{"id":28119,"date":"2025-05-28T12:49:38","date_gmt":"2025-05-28T10:49:38","guid":{"rendered":"https:\/\/www.cubro.com\/en\/?page_id=28119"},"modified":"2025-09-02T19:02:22","modified_gmt":"2025-09-02T17:02:22","slug":"cybersecurity-visibility-ger","status":"publish","type":"page","link":"https:\/\/www.cubro.com\/en\/why-cubro\/cybersecurity-visibility-ger\/","title":{"rendered":"Cybersicherheit"},"content":{"rendered":"\n<div class=\"wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-none getwid-padding-bottom-none\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-themepunch-revslider revslider\" data-modal=\"false\" data-slidertitle=\"cybersec header germ\" style=\"\">\n\t\t\t\t<p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t\t<sr7-module data-alias=\"cybersec-header-1\" data-id=\"44\" id=\"SR7_44_1\" class=\"rs-respect-topbar rs-ov-hidden\" data-version=\"6.7.51\">\n\t\t\t\t\t<sr7-adjuster><\/sr7-adjuster>\n\t\t\t\t\t<sr7-content>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_44_1-53\" data-key=\"53\">\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_44_1-53-2\" class=\"sr7-layer\">Maximierung der<br \/>\nCybersicherheits-<br \/>\nEffizienz<\/sr7-txt>\n\t\t\t\t\t\t\t<h1 id=\"SR7_44_1-53-8\" class=\"sr7-layer\">Transparenz in<\/h1>\n\t\t\t\t\t\t\t<h1 id=\"SR7_44_1-53-11\" class=\"sr7-layer\">Cybersicherheit<\/h1>\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_44_1-53-19\" class=\"sr7-layer\">Cubro ist kein Anbieter von Cybersicherheit \u2013 wir sorgen mit kosteneffizienter, anbieterneutraler Netzwerktransparenz f\u00fcr eine bessere Leistung Ihrer Tools.<\/sr7-txt>\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_44_1-54\" data-key=\"54\">\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t<\/sr7-content>\n\t\t\t\t<\/sr7-module>\n\t\t\t\t<script>\n\t\t\t\t\twindow.SR7 ??={};SR7.PMH ??={}; SR7.PMH[\"SR7_44_1\"] = {cn:100,state:false,fn: function() { if (window._tpt!==undefined && window._tpt.prepareModuleHeight !== undefined) {  _tpt.prepareModuleHeight({id:\"SR7_44_1\",el:[550,550,600,600,600],type:'hero',shdw:'0',gh:[550,550,600,600,600],gw:[1240,1240,1024,778,480],vpt:['-100px&#039;,&#039;-100px&#039;,&#039;-100px&#039;,&#039;-100px&#039;,&#039;-100px'],size:{fullWidth:true, fullHeight:false},mh:'0',onh:0,onw:0,bg:{color:'{\"type\":\"solid\",\"orig\":\"#c4beb4\",\"string\":\"rgba(196, 190, 180, 1)\"}'}});   SR7.PMH[\"SR7_44_1\"].state=true;} else if(SR7.PMH[\"SR7_44_1\"].cn-->0)\tsetTimeout( SR7.PMH[\"SR7_44_1\"].fn,19);}};SR7.PMH[\"SR7_44_1\" ].fn();\n\t\t\t\t<\/script>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#4d6679\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1280\" height=\"462\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/cypersecurity-visibility-ger-1280x462.png\" alt=\"\" class=\"wp-image-28688\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/cypersecurity-visibility-ger-1280x462.png 1280w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/cypersecurity-visibility-ger-480x173.png 480w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/cypersecurity-visibility-ger-240x87.png 240w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/cypersecurity-visibility-ger-768x277.png 768w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/cypersecurity-visibility-ger.png 1442w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-m wp-block-getwid-section\"><div class=\"wp-block-getwid-section__wrapper\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\"><nav aria-label=\"breadcrumbs\" class=\"rank-math-breadcrumb\"><p><span class=\"last\">Home<\/span><\/p><\/nav>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-bottom-none\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center has-text-color has-link-color wp-elements-2af9fd0e7fd9e0dcddfec62563597958 is-layout-flow wp-block-column-is-layout-flow\" style=\"color:#0f406e\"><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:80%\">\n<div class=\"wp-block-getwid-advanced-heading\" id=\"g84ff29bc4426\"><h2 class=\"wp-block-getwid-advanced-heading__content has-text-color\" style=\"text-align:center;font-weight:normal;color:#0f406e\">Ihre Cyber-Sicherheitsstrategie beginnt hier<\/h2><\/div>\n\n\n\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" style=\"font-size:22px\"><span class=\"wp-block-getwid-advanced-heading__content\" style=\"line-height:28px\">Jedes Unternehmen ben\u00f6tigt Cybersicherheit, aber viele haben Schwierigkeiten bei der Auswahl, Integration und Optimierung der richtigen L\u00f6sungen. <strong>Die Herausforderung?<\/strong><\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center has-text-color has-link-color wp-elements-2af9fd0e7fd9e0dcddfec62563597958 is-layout-flow wp-block-column-is-layout-flow\" style=\"color:#0f406e\"><\/div>\n<\/div>\n\n\n\n<div style=\"height:21px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-22dace48 wp-block-columns-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-column is-vertically-aligned-center has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#c0967c;padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\"><strong>Anbieterabh\u00e4ngigkeit<\/strong> \u2013 der Wechsel oder das Testen von Cybersicherheitstools ist schwierig, wenn die Infrastruktur von einem einzigen Anbieter abh\u00e4ngig ist.<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#c0967c;padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\"><strong>Kosten\u00fcberschreitungen<\/strong> \u2013 Cyber-Sicherheits-Tools ben\u00f6tigen Netzwerkdaten, um b\u00f6sartigen Datenverkehr zu erkennen. Wenn die Tools jedoch mehr Netzwerkverkehr empfangen, entstehen h\u00f6here Kosten f\u00fcr Sicherheitstools, was zu teuren Lizenzen und Leistungsproblemen f\u00fchrt.<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#c0967c;padding-top:var(--wp--preset--spacing--40);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--40);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\"><strong>Schwieriger Tool-Vergleich<\/strong> \u2013 das Einrichten einer Testumgebung ist nicht einfach, sodass ein Vergleich der L\u00f6sungen vor der Entscheidung schwierig ist.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull getwid-margin-top-normal\"><div class=\"wp-block-getwid-section__wrapper\" style=\"padding-top:30px;padding-bottom:10px\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#bed4e2\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" style=\"font-size:25px\"><span class=\"wp-block-getwid-advanced-heading__content\" style=\"text-align:center;line-height:35px\">Cubro ist kein Anbieter von Cyber-Sicherheits-Tools. Wir sorgen daf\u00fcr, dass die Tools in Bezug auf Leistung und Kosten effizient laufen, indem wir eine herstellerneutrale Netzwerk-Transparenz-Schicht bereitstellen, die Unternehmen unterst\u00fctzt.<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40%\"><div class=\"wp-block-image\">\n<figure class=\"alignleft size-large is-resized\"><img decoding=\"async\" width=\"1280\" height=\"1077\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Image-bulb-globe-1280x1077.png\" alt=\"\" class=\"wp-image-27921\" style=\"width:362px;height:auto\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Image-bulb-globe-1280x1077.png 1280w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Image-bulb-globe-480x404.png 480w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Image-bulb-globe-240x202.png 240w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Image-bulb-globe-768x646.png 768w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Image-bulb-globe.png 1500w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/figure><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull getwid-margin-top-none getwid-margin-bottom-normal\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large getwid-padding-bottom-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\" style=\"background-image:url('https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Images-bg.png')\"><div class=\"wp-block-getwid-section__background-image-wrapper\"><img decoding=\"async\" class=\"wp-block-getwid-section__background-image\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Images-bg.png\" alt=\"\"\/><\/div><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#bed5e3;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content\"><strong>Bleiben Sie herstellerunabh\u00e4ngig und zukunftssicher<\/strong> \u2013 Mit Cubro k\u00f6nnen Unternehmen Cyber-Sicherheits-Tools einfach wechseln, ohne ihre Infrastruktur neu zu gestalten. Das sorgt f\u00fcr langfristige Flexibilit\u00e4t und Kosteneinsparungen.<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#bed5e3;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content\"><strong>Mehrere Sicherheits-Tools parallel ausf\u00fchren<\/strong> \u2013 Mit Cubro k\u00f6nnen Unternehmen denselben Datenverkehr gleichzeitig an verschiedene Sicherheits-Tools weiterleiten und so die L\u00f6sungen verschiedener Anbieter direkt miteinander vergleichen.<\/span><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#bed5e3;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content\"><strong>Cyber-Sicherheitskosten optimieren<\/strong> \u2013 Sicherheits-Tools werden nach Bandbreite und Funktionen abgerechnet. Cubro filtert und optimiert den Netzwerkdatenverkehr, reduziert Fehlalarme und stellt sicher, dass die Tools nur die relevantesten Daten analysieren. Dies f\u00fchrt von Anfang an zu niedrigeren Lizenz- und Betriebskosten.<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#bed5e3;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content\"><strong>Verbessert die Leistung und Reaktionszeit<\/strong> \u2013 Durch die Reduzierung unn\u00f6tiger Datenverarbeitung hilft Cubro Sicherheits-Tools, schneller und effizienter zu arbeiten, sodass Bedrohungen in Echtzeit erkannt und abgewehrt werden k\u00f6nnen.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper\" style=\"padding-top:30px;padding-bottom:30px\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" id=\"\" style=\"font-size:30px\"><h3 class=\"wp-block-getwid-advanced-heading__content has-text-color\" style=\"text-align:center;font-weight:normal;color:#0f406e\">Warum ist Netzwerktransparenz f\u00fcr die Cybersicherheit wichtig?<\/h3><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-getwid-advanced-heading\"><p class=\"wp-block-getwid-advanced-heading__content\"><strong>H\u00f6herer ROI<\/strong> \u2013 Eine einzige Investition in Cubro kann die langfristigen Cyber-Sicherheitskosten durch die Reduzierung von Lizenz-, Bandbreiten- und Wartungskosten senken.<\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-getwid-advanced-heading\"><p class=\"wp-block-getwid-advanced-heading__content\"><strong>Bessere Sicherheitsergebnisse<\/strong> \u2013 Sicherheits-Tools funktionieren besser, wenn sie nur relevanten Datenverkehr erhalten, wodurch die allgemeine Erkennung und Reaktion auf Bedrohungen verbessert wird.<\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-getwid-advanced-heading\"><p class=\"wp-block-getwid-advanced-heading__content\"><strong>Strategische IT-Investitionen<\/strong> \u2013 anstatt zu viel f\u00fcr Lizenzen f\u00fcr gr\u00f6\u00dfere Sicherheits-Tools auszugeben, k\u00f6nnen Unternehmen ihr Budget effektiver einsetzen.<\/p><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-getwid-section\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-medium getwid-padding-bottom-medium getwid-padding-left-normal getwid-padding-right-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#bed5e3\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-dark-bg-color\">Durch die Bereitstellung einer unabh\u00e4ngigen Netzwerktransparenzschicht gibt Cubro Unternehmen mehr Kontrolle \u00fcber ihre Cyber-Sicherheitsstrategie und sorgt f\u00fcr Skalierbarkeit, Flexibilit\u00e4t und Kosteneinsparungen, ohne die Sicherheit zu beeintr\u00e4chtigen.<\/span><\/div>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" style=\"font-size:55px\"><h2 class=\"wp-block-getwid-advanced-heading__content has-text-color\" style=\"text-align:center;color:#0f406e\">Ebook Introduction<\/h2><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/CUB-CybersecVisibility-Ebook.pdf\" target=\"_blank\" rel=\" noreferrer noopener\"><img decoding=\"async\" width=\"1280\" height=\"797\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/CUB-CybersecVisibility-EbookCover-Download-1280x797.jpg\" alt=\"\" class=\"wp-image-28064\" style=\"width:469px;height:auto\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/CUB-CybersecVisibility-EbookCover-Download-1280x797.jpg 1280w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/CUB-CybersecVisibility-EbookCover-Download-480x299.jpg 480w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/CUB-CybersecVisibility-EbookCover-Download-240x149.jpg 240w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/CUB-CybersecVisibility-EbookCover-Download-768x478.jpg 768w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/CUB-CybersecVisibility-EbookCover-Download.jpg 1502w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-medium getwid-padding-bottom-medium\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#91acbf\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1194\" height=\"1280\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Images-wall-1194x1280.png\" alt=\"\" class=\"wp-image-27933\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Images-wall-1194x1280.png 1194w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Images-wall-448x480.png 448w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Images-wall-224x240.png 224w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Images-wall-768x823.png 768w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Images-wall-1433x1536.png 1433w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Images-wall.png 1500w\" sizes=\"(max-width: 1194px) 100vw, 1194px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" style=\"font-size:25px\"><h3 class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\" style=\"text-align:center\">Wie Netzwerktransparenz die Unternehmenssicherheit verbessert<\/h3><\/div>\n\n\n\n<p class=\"has-nv-site-bg-color has-text-color has-link-color wp-elements-13c60cca01898476d297af411e417aad\">Mit der Expansion von Unternehmen durch Cloud-Nutzung, Remote-Mitarbeiter, IoT-Ger\u00e4te und die Weiterentwicklung von Rechenzentren wird es immer schwieriger, ihre Netzwerkumgebungen zu \u00fcberwachen und zu sch\u00fctzen. Herk\u00f6mmliche Tools haben oft Schwierigkeiten, mit dieser Gr\u00f6\u00dfe und Komplexit\u00e4t Schritt zu halten, was zu uneinheitlicher Transparenz und potenziellen Schwachstellen f\u00fchrt.<\/p>\n\n\n\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" style=\"font-size:25px\"><h3 class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\" style=\"text-align:center\">Was ist Cybersicherheits\u00fcberwachung?<\/h3><\/div>\n\n\n\n<p class=\"has-nv-site-bg-color has-text-color has-link-color wp-elements-a5d485b6e3274eb43a84b8aac24b8b58\">Cybersicherheits\u00fcberwachung ist der automatisierte Prozess der Erfassung und Analyse von Indikatoren f\u00fcr potenzielle Sicherheitsbedrohungen und deren Einstufung mit geeigneten Ma\u00dfnahmen.<\/p>\n\n\n\n<p class=\"has-nv-site-bg-color has-text-color has-link-color wp-elements-467c44f8293da797d0ef0dd6588f4488\">Sicherheitsteams haben immer mehr Arbeit und Verantwortung, um die allgemeine Gesundheit, Leistung und Sicherheit der Infrastruktur eines Unternehmens aufrechtzuerhalten, da sich Technologien weiterentwickeln, die Komplexit\u00e4t zunimmt und Unternehmensnetzwerke immer gr\u00f6\u00dfer werden.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large getwid-padding-bottom-medium\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" style=\"font-size:25px\"><h3 class=\"wp-block-getwid-advanced-heading__content has-text-color\" style=\"text-align:center;color:#0f406e\">Hohe Kosten bei Datenverletzungen<\/h3><\/div>\n\n\n\n<p>Heutzutage geh\u00f6rt Cybersecurity-\u00dcberwachung zu den Compliance- und regulatorischen Anforderungen eines Unternehmens. Datenverletzungen k\u00f6nnen in vielerlei Hinsicht kostspielig sein: L\u00f6segeldkosten, Bu\u00dfgelder und Entsch\u00e4digungen, schlechte Publicity, geringerer Markenwert und Betriebsunterbrechungen, die Gesch\u00e4ftsaktivit\u00e4ten verhindern. Einige davon k\u00f6nnen langfristige Auswirkungen auf das Unternehmen haben und auch seinen Aktienwert mindern.<\/p>\n\n\n\n<p>Das Hauptziel der Netzwerk-Cybersicherheits\u00fcberwachung ist es, Ausfallzeiten zu minimieren, indem Angriffe verhindert und Daten gesch\u00fctzt werden, damit ein Unternehmen weiterarbeiten kann. Durch die Kombination von Angriffs- und passiver Sicherheits\u00fcberwachung und die weitestgehende Automatisierung der Prozesse k\u00f6nnen Unternehmen sich vor Netzwerkbedrohungen sch\u00fctzen und Angreifer identifizieren.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1280\" height=\"951\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Images-door-lock-1280x951.png\" alt=\"\" class=\"wp-image-27936\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Images-door-lock-1280x951.png 1280w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Images-door-lock-480x357.png 480w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Images-door-lock-240x178.png 240w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Images-door-lock-768x571.png 768w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/Campaign-CybersecurityVisibility-Images-door-lock.png 1500w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#bed5e3\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading\"><h2 class=\"wp-block-getwid-advanced-heading__content has-text-color\" style=\"text-align:center;color:#0f406e\">H\u00e4ufige Probleme bei der Cybersicherheit in gro\u00dfen Unternehmen<\/h2><\/div>\n\n\n\n<p>Auf dem Markt gibt&#8217;s viele Tools f\u00fcr Sicherheitsabteilungen oder Security Operations Center (SOC). Security Information and Event Management (SIEM) sammelt und analysiert Sicherheitsdaten und erkennt potenzielle Bedrohungen. Security Orchestration, Automation and Response (SOAR) automatisiert und koordiniert die Reaktionen auf Sicherheitsvorf\u00e4lle und verbessert so die Effizienz des SOC. Das SOC ist das Team und die Infrastruktur, die f\u00fcr die Verwaltung der Sicherheitslage eines Unternehmens verantwortlich sind und Tools wie SIEM und SOAR nutzen.<\/p>\n\n\n\n<p>Network Detection and Response (NDR) bezeichnet eine Kategorie von Netzwerksicherheitsprodukten, die durch kontinuierliche Analyse des Netzwerkverkehrs abnormales Systemverhalten erkennen. Endpoint Detection and Response (EDR) wird f\u00fcr ungew\u00f6hnliche Aktivit\u00e4ten an Systemendpunkten wie Computern, Telefonen und Servern eingesetzt.<\/p>\n\n\n\n<p>Zusammen bieten Netzwerk- und Sicherheits\u00fcberwachung umfassende Informationen, Analysen und Berichte. Das Ziel ist es, diese Funktionen so weit wie m\u00f6glich zu automatisieren.<\/p>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#2c4860;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" style=\"font-size:14px\"><span class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\">Sowohl Netzwerkbetreibern als auch Mitarbeitern f\u00fcr Netzwerksicherheit die M\u00f6glichkeit geben, ihre Untersuchungen zu sammeln, zu filtern und zu verfeinern, um Probleme zu identifizieren<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#2c4860;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\">Feststellen, ob es sich um eine normale Netzwerkaktivit\u00e4t oder um b\u00f6swillige\/st\u00f6rende Aktivit\u00e4ten handelt<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#2c4860;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\">Einsatz aktiver Testtools zum Testen wichtiger Netzwerkfunktionen<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#2c4860;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\">Automatisierung und standardisierte Prozesse f\u00fcr die Erstellung von St\u00f6rungsmeldungen<\/span><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center has-background is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#2c4860;padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-getwid-advanced-heading\"><span class=\"wp-block-getwid-advanced-heading__content has-text-color has-nv-site-bg-color\">Kontinuierliche, zuverl\u00e4ssige Datenerfassung in Echtzeit, um wichtige Informationen \u00fcber den Zustand und die Sicherheitslage des Netzwerks zu gewinnen<\/span><\/div>\n<\/div>\n<\/div>\n\n\n\n<p><strong>Automatisierungstools und vor allem agentenbasierte KI helfen dabei, diese Aufgaben zu vereinfachen.<\/strong><\/p>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-large\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-getwid-advanced-heading has-custom-font-size\" style=\"font-size:30px\"><h3 class=\"wp-block-getwid-advanced-heading__content has-text-color\" style=\"text-align:center;color:#0f406e\">Die richtige Balance finden<\/h3><\/div>\n\n\n\n<p>Einerseits ist es verlockend, die besten Tools auszuw\u00e4hlen, um ein erstklassiges Service-Operations-Center aufzubauen, aber die Integration der Tools ist immer mit Kosten verbunden. Andererseits minimiert eine L\u00f6sung von einem einzigen Anbieter die Integrationskosten, aber das Risiko einer Bindung an diesen Anbieter ist nicht attraktiv. Oft wird eine L\u00f6sung von einem einzigen Anbieter wegen ihrer eingeschr\u00e4nkten Flexibilit\u00e4t kritisiert. Netzwerk-Paketbroker machen das Ganze flexibler, weil sie die M\u00f6glichkeit bieten, denselben oder gefilterten Datenverkehr an mehrere Ziele zu senden. So k\u00f6nnen Tools parallel genutzt werden, zum Beispiel beim Testen und Vergleichen von Tools oder wenn Tools f\u00fcr bestimmte Zwecke eingesetzt werden.<\/p>\n\n\n\n<p>Egal, f\u00fcr welche L\u00f6sung man sich entscheidet, die Kosten\u00fcberwachung ist sehr wichtig. Kosten\u00fcberschreitungen entstehen durch Lizenzen, Bandbreiten Geb\u00fchren und die ineffiziente Nutzung von Tools. Die Anzahl der Server hat oft Einfluss auf die Lizenzgeb\u00fchren, und manchmal kann man durch ein Upgrade der Hardware und die Reduzierung der Serveranzahl erhebliche Einsparungen erzielen. Die Bandbreite und die effiziente Nutzung der Tools lassen sich durch den Einsatz von TAP- und NPB-L\u00f6sungen deutlich verbessern.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" width=\"1280\" height=\"481\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/ebook-cybersec-graphics_simplified-branch_small-1280x481.png\" alt=\"\" class=\"wp-image-28066\" style=\"width:862px;height:auto\" srcset=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/ebook-cybersec-graphics_simplified-branch_small-1280x481.png 1280w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/ebook-cybersec-graphics_simplified-branch_small-480x180.png 480w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/ebook-cybersec-graphics_simplified-branch_small-240x90.png 240w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/ebook-cybersec-graphics_simplified-branch_small-768x289.png 768w, https:\/\/www.cubro.com\/en\/wp-content\/uploads\/ebook-cybersec-graphics_simplified-branch_small.png 1500w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/figure><\/div>\n\n\n<div style=\"height:29px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Ein weiterer Bereich, in dem TAP und NPB helfen, ist die Reduzierung und Filterung des Datenverkehrs, um nur relevanten Datenverkehr auszuw\u00e4hlen und Leistungsengp\u00e4sse zu beseitigen. Sicherheitstools erfordern bei steigendem Datenverkehr m\u00f6glicherweise kontinuierliche Hardware- und Lizenz-Upgrades.<\/p>\n\n\n\n<p>In jedem Fall ist es wichtig, alle f\u00fcr die Tools erforderlichen Daten zu haben.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull alignfull\"><div class=\"wp-block-getwid-section__wrapper getwid-padding-top-normal getwid-padding-bottom-normal\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background\" style=\"background-color:#bed5e3\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\">\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50 is-style-primary\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/CUB-CybersecVisibility-Ebook.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Download Ebook<\/a><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"nv-cv-d nv-cv-m wp-block-getwid-section alignfull ticss-463d19d6 alignfull\" style=\"margin-top:60px;margin-bottom:30px\"><div class=\"wp-block-getwid-section__wrapper\" style=\"padding-top:4px;padding-bottom:0px\"><div class=\"wp-block-getwid-section__inner-wrapper\"><div class=\"wp-block-getwid-section__background-holder\"><div class=\"wp-block-getwid-section__background has-background has-nv-dark-bg-background-color\"><\/div><div class=\"wp-block-getwid-section__foreground\"><\/div><\/div><div class=\"wp-block-getwid-section__content\"><div class=\"wp-block-getwid-section__inner-content\"><div class=\"wp-block-image is-style-default ticss-b2896e02\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/CNV-Logo_just-symbol_divider.png\" alt=\"\" width=\"30\" height=\"48\"\/><\/figure><\/div><\/div><\/div><\/div><\/div><\/div>\n\n\n<p class=\"newsletter-headline\">Newsletter - Stay up to date with Cubro Bytes<\/p><div class=\"zweispaltig\"><div class=\"spalte\" style=\"margin-top:30px;padding-left:30px;padding-right:30px;\">\r\n\t\t\t<div style=\"padding-bottom:15px; text-align:center;\">\r\n\t\t\t  <img decoding=\"async\" src=\"https:\/\/www.cubro.com\/en\/wp-content\/uploads\/icon_newsletter.png\" \r\n\t\t\t       width=\"200\" \r\n\t\t\t       style=\"padding-bottom:10px;\">\r\n\t\t\t<\/div>\r\n\r\n\t\t\t<p style=\"font-size:20px;\">Our newsletter provides thought leadership content about the industry. It is concise and has interesting content to keep you updated with what\u2019s new at Cubro and in the industry. You can unsubscribe anytime with a single click.<\/p>\r\n\t\t\t<\/div><div class=\"spalte\"><!-- Begin Brevo Form -->\r\n<!-- START - We recommend to place the below code in head tag of your website html  -->\r\n<style>\r\n  @font-face {\r\n    font-display: block;\r\n    font-family: Roboto;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/normal\/normal\/7529907e9eaf8ebb5220c5f9850e3811.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/normal\/normal\/25c678feafdc175a70922a116c9be3e7.woff) format(\"woff\")\r\n  }\r\n\r\n  @font-face {\r\n    font-display: fallback;\r\n    font-family: Roboto;\r\n    font-weight: 600;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/medium\/normal\/6e9caeeafb1f3491be3e32744bc30440.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/medium\/normal\/71501f0d8d5aa95960f6475d5487d4c2.woff) format(\"woff\")\r\n  }\r\n\r\n  @font-face {\r\n    font-display: fallback;\r\n    font-family: Roboto;\r\n    font-weight: 700;\r\n    src: url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/bold\/normal\/3ef7cf158f310cf752d5ad08cd0e7e60.woff2) format(\"woff2\"), url(https:\/\/assets.brevo.com\/font\/Roboto\/Latin\/bold\/normal\/ece3a1d82f18b60bcce0211725c476aa.woff) format(\"woff\")\r\n  }\r\n\r\n  #sib-container input:-ms-input-placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #c0ccda;\r\n  }\r\n\r\n  #sib-container input::placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #c0ccda;\r\n  }\r\n\r\n  #sib-container textarea::placeholder {\r\n    text-align: left;\r\n    font-family: Helvetica, sans-serif;\r\n    color: #c0ccda;\r\n  }\r\n\r\n  #sib-container a {\r\n    text-decoration: underline;\r\n    color: #2BB2FC;\r\n  }\r\n\r\n  label.entry__label {\r\n  \tmargin-bottom:1px;\r\n  }\r\n\r\n  .sib-form {\r\n  \tpadding-left:0!important;\r\n  \tpadding-right:0!important;\r\n  }\r\n\r\n  #sib-container {\r\n  \tpadding:0!important;\r\n  }\r\n\r\n  .recaptcha-text {\r\n  \tfont-size:12px!important;\r\n  }\r\n\r\n  .recaptcha-text a {\r\n    color: #d8522c!important;\r\n    text-decoration: underline;\r\n  }\r\n\r\n  button {\r\n    font-size:16px;\r\n    text-align:left;\r\n    font-weight:700;\r\n    font-family:Helvetica, sans-serif;\r\n    color:#FFFFFF;\r\n    background-color:#84a6ad;\r\n    border-radius:3px;\r\n    border-width:8px;\r\n  }\r\n\r\n  button:hover {\r\n    color:#FFFFFF;\r\n    background-color:#333333;\r\n  }\r\n\r\n  \/* --- Brevo Formular: 2-spaltiges Layout f\u00fcr die ersten 4 Felder --- *\/\r\n\r\n  \/* Grid auf die direkten Kinder des <form> anwenden (die Wrapper mit padding) *\/\r\n  #sib-container #sib-form {\r\n    display: grid;\r\n    grid-template-columns: 1fr 1fr;\r\n    column-gap: 16px;\r\n    row-gap: 0; \/* da die Wrapper schon padding haben *\/\r\n  }\r\n\r\n  \/* Alle Wrapper-Blocks standardm\u00e4\u00dfig: eine Spalte *\/\r\n  #sib-container #sib-form > div {\r\n    grid-column: span 1;\r\n  }\r\n\r\n  \/* 5. Block = Email (vollbreit) *\/\r\n  #sib-container #sib-form > div:nth-of-type(5) {\r\n    grid-column: 1 \/ -1;\r\n  }\r\n\r\n  \/* 6. Block = Button (vollbreit) *\/\r\n  #sib-container #sib-form > div:nth-of-type(6) {\r\n    grid-column: 1 \/ -1;\r\n  }\r\n\r\n  \/* Hidden Inputs am Ende: vollbreit und ohne Layout-Effekt *\/\r\n  #sib-container #sib-form > input {\r\n    grid-column: 1 \/ -1;\r\n  }\r\n\r\n  \/* Mobile: alles untereinander *\/\r\n  @media (max-width: 640px) {\r\n    #sib-container #sib-form {\r\n      grid-template-columns: 1fr;\r\n    }\r\n    #sib-container #sib-form > div,\r\n    #sib-container #sib-form > div:nth-of-type(5),\r\n    #sib-container #sib-form > div:nth-of-type(6) {\r\n      grid-column: 1 \/ -1;\r\n    }\r\n  }\r\n\r\n\r\n<\/style>\r\n<link rel=\"stylesheet\" href=\"https:\/\/sibforms.com\/forms\/end-form\/build\/sib-styles.css\">\r\n<!--  END - We recommend to place the above code in head tag of your website html -->\r\n\r\n<!-- START - We recommend to place the below code where you want the form in your website html  -->\r\n<div class=\"sib-form\" style=\"text-align: center; background-color: #ffffff;\">\r\n  <div id=\"sib-form-container\" class=\"sib-form-container\">\r\n    <div id=\"error-message\" class=\"sib-form-message-panel\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;max-width:540px;\">\r\n      <div class=\"sib-form-message-panel__text sib-form-message-panel__text--center\">\r\n        <svg viewBox=\"0 0 512 512\" class=\"sib-icon sib-notification__icon\">\r\n          <path d=\"M256 40c118.621 0 216 96.075 216 216 0 119.291-96.61 216-216 216-119.244 0-216-96.562-216-216 0-119.203 96.602-216 216-216m0-32C119.043 8 8 119.083 8 256c0 136.997 111.043 248 248 248s248-111.003 248-248C504 119.083 392.957 8 256 8zm-11.49 120h22.979c6.823 0 12.274 5.682 11.99 12.5l-7 168c-.268 6.428-5.556 11.5-11.99 11.5h-8.979c-6.433 0-11.722-5.073-11.99-11.5l-7-168c-.283-6.818 5.167-12.5 11.99-12.5zM256 340c-15.464 0-28 12.536-28 28s12.536 28 28 28 28-12.536 28-28-12.536-28-28-28z\" \/>\r\n        <\/svg>\r\n        <span class=\"sib-form-message-panel__inner-text\">\r\n                          Deine Anmeldung konnte nicht gespeichert werden. Bitte versuche es erneut.\r\n                      <\/span>\r\n      <\/div>\r\n    <\/div>\r\n    <div><\/div>\r\n    <div id=\"success-message\" class=\"sib-form-message-panel\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#085229; background-color:#e7faf0; border-radius:3px; border-color:#13ce66;max-width:540px;\">\r\n      <div class=\"sib-form-message-panel__text sib-form-message-panel__text--center\">\r\n        <svg viewBox=\"0 0 512 512\" class=\"sib-icon sib-notification__icon\">\r\n          <path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 464c-118.664 0-216-96.055-216-216 0-118.663 96.055-216 216-216 118.664 0 216 96.055 216 216 0 118.663-96.055 216-216 216zm141.63-274.961L217.15 376.071c-4.705 4.667-12.303 4.637-16.97-.068l-85.878-86.572c-4.667-4.705-4.637-12.303.068-16.97l8.52-8.451c4.705-4.667 12.303-4.637 16.97.068l68.976 69.533 163.441-162.13c4.705-4.667 12.303-4.637 16.97.068l8.451 8.52c4.668 4.705 4.637 12.303-.068 16.97z\" \/>\r\n        <\/svg>\r\n        <span class=\"sib-form-message-panel__inner-text\">\r\n                          Deine Anmeldung war erfolgreich.\r\n                      <\/span>\r\n      <\/div>\r\n    <\/div>\r\n    <div><\/div>\r\n    <div id=\"sib-container\" class=\"sib-container--large sib-container--vertical\" style=\"text-align:center; background-color:rgba(255,255,255,1); max-width:800px; direction:ltr\">\r\n      <form id=\"sib-form\" method=\"POST\" action=\"https:\/\/24bf8055.sibforms.com\/serve\/MUIFAJW5hHXD-knlsGlqSNUcW_X6H-wyIG1XBfBHC1n-r5oWiLIKRNXRDNGHx0jhUUIpnWTh-6f1BKAE6jFyyE4DZupZc0qg-pyk2DusTzZA-sd2kmqr439RPzb-vYZRTRcXHsAxYa16e-8CaDLXh2IKxteM8S8ICusLl-WDN0JwkdZsIhe032CYNNlX8zi1nT5UbXdwGO0854j7\" data-type=\"subscription\">\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 500; text-align:left; font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#3c4858;\" for=\"FIRSTNAME\" data-required=\"*\">First Name<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" maxlength=\"200\" type=\"text\" id=\"FIRSTNAME\" name=\"FIRSTNAME\" autocomplete=\"off\" data-required=\"true\" required \/>\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 500; text-align:left; font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#3c4858;\" for=\"LASTNAME\" data-required=\"*\">Last Name<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" maxlength=\"200\" type=\"text\" id=\"LASTNAME\" name=\"LASTNAME\" autocomplete=\"off\" data-required=\"true\" required \/>\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 500; text-align:left; font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#3c4858;\" for=\"COMPANY\">Company<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" maxlength=\"200\" type=\"text\" id=\"COMPANY\" name=\"COMPANY\" autocomplete=\"off\" \/>\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 500; text-align:left; font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#3c4858;\" for=\"COUNTRY\">Country<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" maxlength=\"200\" type=\"text\" id=\"COUNTRY\" name=\"COUNTRY\" autocomplete=\"off\" \/>\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-input sib-form-block\">\r\n            <div class=\"form__entry entry_block\">\r\n              <div class=\"form__label-row \">\r\n                <label class=\"entry__label\" style=\"font-weight: 500; text-align:left; font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#3c4858;\" for=\"EMAIL\" data-required=\"*\">Email<\/label>\r\n\r\n                <div class=\"entry__field\">\r\n                  <input class=\"input \" type=\"text\" id=\"EMAIL\" name=\"EMAIL\" autocomplete=\"off\" data-required=\"true\" required \/>\r\n                <\/div>\r\n              <\/div>\r\n\r\n              <label class=\"entry__error entry__error--primary\" style=\"font-size:16px; text-align:left; font-family:Helvetica, sans-serif; color:#661d1d; background-color:#ffeded; border-radius:3px; border-color:#ff4949;\">\r\n              <\/label>\r\n\t\t\t\t<p class=\"recaptcha-text\">This site is protected by reCAPTCHA and the Google <a href=\"https:\/\/policies.google.com\/privacy\" target=\"_blank\" rel=\"noopener\">Privacy Policy<\/a> and <a href=\"https:\/\/policies.google.com\/terms\" target=\"_blank\" rel=\"noopener\">Terms of Service<\/a> apply.\r\n\t\t\t\t<\/p>\r\n            <\/div>\r\n          <\/div>\r\n        <\/div>\r\n        <div style=\"padding: 8px 0;\">\r\n          <div class=\"sib-form-block\" style=\"text-align: left\">\r\n            <button class=\"sib-form-block__button sib-form-block__button-with-loader\" form=\"sib-form\" type=\"submit\">\r\n              <svg class=\"icon clickable__icon progress-indicator__icon sib-hide-loader-icon\" viewBox=\"0 0 512 512\" style=\"\">\r\n                <path d=\"M460.116 373.846l-20.823-12.022c-5.541-3.199-7.54-10.159-4.663-15.874 30.137-59.886 28.343-131.652-5.386-189.946-33.641-58.394-94.896-95.833-161.827-99.676C261.028 55.961 256 50.751 256 44.352V20.309c0-6.904 5.808-12.337 12.703-11.982 83.556 4.306 160.163 50.864 202.11 123.677 42.063 72.696 44.079 162.316 6.031 236.832-3.14 6.148-10.75 8.461-16.728 5.01z\" \/>\r\n              <\/svg>\r\n              Subscribe here\r\n            <\/button>\r\n          <\/div>\r\n        <\/div>\r\n\r\n        <input type=\"text\" name=\"email_address_check\" value=\"\" class=\"input--hidden\">\r\n        <input type=\"hidden\" name=\"locale\" value=\"de\">\r\n      <\/form>\r\n    <\/div>\r\n  <\/div>\r\n<\/div>\r\n<!-- END - We recommend to place the above code where you want the form in your website html  -->\r\n\r\n<!-- START - We recommend to place the below code in footer or bottom of your website html  -->\r\n<script>\r\n  window.REQUIRED_CODE_ERROR_MESSAGE = 'Please select a country code.';\r\n  window.LOCALE = 'de';\r\n  window.EMAIL_INVALID_MESSAGE = window.SMS_INVALID_MESSAGE = \"The information you entered is invalid. Please check the field format and try again.\";\r\n\r\n  window.REQUIRED_ERROR_MESSAGE = \"This field must not be empty. \";\r\n\r\n  window.GENERIC_INVALID_MESSAGE = \"This field cannot be empty. The information you entered is invalid. Please check the field format and try again.\";\r\n\r\n  window.translation = {\r\n    common: {\r\n      selectedList: '{quantity} Liste ausgew\u00e4hlt',\r\n      selectedLists: '{quantity} Listen ausgew\u00e4hlt',\r\n      selectedOption: '{quantity} ausgew\u00e4hlt',\r\n      selectedOptions: '{quantity} ausgew\u00e4hlt',\r\n    }\r\n  };\r\n\r\n  var AUTOHIDE = Boolean(0);\r\n<\/script>\r\n\r\n<script defer src=\"https:\/\/sibforms.com\/forms\/end-form\/build\/main.js\"><\/script>\r\n\r\n<!-- END - We recommend to place the above code in footer or bottom of your website html  -->\r\n<!-- End Brevo Form --><p style=\"font-size:12px;padding-left:16px;\">Your e-mail address is only used to send you our newsletter and information about the activities of Cubro Network Visibility. You can always use the unsubscribe link included in the newsletter.<\/p><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":10,"featured_media":0,"parent":27517,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_searchwp_excluded":"","_uag_custom_page_level_css":"","neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","neve_meta_reading_time":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-28119","page","type-page","status-publish","hentry"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"neve-blog":false},"uagb_author_info":{"display_name":"Gianni","author_link":"https:\/\/www.cubro.com\/en\/blog\/author\/gianni\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/pages\/28119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/comments?post=28119"}],"version-history":[{"count":14,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/pages\/28119\/revisions"}],"predecessor-version":[{"id":28693,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/pages\/28119\/revisions\/28693"}],"up":[{"embeddable":true,"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/pages\/27517"}],"wp:attachment":[{"href":"https:\/\/www.cubro.com\/en\/wp-json\/wp\/v2\/media?parent=28119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}