chst, wenn Ihr Unternehmen w\u00e4chst.<\/p>\n<p data-start=\"1141\" data-end=\"1294\"><strong data-start=\"1144\" data-end=\"1189\">Ideal f\u00fcr den Mittelstand<\/strong>, welcher seine IT-Sicherheit ernst nimmt \u2013 aber <strong data-start=\"1234\" data-end=\"1294\">nicht gleich ein ganzes Sicherheitsteam aufbauen will und kann.<\/strong><\/p>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<\/div>\n\n\n<style type=\"text\/css\">\n\t#text-bild-block_f1a30b1ec251bd32be3855f37936062e {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_f1a30b1ec251bd32be3855f37936062e\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"row flex-wrap-reverse\">\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-right text-col-padding my-auto\">\n\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"3416\" data-end=\"3472\"><span style=\"color: #cc5e24\"><strong data-start=\"3420\" data-end=\"3472\">SOC starten \u2013 jetzt Klarheit und Schutz schaffen<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t<h3 data-start=\"3416\" data-end=\"3472\"><\/h3>\n<p data-start=\"3474\" data-end=\"3653\">Sie m\u00f6chten erfahren, wie unser SOC Ihre IT-Sicherheit unterst\u00fctzt? Ob Anbindung an Ihr SIEM oder vollumf\u00e4ngliches Monitoring \u2013 wir beraten Sie gerne pers\u00f6nlich und unverbindlich.<\/p>\n<p data-start=\"3655\" data-end=\"3778\"><strong data-start=\"3658\" data-end=\"3710\">Transparenz ist der erste Schritt zur Kontrolle.<\/strong><\/p>\n<p data-start=\"3655\" data-end=\"3778\"><strong data-start=\"3716\" data-end=\"3778\">Jetzt Termin vereinbaren und Security Operations aufbauen.<\/strong><\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<a href=\"https:\/\/outlook.office365.com\/book\/neteNetworkExpertsGmbH@net-e.de\/\" ype=\"button\" class=\"btn btn-further rounded-0 p-0\">\n\n\t\t\t\t\t\t\t\t<div class=\"btn-more-wrap\">\n\t\t\t\t\t\t\t\t\t<span class=\"font-size-12 line-height-18 medium pr-2\">Book appointment<\/span>\n\n\t\t\t\t\t\t\t\t\t<svg class=\"arrow-right\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16.707\" height=\"8.707\" viewbox=\"0 0 16.707 8.707\">\n\t\t\t\t\t\t\t\t\t\t<g id=\"Gruppe_1125\" data-name=\"Gruppe 1125\" transform=\"translate(0 0.356)\">\n\t\t\t\t\t\t\t\t\t\t\t<g id=\"ic-roundabout-forward-section\" transform=\"translate(0)\">\n\t\t\t\t\t\t\t\t\t\t\t\t<path id=\"Pfad_31444\" data-name=\"Pfad 31444\" d=\"M454,.36,458,4.3,454,8.36\" transform=\"translate(-442 -0.36)\" fill=\"none\" stroke=\"#D27A4E\" stroke-miterlimit=\"10\" stroke-width=\"1\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t<line id=\"Linie_35\" data-name=\"Linie 35\" x1=\"16\" transform=\"translate(0 4)\" fill=\"none\" stroke=\"#D27A4E\" stroke-miterlimit=\"10\" stroke-width=\"1\" \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/g>\n\t\t\t\t\t\t\t\t\t\t<\/g>\n\t\t\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding right-bg-padding text-center right-bg\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1.png\" class=\"attachment-full img-right size-full img-right\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1-300x300.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1-150x150.png 150w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1-768x768.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1-12x12.png 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_cbc0a91ede4facef0cb664be81a2d4c0 {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_cbc0a91ede4facef0cb664be81a2d4c0\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: \">\n    \n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_f8ddb52e7bc2f92bc565c8f83df6ada1 {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_f8ddb52e7bc2f92bc565c8f83df6ada1\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: #ffffff\">\n    \n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_cbc0a91ede4facef0cb664be81a2d4c0 {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_cbc0a91ede4facef0cb664be81a2d4c0\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: \">\n    \n<\/div>","protected":false},"excerpt":{"rendered":"<p> [&#8230;]<\/p>\n<p><a class=\"btn btn-post-read-more mt-5 p-0 d-flex justify-content-center align-items-center\" href=\"https:\/\/net-e.de\/en\/soc\/\"><span class=\"ml-auto\">Vollst\u00e4ndiger Bericht<\/span> <span class=\"read-more-inner position-relative ml-auto\"><br \/>\n\t\t\t<svg class=\"position-absolute arrow-down\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"13.707\" height=\"16.707\" viewBox=\"0 0 13.707 16.707\">\n\t\t\t  <g id=\"ic-roundabout-forward\" transform=\"translate(13.351 -10) rotate(90)\">\n\t\t\t    <path id=\"Pfad_31444\" data-name=\"Pfad 31444\" d=\"M454,.36l6.5,6.4-6.5,6.6\" transform=\"translate(-434.5 -0.36)\" fill=\"none\" stroke=\"#fff\" stroke-miterlimit=\"10\" stroke-width=\"1\"\/>\n\t\t\t    <line id=\"Linie_35\" data-name=\"Linie 35\" x1=\"16\" transform=\"translate(10 6.5)\" fill=\"none\" stroke=\"#fff\" stroke-miterlimit=\"10\" stroke-width=\"1\"\/>\n\t\t\t  <\/g>\n\t\t\t<\/svg><br \/>\n\t\t\t<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/default-skeleton.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1971","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>soc | net.e<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/net-e.de\/en\/soc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"soc | net.e\" \/>\n<meta property=\"og:description\" content=\"[...]Vollst\u00e4ndiger Bericht\" \/>\n<meta property=\"og:url\" content=\"https:\/\/net-e.de\/en\/soc\/\" \/>\n<meta property=\"og:site_name\" content=\"net.e\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-29T07:40:42+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/net-e.de\\\/soc\\\/\",\"url\":\"https:\\\/\\\/net-e.de\\\/soc\\\/\",\"name\":\"soc | net.e\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#website\"},\"datePublished\":\"2025-07-28T19:47:38+00:00\",\"dateModified\":\"2025-07-29T07:40:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/net-e.de\\\/soc\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/net-e.de\\\/soc\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/net-e.de\\\/soc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/net-e.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"soc\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/net-e.de\\\/en\\\/\",\"name\":\"net.e\",\"description\":\"net.e - unabh\u00e4ngige IT Beratung aus Aurich\",\"publisher\":{\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/net-e.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#organization\",\"name\":\"net.e - Network Experts GmbH\",\"url\":\"https:\\\/\\\/net-e.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/net-e.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/nete-network-experts-logo-Kopie.png\",\"contentUrl\":\"https:\\\/\\\/net-e.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/nete-network-experts-logo-Kopie.png\",\"width\":4744,\"height\":2680,\"caption\":\"net.e - Network Experts GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"soc | net.e","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/net-e.de\/en\/soc\/","og_locale":"en_US","og_type":"article","og_title":"soc | net.e","og_description":"[...]Vollst\u00e4ndiger Bericht","og_url":"https:\/\/net-e.de\/en\/soc\/","og_site_name":"net.e","article_modified_time":"2025-07-29T07:40:42+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/net-e.de\/soc\/","url":"https:\/\/net-e.de\/soc\/","name":"soc | net.e","isPartOf":{"@id":"https:\/\/net-e.de\/en\/#website"},"datePublished":"2025-07-28T19:47:38+00:00","dateModified":"2025-07-29T07:40:42+00:00","breadcrumb":{"@id":"https:\/\/net-e.de\/soc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/net-e.de\/soc\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/net-e.de\/soc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/net-e.de\/"},{"@type":"ListItem","position":2,"name":"soc"}]},{"@type":"WebSite","@id":"https:\/\/net-e.de\/en\/#website","url":"https:\/\/net-e.de\/en\/","name":"net.e","description":"net.e - unabh\u00e4ngige IT Beratung aus Aurich","publisher":{"@id":"https:\/\/net-e.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/net-e.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/net-e.de\/en\/#organization","name":"net.e - Network Experts GmbH","url":"https:\/\/net-e.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/net-e.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/net-e.de\/wp-content\/uploads\/2022\/03\/nete-network-experts-logo-Kopie.png","contentUrl":"https:\/\/net-e.de\/wp-content\/uploads\/2022\/03\/nete-network-experts-logo-Kopie.png","width":4744,"height":2680,"caption":"net.e - Network Experts GmbH"},"image":{"@id":"https:\/\/net-e.de\/en\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/pages\/1971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/comments?post=1971"}],"version-history":[{"count":3,"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/pages\/1971\/revisions"}],"predecessor-version":[{"id":2053,"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/pages\/1971\/revisions\/2053"}],"wp:attachment":[{"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/media?parent=1971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}