{"id":1975,"date":"2025-07-28T22:03:41","date_gmt":"2025-07-28T20:03:41","guid":{"rendered":"https:\/\/net-e.de\/?page_id=1975"},"modified":"2025-07-29T09:37:27","modified_gmt":"2025-07-29T07:37:27","slug":"managed-siem-2","status":"publish","type":"page","link":"https:\/\/net-e.de\/en\/managed-siem-2\/","title":{"rendered":"managed-siem"},"content":{"rendered":"<style type=\"text\/css\">\n\t#hero-small-block_a33ab6bdd53a5cefc84010b6d7a501b4 {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Small Hero******************* -->\n<div id=\"hero-small-block_a33ab6bdd53a5cefc84010b6d7a501b4\" class=\"block-hero-small alignfull\">\n\n\t\t\t<div class=\"jumbotron jumbotron-small d-flex align-items-center text-center rounded-0 px-0\" style=\"background-image: url('https:\/\/net-e.de\/wp-content\/uploads\/2021\/12\/img_head-start.svg');\">\n\n\t\t\t<div class=\"container-fluid overlay\">\n\t\t\t\t<div class=\"row h-100\">\n\t\t\t\t\t<div class=\"col-12 overlay-col\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"container container-mt text-container\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-12\">\n\t\t\t\t\t\t<div class=\"font-small-hero-responsive regular text-white text-left w-75\">\n\t\t\t\t\t\t\t<b style=\"color:#cc5e24\">Managed SIEM \u2013 Sichtbarkeit schafft Sicherheit<\/b> \t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\n\t\t<\/div>\n\n\t\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_7e5f4ec5134bf61621c5c1501463d3dd {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_7e5f4ec5134bf61621c5c1501463d3dd\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: \">\n    \n\n<style type=\"text\/css\">\n\t#text-bild-block_2246bfbeaf905154ab7d19f63b869b34 {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_2246bfbeaf905154ab7d19f63b869b34\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"row flex-wrap-reverse\">\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-right text-col-padding my-auto\">\n\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"325\" data-end=\"377\"><span style=\"color: #cc5e24\"><strong data-start=\"329\" data-end=\"377\">Logdaten sind gut. Erkenntnisse sind besser.<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t<h3 data-start=\"325\" data-end=\"377\"><\/h3>\n<p data-start=\"379\" data-end=\"640\">Tag f\u00fcr Tag entstehen in Ihrer IT-Umgebung unz\u00e4hlige Logdaten \u2013 aus Firewalls, Servern, Cloud-Diensten, Anwendungen und Endger\u00e4ten. Doch ohne gezielte Analyse bleiben darin enthaltene Hinweise auf Angriffe, Fehlkonfigurationen oder Datenabfl\u00fcsse oft unentdeckt.<\/p>\n<p data-start=\"642\" data-end=\"919\">With our <strong data-start=\"654\" data-end=\"714\">Managed SIEM (Security Information and Event Management)<\/strong> holen wir Ordnung ins Datenchaos:<\/p>\n<p data-start=\"642\" data-end=\"919\">Wir sammeln, korrelieren und analysieren sicherheitsrelevante Ereignisse in Ihrer IT \u2013 und schaffen so die Grundlage f\u00fcr eine schnelle, wirksame Reaktion auf Bedrohungen.<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding right-bg-padding text-center right-bg\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1456\" height=\"816\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_illustration_of_an_IT_security_08aa1a22-a3e5-4e7a-a8c4-72ba367e5ccf_2.png\" class=\"attachment-full img-right size-full img-right\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_illustration_of_an_IT_security_08aa1a22-a3e5-4e7a-a8c4-72ba367e5ccf_2.png 1456w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_illustration_of_an_IT_security_08aa1a22-a3e5-4e7a-a8c4-72ba367e5ccf_2-300x168.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_illustration_of_an_IT_security_08aa1a22-a3e5-4e7a-a8c4-72ba367e5ccf_2-1024x574.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_illustration_of_an_IT_security_08aa1a22-a3e5-4e7a-a8c4-72ba367e5ccf_2-768x430.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_illustration_of_an_IT_security_08aa1a22-a3e5-4e7a-a8c4-72ba367e5ccf_2-18x10.png 18w\" sizes=\"(max-width: 1456px) 100vw, 1456px\" \/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_f57b748223bdfa30e44f84521acb877b {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_f57b748223bdfa30e44f84521acb877b\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: #ffffff\">\n    \n\n<style type=\"text\/css\">\n\t#text-bild-block_49f855b27a1692bb1951d8547ea5181e {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_49f855b27a1692bb1951d8547ea5181e\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t\t<div class=\"container\">\n\t\t\t\t\t<div class=\"row\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding left-bg-padding text-center left-bg\">\n\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1456\" height=\"816\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_scene_representing_IT_Incident_925e3d81-a105-4332-b97e-1738bc298a89_1.png\" class=\"attachment-full img-left size-full img-left\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_scene_representing_IT_Incident_925e3d81-a105-4332-b97e-1738bc298a89_1.png 1456w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_scene_representing_IT_Incident_925e3d81-a105-4332-b97e-1738bc298a89_1-300x168.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_scene_representing_IT_Incident_925e3d81-a105-4332-b97e-1738bc298a89_1-1024x574.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_scene_representing_IT_Incident_925e3d81-a105-4332-b97e-1738bc298a89_1-768x430.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_stylized_digital_scene_representing_IT_Incident_925e3d81-a105-4332-b97e-1738bc298a89_1-18x10.png 18w\" sizes=\"(max-width: 1456px) 100vw, 1456px\" \/>\n\t\t\t\t\t\t\t \n\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-left text-col-padding my-auto\">\n\t\t\t\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"926\" data-end=\"955\"><span style=\"color: #cc5e24\"><strong data-start=\"930\" data-end=\"955\">What is Managed SIEM?<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t\t\t\t<h3 data-start=\"926\" data-end=\"955\"><\/h3>\n<p data-start=\"957\" data-end=\"1302\">Ein SIEM-System sammelt Log- und Event-Daten aus verschiedensten Quellen, erkennt Muster, bewertet Risiken und alarmiert bei kritischen Vorf\u00e4llen.<\/p>\n<p data-start=\"957\" data-end=\"1302\">Im Managed-Modell \u00fcbernehmen wir f\u00fcr Sie den <strong data-start=\"1149\" data-end=\"1209\">Betrieb, die Wartung und die kontinuierliche Optimierung<\/strong> des Systems \u2013 inklusive Anbindung Ihrer Infrastruktur, Regelpflege und Auswertung der Daten.<\/p>\n<p data-start=\"1304\" data-end=\"1414\"><strong data-start=\"1304\" data-end=\"1321\">Das Ergebnis:<\/strong> Weniger Blindspots, mehr \u00dcbersicht und echte Entscheidungsgrundlagen f\u00fcr Ihre IT-Sicherheit.<\/p>\n<hr data-start=\"1416\" data-end=\"1419\" \/>\n<h3 data-start=\"1421\" data-end=\"1470\"><span style=\"color: #cc5e24\"><strong data-start=\"1425\" data-end=\"1470\">Unsere Leistungen im Bereich Managed SIEM<\/strong><\/span><\/h3>\n<ul data-start=\"1472\" data-end=\"2263\">\n<li data-start=\"1472\" data-end=\"1593\">\n<p data-start=\"1474\" data-end=\"1593\"><strong data-start=\"1474\" data-end=\"1524\">Einrichtung &amp; Konfiguration eines SIEM-Systems<\/strong><\/p>\n<\/li>\n<li data-start=\"1595\" data-end=\"1733\">\n<p data-start=\"1597\" data-end=\"1733\"><strong data-start=\"1597\" data-end=\"1633\">Anbindung relevanter Log-Quellen<\/strong><br data-start=\"1633\" data-end=\"1636\" \/>z.\u202fB. Firewalls, Server, Active Directory, VPN, Microsoft 365, Endpoints, Netzwerkkomponenten<\/p>\n<\/li>\n<li data-start=\"1735\" data-end=\"1857\">\n<p data-start=\"1737\" data-end=\"1857\"><strong data-start=\"1737\" data-end=\"1791\">Entwicklung &amp; Pflege von Use Cases und Alarmregeln<\/strong><br data-start=\"1791\" data-end=\"1794\" \/>Individuell auf Ihre Umgebung und Bedrohungslage abgestimmt<\/p>\n<\/li>\n<li data-start=\"1859\" data-end=\"2000\">\n<p data-start=\"1861\" data-end=\"2000\"><strong data-start=\"1861\" data-end=\"1933\">24\/7-\u00dcberwachung &amp; Alarmierung bei sicherheitskritischen Ereignissen<\/strong><br data-start=\"1933\" data-end=\"1936\" \/>Fr\u00fchzeitige Erkennung von Angriffsmustern oder Fehlverhalten<\/p>\n<\/li>\n<li><strong data-start=\"1861\" data-end=\"1933\">Automatische Angriffserkennung und Reaktion (MDR)<\/strong><br data-start=\"1933\" data-end=\"1936\" \/>KI-Gest\u00fctzte Angriffserkennung mit automatischer Reaktion (Responden)<\/li>\n<li data-start=\"2002\" data-end=\"2118\">\n<p data-start=\"2004\" data-end=\"2118\"><strong data-start=\"2004\" data-end=\"2056\">Regelm\u00e4\u00dfige Reports &amp; verst\u00e4ndliche Auswertungen<\/strong><br data-start=\"2056\" data-end=\"2059\" \/>F\u00fcr IT-Leitung, Gesch\u00e4ftsf\u00fchrung oder Compliance-Zwecke<\/p>\n<\/li>\n<li data-start=\"2120\" data-end=\"2263\">\n<p data-start=\"2122\" data-end=\"2263\"><strong data-start=\"2122\" data-end=\"2172\">Unterst\u00fctzung bei Incident Response &amp; Forensik<\/strong><br data-start=\"2172\" data-end=\"2175\" \/>Auf Wunsch direkte Einbindung in bestehende Prozesse oder \u00dcbergabe an unser SOC-Team<\/p>\n<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<\/div>\n\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_f57b748223bdfa30e44f84521acb877b {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_f57b748223bdfa30e44f84521acb877b\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: #ffffff\">\n    \n\n<style type=\"text\/css\">\n\t#text-bild-block_0eb2980360e62cef017d2254101fc9a9 {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_0eb2980360e62cef017d2254101fc9a9\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"row flex-wrap-reverse\">\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-right text-col-padding my-auto\">\n\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"2270\" data-end=\"2307\"><span style=\"color: #cc5e24\"><strong data-start=\"2274\" data-end=\"2307\">Warum Managed SIEM mit net.e?<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t<h3 data-start=\"2270\" data-end=\"2307\"><\/h3>\n<ul>\n<li data-start=\"2309\" data-end=\"2759\"><strong data-start=\"2311\" data-end=\"2374\">Langj\u00e4hrige Erfahrung im Aufbau &amp; Betrieb von SIEM-L\u00f6sungen<\/strong><\/li>\n<li data-start=\"2309\" data-end=\"2759\"><strong data-start=\"2379\" data-end=\"2414\">Herstellerunabh\u00e4ngig &amp; flexibel<\/strong><\/li>\n<li data-start=\"2309\" data-end=\"2759\"><strong data-start=\"2514\" data-end=\"2554\">Ma\u00dfgeschneidert statt Standardregeln<\/strong><\/li>\n<li data-start=\"2309\" data-end=\"2759\"><strong data-start=\"2606\" data-end=\"2690\">Schnelle Implementierung, skalierbare Pakete \u2013 f\u00fcr den Mittelstand geeignet<\/strong><\/li>\n<li data-start=\"2309\" data-end=\"2759\"><strong data-start=\"2695\" data-end=\"2759\">Enge Verzahnung mit unserem SOC- und Incident-Response-Team<\/strong><\/li>\n<\/ul>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding right-bg-padding text-center right-bg\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1456\" height=\"816\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_clean_digital_illustration_showing_a_modular_se_ece66b5c-bc17-4de5-989b-887f6ad831c4_1.png\" class=\"attachment-full img-right size-full img-right\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_clean_digital_illustration_showing_a_modular_se_ece66b5c-bc17-4de5-989b-887f6ad831c4_1.png 1456w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_clean_digital_illustration_showing_a_modular_se_ece66b5c-bc17-4de5-989b-887f6ad831c4_1-300x168.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_clean_digital_illustration_showing_a_modular_se_ece66b5c-bc17-4de5-989b-887f6ad831c4_1-1024x574.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_clean_digital_illustration_showing_a_modular_se_ece66b5c-bc17-4de5-989b-887f6ad831c4_1-768x430.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_clean_digital_illustration_showing_a_modular_se_ece66b5c-bc17-4de5-989b-887f6ad831c4_1-18x10.png 18w\" sizes=\"(max-width: 1456px) 100vw, 1456px\" \/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n\n<style type=\"text\/css\">\n\t#text-bild-block_7c8569ec30c38b0c5ea86354510fb436 {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_7c8569ec30c38b0c5ea86354510fb436\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t\t<div class=\"container\">\n\t\t\t\t\t<div class=\"row\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding left-bg-padding text-center left-bg\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1456\" height=\"816\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_dramatic_and_realistic_digital_scene_symbolizin_ced6ce6e-af8a-4922-b2e5-e1e914d5c5f8_0.png\" class=\"attachment-full img-left size-full img-left\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_dramatic_and_realistic_digital_scene_symbolizin_ced6ce6e-af8a-4922-b2e5-e1e914d5c5f8_0.png 1456w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_dramatic_and_realistic_digital_scene_symbolizin_ced6ce6e-af8a-4922-b2e5-e1e914d5c5f8_0-300x168.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_dramatic_and_realistic_digital_scene_symbolizin_ced6ce6e-af8a-4922-b2e5-e1e914d5c5f8_0-1024x574.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_dramatic_and_realistic_digital_scene_symbolizin_ced6ce6e-af8a-4922-b2e5-e1e914d5c5f8_0-768x430.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_A_dramatic_and_realistic_digital_scene_symbolizin_ced6ce6e-af8a-4922-b2e5-e1e914d5c5f8_0-18x10.png 18w\" sizes=\"(max-width: 1456px) 100vw, 1456px\" \/>\n\t\t\t\t\t\t\t \n\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-left text-col-padding my-auto\">\n\t\t\t\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"2766\" data-end=\"2808\"><span style=\"color: #cc5e24\"><strong data-start=\"2770\" data-end=\"2808\">F\u00fcr wen ist ein Managed SIEM geeignet?<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t\t\t\t<h3 data-start=\"2766\" data-end=\"2808\"><\/h3>\n<p data-start=\"2810\" data-end=\"2862\">Unser Managed SIEM richtet sich an Unternehmen, die:<\/p>\n<ul data-start=\"2863\" data-end=\"3149\">\n<li data-start=\"2863\" data-end=\"2921\">\n<p data-start=\"2865\" data-end=\"2921\">sensible Daten und kritische Infrastrukturen betreiben<\/p>\n<\/li>\n<li data-start=\"2922\" data-end=\"3005\">\n<p data-start=\"2924\" data-end=\"3005\">Compliance-Anforderungen (z.\u202fB. ISO 27001, DSGVO, NIS2, KRITIS) erf\u00fcllen m\u00fcssen<\/p>\n<\/li>\n<li data-start=\"3006\" data-end=\"3067\">\n<p data-start=\"3008\" data-end=\"3067\">Logdaten nicht nur sammeln, sondern gezielt nutzen wollen<\/p>\n<\/li>\n<li data-start=\"3006\" data-end=\"3067\">Weitere Schutzmechanismen in Ihrer Infrastruktur implementieren wollen<\/li>\n<li data-start=\"3006\" data-end=\"3067\">Einen ersten Schritt in Richtung SOC gehen wollen<\/li>\n<li data-start=\"3068\" data-end=\"3149\">\n<p data-start=\"3070\" data-end=\"3149\">keinen eigenen SIEM-Betrieb aufbauen m\u00f6chten, aber volle Transparenz w\u00fcnschen<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"3151\" data-end=\"3154\" \/>\n<h3 data-start=\"3156\" data-end=\"3194\"><span style=\"color: #ff9900\"><strong data-start=\"3160\" data-end=\"3194\">Ihre IT spricht \u2013 wir h\u00f6ren zu<\/strong><\/span><\/h3>\n<p data-start=\"3196\" data-end=\"3440\">In Ihren Logdaten steckt wertvolle Information. Mit unserem Managed SIEM machen wir daraus <strong data-start=\"3287\" data-end=\"3325\">relevante Sicherheits\u00aderkenntnisse<\/strong> \u2013 und schaffen die Basis f\u00fcr schnelle Reaktion, strategische Entscheidungen und nachhaltige Sicherheitsstrategien.<\/p>\n<p data-start=\"3442\" data-end=\"3563\"><strong data-start=\"3445\" data-end=\"3563\">Sprechen Sie uns an \u2013 wir beraten Sie gerne zu Ihren Anforderungen und zeigen, wie ein SIEM f\u00fcr Sie arbeiten kann.<\/strong><\/p>\n\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<\/div>\n\n\n<style type=\"text\/css\">\n\t#text-bild-block_50d9df89532499fe00256f9b7336413c {\n\t\t\/* Add styles that use ACF values here *\/\n\t}\n<\/style>\n\n<!-- ******************* Block: Text\/Bild ******************* -->\n<div id=\"text-bild-block_50d9df89532499fe00256f9b7336413c\" class=\"block-text-bild alignwide\">\n\n\t\t\t\t<div class=\"overflow-hidden\">\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"row flex-wrap-reverse\">\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 padding-right text-col-padding my-auto\">\n\t\t\t\t\t\t<div class=\"font-size-13 line-height-25 regular text-lightgrey\"><\/div>\n\t\t\t\t\t\t<div class=\"title-width\"><p data-start=\"3625\" data-end=\"3702\"><span style=\"color: #cc5e24\"><strong data-start=\"3629\" data-end=\"3702\">Mehr Sicherheit durch mehr \u00dcberblick \u2013 jetzt starten mit einem Managed SIEM<\/strong><\/span><\/p>\n<\/div>\n\t\t\t\t\t\t<hr class=\"hr-lightgrey\">\n\t\t\t\t\t\t<div class=\"description-width\">\n\t\t\t\t\t\t\t<h3 data-start=\"3625\" data-end=\"3702\"><\/h3>\n<p data-start=\"3704\" data-end=\"3890\">Sie m\u00f6chten wissen, welche SIEM-L\u00f6sung zu Ihrem Unternehmen passt? In einem <strong data-start=\"3780\" data-end=\"3817\">unverbindlichen Beratungsgespr\u00e4ch<\/strong>kl\u00e4ren wir Ziele, technische Rahmenbedingungen und m\u00f6gliche Anbindungen.<\/p>\n<p data-start=\"3892\" data-end=\"4018\"><strong data-start=\"3895\" data-end=\"3935\">Sicherheit beginnt mit Sichtbarkeit.<\/strong><\/p>\n<p data-start=\"3892\" data-end=\"4018\"><strong data-start=\"3941\" data-end=\"4018\">Jetzt Termin vereinbaren \u2013 und Logdaten in echte Erkenntnisse verwandeln.<\/strong><\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<a href=\"https:\/\/outlook.office365.com\/book\/neteNetworkExpertsGmbH@net-e.de\/\" ype=\"button\" class=\"btn btn-further rounded-0 p-0\">\n\n\t\t\t\t\t\t\t\t<div class=\"btn-more-wrap\">\n\t\t\t\t\t\t\t\t\t<span class=\"font-size-12 line-height-18 medium pr-2\">Book appointment<\/span>\n\n\t\t\t\t\t\t\t\t\t<svg class=\"arrow-right\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16.707\" height=\"8.707\" viewbox=\"0 0 16.707 8.707\">\n\t\t\t\t\t\t\t\t\t\t<g id=\"Gruppe_1125\" data-name=\"Gruppe 1125\" transform=\"translate(0 0.356)\">\n\t\t\t\t\t\t\t\t\t\t\t<g id=\"ic-roundabout-forward-section\" transform=\"translate(0)\">\n\t\t\t\t\t\t\t\t\t\t\t\t<path id=\"Pfad_31444\" data-name=\"Pfad 31444\" d=\"M454,.36,458,4.3,454,8.36\" transform=\"translate(-442 -0.36)\" fill=\"none\" stroke=\"#D27A4E\" stroke-miterlimit=\"10\" stroke-width=\"1\" \/>\n\t\t\t\t\t\t\t\t\t\t\t\t<line id=\"Linie_35\" data-name=\"Linie 35\" x1=\"16\" transform=\"translate(0 4)\" fill=\"none\" stroke=\"#D27A4E\" stroke-miterlimit=\"10\" stroke-width=\"1\" \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/g>\n\t\t\t\t\t\t\t\t\t\t<\/g>\n\t\t\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/a>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"col-xl-6 col-lg-6 col-md-12 col-sm-12 col-12 img-col-margin img-col-padding right-bg-padding text-center right-bg\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1.png\" class=\"attachment-full img-right size-full img-right\" alt=\"\" srcset=\"https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1.png 1024w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1-300x300.png 300w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1-150x150.png 150w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1-768x768.png 768w, https:\/\/net-e.de\/wp-content\/uploads\/2025\/07\/u3658113938_it_team_in_the_wadden_sea_-v_6.1_6e271f91-5d05-4c15-bc79-99a142da8c93_1-12x12.png 12w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t<\/div>\n\n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_7e5f4ec5134bf61621c5c1501463d3dd {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_7e5f4ec5134bf61621c5c1501463d3dd\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: \">\n    \n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_f57b748223bdfa30e44f84521acb877b {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_f57b748223bdfa30e44f84521acb877b\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: #ffffff\">\n    \n<\/div>\n\n\n<style type=\"text\/css\">\n    #section-block_7e5f4ec5134bf61621c5c1501463d3dd {\n        \/* Add styles that use ACF values here *\/\n    }\n<\/style>\n\n<!-- ******************* Block: Section ******************* -->\n<div id=\"section-block_7e5f4ec5134bf61621c5c1501463d3dd\" class=\"block-section alignwide mb-0 mt-0 pb-0 pt-0\" style=\"background-color: \">\n    \n<\/div>","protected":false},"excerpt":{"rendered":"<p> [&#8230;]<\/p>\n<p><a class=\"btn btn-post-read-more mt-5 p-0 d-flex justify-content-center align-items-center\" href=\"https:\/\/net-e.de\/en\/managed-siem-2\/\"><span class=\"ml-auto\">Vollst\u00e4ndiger Bericht<\/span> <span class=\"read-more-inner position-relative ml-auto\"><br \/>\n\t\t\t<svg class=\"position-absolute arrow-down\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"13.707\" height=\"16.707\" viewBox=\"0 0 13.707 16.707\">\n\t\t\t  <g id=\"ic-roundabout-forward\" transform=\"translate(13.351 -10) rotate(90)\">\n\t\t\t    <path id=\"Pfad_31444\" data-name=\"Pfad 31444\" d=\"M454,.36l6.5,6.4-6.5,6.6\" transform=\"translate(-434.5 -0.36)\" fill=\"none\" stroke=\"#fff\" stroke-miterlimit=\"10\" stroke-width=\"1\"\/>\n\t\t\t    <line id=\"Linie_35\" data-name=\"Linie 35\" x1=\"16\" transform=\"translate(10 6.5)\" fill=\"none\" stroke=\"#fff\" stroke-miterlimit=\"10\" stroke-width=\"1\"\/>\n\t\t\t  <\/g>\n\t\t\t<\/svg><br \/>\n\t\t\t<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/default-skeleton.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1975","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>managed-siem | net.e<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/net-e.de\/en\/managed-siem-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"managed-siem | net.e\" \/>\n<meta property=\"og:description\" content=\"[...]Vollst\u00e4ndiger Bericht\" \/>\n<meta property=\"og:url\" content=\"https:\/\/net-e.de\/en\/managed-siem-2\/\" \/>\n<meta property=\"og:site_name\" content=\"net.e\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-29T07:37:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/net-e.de\\\/managed-siem-2\\\/\",\"url\":\"https:\\\/\\\/net-e.de\\\/managed-siem-2\\\/\",\"name\":\"managed-siem | net.e\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#website\"},\"datePublished\":\"2025-07-28T20:03:41+00:00\",\"dateModified\":\"2025-07-29T07:37:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/net-e.de\\\/managed-siem-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/net-e.de\\\/managed-siem-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/net-e.de\\\/managed-siem-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/net-e.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"managed-siem\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/net-e.de\\\/en\\\/\",\"name\":\"net.e\",\"description\":\"net.e - unabh\u00e4ngige IT Beratung aus Aurich\",\"publisher\":{\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/net-e.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#organization\",\"name\":\"net.e - Network Experts GmbH\",\"url\":\"https:\\\/\\\/net-e.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/net-e.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/nete-network-experts-logo-Kopie.png\",\"contentUrl\":\"https:\\\/\\\/net-e.de\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/nete-network-experts-logo-Kopie.png\",\"width\":4744,\"height\":2680,\"caption\":\"net.e - Network Experts GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/net-e.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"managed-siem | net.e","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/net-e.de\/en\/managed-siem-2\/","og_locale":"en_US","og_type":"article","og_title":"managed-siem | net.e","og_description":"[...]Vollst\u00e4ndiger Bericht","og_url":"https:\/\/net-e.de\/en\/managed-siem-2\/","og_site_name":"net.e","article_modified_time":"2025-07-29T07:37:27+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/net-e.de\/managed-siem-2\/","url":"https:\/\/net-e.de\/managed-siem-2\/","name":"managed-siem | net.e","isPartOf":{"@id":"https:\/\/net-e.de\/en\/#website"},"datePublished":"2025-07-28T20:03:41+00:00","dateModified":"2025-07-29T07:37:27+00:00","breadcrumb":{"@id":"https:\/\/net-e.de\/managed-siem-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/net-e.de\/managed-siem-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/net-e.de\/managed-siem-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/net-e.de\/"},{"@type":"ListItem","position":2,"name":"managed-siem"}]},{"@type":"WebSite","@id":"https:\/\/net-e.de\/en\/#website","url":"https:\/\/net-e.de\/en\/","name":"net.e","description":"net.e - unabh\u00e4ngige IT Beratung aus Aurich","publisher":{"@id":"https:\/\/net-e.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/net-e.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/net-e.de\/en\/#organization","name":"net.e - Network Experts GmbH","url":"https:\/\/net-e.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/net-e.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/net-e.de\/wp-content\/uploads\/2022\/03\/nete-network-experts-logo-Kopie.png","contentUrl":"https:\/\/net-e.de\/wp-content\/uploads\/2022\/03\/nete-network-experts-logo-Kopie.png","width":4744,"height":2680,"caption":"net.e - Network Experts GmbH"},"image":{"@id":"https:\/\/net-e.de\/en\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/pages\/1975","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/comments?post=1975"}],"version-history":[{"count":3,"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/pages\/1975\/revisions"}],"predecessor-version":[{"id":2049,"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/pages\/1975\/revisions\/2049"}],"wp:attachment":[{"href":"https:\/\/net-e.de\/en\/wp-json\/wp\/v2\/media?parent=1975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}