{"id":1321,"date":"2025-01-24T13:38:55","date_gmt":"2025-01-24T12:38:55","guid":{"rendered":"https:\/\/infosec-x.com\/control-modules\/"},"modified":"2026-04-21T10:58:21","modified_gmt":"2026-04-21T08:58:21","slug":"control-modules","status":"publish","type":"page","link":"https:\/\/infosec-x.com\/en\/control-modules\/","title":{"rendered":"Control modules"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1321\" class=\"elementor elementor-1321 elementor-943\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c6a2729 e-flex e-con-boxed e-con e-parent\" data-id=\"4c6a2729\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;pyramids&quot;,&quot;shape_divider_bottom&quot;:&quot;pyramids&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M761.9,44.1L643.1,27.2L333.8,98L0,3.8V0l1000,0v3.9\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M761.9,44.1L643.1,27.2L333.8,98L0,3.8V0l1000,0v3.9\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-348a97f8 elementor-widget elementor-widget-heading\" data-id=\"348a97f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Control modules<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ccb71da e-flex e-con-boxed e-con e-parent\" data-id=\"6ccb71da\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34a3ce98 elementor-widget elementor-widget-heading\" data-id=\"34a3ce98\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Flexibility and protection at the highest level<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e872d3f elementor-widget elementor-widget-text-editor\" data-id=\"5e872d3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Security is not a static state, but requires continuous development due to new threats, technological developments and increasingly complex requirements. For this reason, our control modules offer exactly what you need: Flexibility to expand your security strategy in a targeted manner and control to remain confident even in critical moments. <\/p><p>Through our partnerships with leading providers such as <strong>SoSafe<\/strong>, <strong>Google SecOps<\/strong> and <strong>SySS<\/strong>, we not only bring you the best tools, but also the expertise to take your IT security measures to the next level. Through preventative training, continuous monitoring and intensive security audits, our control modules help to effectively secure your business and strengthen it for future challenges. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d6dddb3 elementor-widget elementor-widget-heading\" data-id=\"3d6dddb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why control modules?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d344d7 elementor-widget elementor-widget-text-editor\" data-id=\"3d344d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The control modules not only offer you additional security, but also the freedom to design your information security strategy flexibly and precisely.<\/p><ul><li><strong>Flexibility:<\/strong> Choose exactly the modules that suit your company and that you really need, without any unnecessary extras.<\/li><li><strong>Proactive security:<\/strong> Identify risks at an early stage and prevent security incidents before they occur.<\/li><li><strong>Partnerships with the best:<\/strong> With SoSafe, Google SecOps and SySS, you have access to the leading security solutions on the market.<\/li><li><strong>Practice-oriented results:<\/strong> Clear recommendations for action and easy-to-implement measures. No theory, but real solutions. <\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5219022d e-flex e-con-boxed e-con e-parent\" data-id=\"5219022d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;pyramids&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M761.9,44.1L643.1,27.2L333.8,98L0,3.8V0l1000,0v3.9\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3af3f585 elementor-widget elementor-widget-heading\" data-id=\"3af3f585\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">User awareness: employees as security heroes<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b048631 e-flex e-con-boxed e-con e-parent\" data-id=\"b048631\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-37350d66 e-con-full e-flex e-con e-child\" data-id=\"37350d66\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d980af2 elementor-widget elementor-widget-image\" data-id=\"d980af2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"700\" height=\"467\" src=\"https:\/\/infosec-x.com\/wp-content\/uploads\/2025\/01\/Information-Security-Experts-GmbH-Control-Modules-User-Awareness.webp\" class=\"attachment-large size-large wp-image-1012\" alt=\"Information Security Experts GmbH Control Modules User Awareness\" srcset=\"https:\/\/infosec-x.com\/wp-content\/uploads\/2025\/01\/Information-Security-Experts-GmbH-Control-Modules-User-Awareness.webp 700w, https:\/\/infosec-x.com\/wp-content\/uploads\/2025\/01\/Information-Security-Experts-GmbH-Control-Modules-User-Awareness-300x200.webp 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58a410ee e-con-full e-flex e-con e-child\" data-id=\"58a410ee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7351dcfe elementor-widget elementor-widget-text-editor\" data-id=\"7351dcfe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Did you know that almost 90% of cyberattacks exploit human error? Your employees are the first line of defense, but also the biggest vulnerability if they are not properly trained. This is exactly where our user awareness module comes in.  <\/p><p>Together with our partner <strong>SoSafe<\/strong>, we bring behavioral psychology-based training to your company. Our interactive training courses are not only informative, but also motivating, because learning is simply more fun when it is practical and relevant to everyday life. Are you looking for realistic phishing simulations? We show your employees how to recognize suspicious e-mails before a click becomes a danger.   <\/p><p>The aim is for your employees not only to learn how to handle information securely, but also to understand why information security is necessary. Because an informed employee is not only better protected, but is also an active part of your security culture. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-45f29229 e-flex e-con-boxed e-con e-parent\" data-id=\"45f29229\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;pyramids&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M761.9,44.1L643.1,27.2L333.8,98L0,3.8V0l1000,0v3.9\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-400fd70e elementor-widget elementor-widget-heading\" data-id=\"400fd70e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Corporate monitoring: keeping an eye on everything before something happens<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33399325 e-flex e-con-boxed e-con e-parent\" data-id=\"33399325\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-161f8f0c e-con-full e-flex e-con e-child\" data-id=\"161f8f0c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f4c771f elementor-widget elementor-widget-text-editor\" data-id=\"4f4c771f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In an ideal world, there would be no security incidents. In reality, our corporate monitoring module ensures that they are detected at an early stage and contained through preventive measures. <\/p><p>Together with <strong>Google SecOps<\/strong>, we bring state-of-the-art security solutions to your company. Our SIEM and SOAR technologies analyze your data streams in real time, detect anomalies and respond to potential threats at lightning speed. This gives you a security system that works continuously, monitors reliably and acts proactively around the clock.  <\/p><p>Thanks to centralized data analysis and intelligent automation, you always know what&#8217;s going on in your IT world. No panic, no guesswork. Just full control, exactly when you need it.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c665522 e-con-full e-flex e-con e-child\" data-id=\"3c665522\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3063b7b9 elementor-widget elementor-widget-image\" data-id=\"3063b7b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"700\" height=\"467\" src=\"https:\/\/infosec-x.com\/wp-content\/uploads\/2025\/01\/Information-Security-Experts-GmbH-Control-Modules-Corporate-Monitoring.webp\" class=\"attachment-large size-large wp-image-1014\" alt=\"Information Security Experts GmbH Control Modules Corporate Monitoring\" srcset=\"https:\/\/infosec-x.com\/wp-content\/uploads\/2025\/01\/Information-Security-Experts-GmbH-Control-Modules-Corporate-Monitoring.webp 700w, https:\/\/infosec-x.com\/wp-content\/uploads\/2025\/01\/Information-Security-Experts-GmbH-Control-Modules-Corporate-Monitoring-300x200.webp 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1826a66a e-flex e-con-boxed e-con e-parent\" data-id=\"1826a66a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;pyramids&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M761.9,44.1L643.1,27.2L333.8,98L0,3.8V0l1000,0v3.9\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e07ea9a elementor-widget elementor-widget-heading\" data-id=\"e07ea9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Penetration testing: vulnerabilities? Not with us! <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a52a743 e-flex e-con-boxed e-con e-parent\" data-id=\"2a52a743\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4e260c04 e-con-full e-flex e-con e-child\" data-id=\"4e260c04\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c850be elementor-widget elementor-widget-image\" data-id=\"3c850be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"700\" height=\"467\" src=\"https:\/\/infosec-x.com\/wp-content\/uploads\/2025\/01\/Information-Security-Experts-GmbH-Control-Modules-Pentesting.webp\" class=\"attachment-large size-large wp-image-1016\" alt=\"Information Security Experts GmbH Control Modules Pentesting\" srcset=\"https:\/\/infosec-x.com\/wp-content\/uploads\/2025\/01\/Information-Security-Experts-GmbH-Control-Modules-Pentesting.webp 700w, https:\/\/infosec-x.com\/wp-content\/uploads\/2025\/01\/Information-Security-Experts-GmbH-Control-Modules-Pentesting-300x200.webp 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-687d18b7 e-con-full e-flex e-con e-child\" data-id=\"687d18b7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5195892d elementor-widget elementor-widget-text-editor\" data-id=\"5195892d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>How secure is secure enough? We get to the bottom of this question with our penetration testing module. Together with the experts from <strong>SySS<\/strong>, we simulate real attacks on your IT infrastructure to identify potential vulnerabilities before anyone else does.  <\/p><p>Penetration testing is not an option, but a necessity for any company that takes its security measures seriously. Our goal is not to leave you alone with a list of vulnerabilities. After each test, you will receive clear recommendations and a concrete plan to improve your systems.  <\/p><p>After all, it&#8217;s not just about finding vulnerabilities, but also fixing them. This way, you always stay one step ahead of the attackers. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-37bc9ade e-flex e-con-boxed e-con e-parent\" data-id=\"37bc9ade\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;pyramids&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M761.9,44.1L643.1,27.2L333.8,98L0,3.8V0l1000,0v3.9\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b76147a e-flex e-con-boxed e-con e-parent\" data-id=\"b76147a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d4d8f0 elementor-cta--layout-image-right elementor-cta--valign-middle elementor-cta--mobile-layout-image-above elementor-cta--skin-classic elementor-animated-content elementor-widget elementor-widget-call-to-action\" data-id=\"1d4d8f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tYour security. Your control. \t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tFind out how our control modules can enhance your IT security strategy. Let's strengthen your control together. \t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item \">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-md\" href=\"https:\/\/infosec-x.com\/angebot\/\">\n\t\t\t\t\t\tGet advice now\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb0a9c3 e-flex e-con-boxed e-con e-parent\" data-id=\"cb0a9c3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;pyramids&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M761.9,44.1L643.1,27.2L333.8,98L0,3.8V0l1000,0v3.9\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f60606d elementor-widget elementor-widget-heading\" data-id=\"f60606d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our partners<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cff23e9 e-flex e-con-boxed e-con e-parent\" data-id=\"cff23e9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;shape_divider_bottom&quot;:&quot;pyramids&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M761.9,44.1L643.1,27.2L333.8,98L0,3.8V0l1000,0v3.9\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6977ff4b e-con-full e-flex e-con e-child\" data-id=\"6977ff4b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-471eb572 elementor-widget elementor-widget-image\" data-id=\"471eb572\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cloud.google.com\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"102\" src=\"https:\/\/infosec-x.com\/wp-content\/uploads\/2024\/10\/Information-Security-Experts-GmbH-Google.webp\" class=\"attachment-full size-full wp-image-336\" alt=\"Information Security Experts GmbH Google\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4b1dff23 e-con-full e-flex e-con e-child\" data-id=\"4b1dff23\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-50b5e982 elementor-widget elementor-widget-image\" data-id=\"50b5e982\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.syss.de\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"137\" src=\"https:\/\/infosec-x.com\/wp-content\/uploads\/2025\/01\/syss_logo_RGB-1.webp\" class=\"attachment-large size-large wp-image-1034\" alt=\"syss_logo_RGB\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a52260a e-con-full e-flex e-con e-child\" data-id=\"a52260a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c569fcb elementor-widget elementor-widget-image\" data-id=\"7c569fcb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.modell-aachen.de\/en\/interactive-management-software-qwiki\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"133\" src=\"https:\/\/infosec-x.com\/wp-content\/uploads\/2024\/10\/Information-Security-Experts-GmbH-Q.Wiki_.webp\" class=\"attachment-large size-large wp-image-344\" alt=\"Information Security Experts GmbH Q.Wiki\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-30562a58 e-con-full e-flex e-con e-child\" data-id=\"30562a58\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3df53a5d elementor-widget elementor-widget-image\" data-id=\"3df53a5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/denwerit.com\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"28\" src=\"https:\/\/infosec-x.com\/wp-content\/uploads\/2024\/10\/Information-Security-Experts-GmbH-DENWEIT.webp\" class=\"attachment-large size-large wp-image-332\" alt=\"Information Security Experts GmbH DENWEIT\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3abcb46c e-con-full e-flex e-con e-child\" data-id=\"3abcb46c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e3eebce elementor-widget elementor-widget-image\" data-id=\"4e3eebce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.ectacom.com\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"52\" src=\"https:\/\/infosec-x.com\/wp-content\/uploads\/2024\/10\/Information-Security-Experts-GmbH-Ectacom.webp\" class=\"attachment-large size-large wp-image-348\" alt=\"Information Security Experts GmbH Ectacom\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3ba33821 e-con-full e-flex e-con e-child\" data-id=\"3ba33821\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-443b5859 elementor-widget elementor-widget-image\" data-id=\"443b5859\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/sosafe-awareness.com\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"71\" src=\"https:\/\/infosec-x.com\/wp-content\/uploads\/2024\/10\/Information-Security-Experts-GmbH-SoSafe.webp\" class=\"attachment-large size-large wp-image-350\" alt=\"Information Security Experts GmbH SoSafe\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Control modules Flexibility and protection at the highest level Security is not a static state, but requires continuous development due to new threats, technological developments and increasingly complex requirements. For this reason, our control modules offer exactly what you need: Flexibility to expand your security strategy in a targeted manner and control to remain confident [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1321","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/infosec-x.com\/en\/wp-json\/wp\/v2\/pages\/1321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-x.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-x.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-x.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-x.com\/en\/wp-json\/wp\/v2\/comments?post=1321"}],"version-history":[{"count":10,"href":"https:\/\/infosec-x.com\/en\/wp-json\/wp\/v2\/pages\/1321\/revisions"}],"predecessor-version":[{"id":1842,"href":"https:\/\/infosec-x.com\/en\/wp-json\/wp\/v2\/pages\/1321\/revisions\/1842"}],"wp:attachment":[{"href":"https:\/\/infosec-x.com\/en\/wp-json\/wp\/v2\/media?parent=1321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}