{"id":31128,"date":"2024-02-22T16:18:03","date_gmt":"2024-02-22T15:18:03","guid":{"rendered":"https:\/\/dev7.homepage-balingen.de\/?page_id=31128"},"modified":"2025-12-29T15:04:21","modified_gmt":"2025-12-29T14:04:21","slug":"leistungen","status":"publish","type":"page","link":"https:\/\/cybershield-consulting.com\/en\/our-services\/","title":{"rendered":"Services"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid headhero vc_custom_1711010754260 vc_row-o-content-bottom vc_row-flex wpex-vc-full-width-row wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\" style=\"min-height:40vh;background-position:50% 100%!important;background-size:cover!important;\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row-o-equal-height vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative bg-fixed-top wpex-vc-bg-fixed wpex-vc-bg-top\" style=\"background-position:50% 0%!important;background-size:cover!important;\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div>\n\t<div style=\"font-size:15px;font-weight:600;text-align:center;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>WHAT WE OFFER YOU<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_20 vc_sep_border_width_4 vc_sep_pos_align_center vc_separator_no_text wpb_content_element  wpb_content_element wpb_animate_when_almost_visible wpb_fadeIn fadeIn wpb_animate_when_almost_visible wpb_fadeIn fadeIn\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span style=\"border-color:#bebfcd;\" class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span style=\"border-color:#bebfcd;\" class=\"vc_sep_line\"><\/span><\/span>\n<\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-heading.vcex_69fe9b2d4ea4e{animation-duration:2s;}<\/style><h1 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-center  wpb_animate_when_almost_visible wpb_fadeInUp fadeInUp vcex_69fe9b2d4ea4e\"><span class=\"vcex-heading-inner wpex-inline-block\">Our services<\/span><\/h1><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-heading.vcex_69fe9b2d4edbf{animation-duration:2s;}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-center vcex_69fe9b2d4edbf\"><span class=\"vcex-heading-inner wpex-inline-block\">Industrial control systems and operational technologies are increasingly becoming the focus of attackers.<\/span><\/h3><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>\n\t<div style=\"text-align:center;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Safer piece by piece<\/strong><\/p>\n<p>We are an innovative and pragmatic IT security service provider with a focus on Operational Technologies. Together with our clients, we ensure that the (industrial) world becomes safer step by step. We stand for consistently high quality and customer orientation.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><div class=\"vcex-grid-container vcex-module wpex-grid wpex-gap-20 wpex-grid-cols-1 wpex-lg-grid-cols-3 gbox\"><div class=\"vcex-module vcex-teaser wpex-flex wpex-flex-col wpex-text-center\"><div class=\"vcex-teaser-media wpex-mb-20 wpex-text-center\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/security-consulting\/\" class=\"wpex-no-underline\" title=\"Consulting\"><img width=\"900\" height=\"478\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Security-Consulting.webp\" class=\"wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Security-Consulting.webp 900w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Security-Consulting-300x159.webp 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Security-Consulting-768x408.webp 768w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Security-Consulting-18x10.webp 18w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/div><div class=\"vcex-teaser-content\"><h3 class=\"vcex-teaser-heading wpex-heading wpex-text-lg\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/security-consulting\/\" class=\"wpex-no-underline\" title=\"Consulting\">Security Consulting<\/a><\/h3><div class=\"vcex-teaser-text wpex-mt-10 wpex-last-mb-0 wpex-clr\"><p>We support you in all matters relating to IT\/OT security and are always at your side as experts<\/p>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-teaser wpex-flex wpex-flex-col wpex-text-center\"><div class=\"vcex-teaser-media wpex-mb-20 wpex-text-center\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/it-security-management\/\" class=\"wpex-no-underline\" title=\"Consulting\"><img width=\"900\" height=\"478\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-IT-OT-Management.webp\" class=\"wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-IT-OT-Management.webp 900w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-IT-OT-Management-300x159.webp 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-IT-OT-Management-768x408.webp 768w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-IT-OT-Management-18x10.webp 18w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/div><div class=\"vcex-teaser-content\"><h3 class=\"vcex-teaser-heading wpex-heading wpex-text-lg\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/it-security-management\/\" class=\"wpex-no-underline\" title=\"Consulting\">IT\/OT Security Management<\/a><\/h3><div class=\"vcex-teaser-text wpex-mt-10 wpex-last-mb-0 wpex-clr\"><p>Are you interested in setting up an Information Security Management System (ISMS) for your company?<\/p>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-teaser wpex-flex wpex-flex-col wpex-text-center\"><div class=\"vcex-teaser-media wpex-mb-20 wpex-text-center\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/network-security\/\" class=\"wpex-no-underline\" title=\"Consulting\"><img width=\"900\" height=\"478\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Network-Security-900.webp\" class=\"wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Network-Security-900.webp 900w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Network-Security-900-300x159.webp 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Network-Security-900-768x408.webp 768w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Network-Security-900-18x10.webp 18w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/div><div class=\"vcex-teaser-content\"><h3 class=\"vcex-teaser-heading wpex-heading wpex-text-lg\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/network-security\/\" class=\"wpex-no-underline\" title=\"Consulting\">Network Security<\/a><\/h3><div class=\"vcex-teaser-text wpex-mt-10 wpex-last-mb-0 wpex-clr\"><p>Weaknesses in the communication between components of your system pose a significant security risk.<\/p>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-teaser wpex-flex wpex-flex-col wpex-text-center\"><div class=\"vcex-teaser-media wpex-mb-20 wpex-text-center\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/site-assessments\/\" class=\"wpex-no-underline\" title=\"Consulting\"><img width=\"900\" height=\"478\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Audits_900.webp\" class=\"wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Audits_900.webp 900w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Audits_900-300x159.webp 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Audits_900-768x408.webp 768w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Audits_900-18x10.webp 18w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/div><div class=\"vcex-teaser-content\"><h3 class=\"vcex-teaser-heading wpex-heading wpex-text-lg\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/site-assessments\/\" class=\"wpex-no-underline\" title=\"Consulting\">Security Assessments \/ Audits<\/a><\/h3><div class=\"vcex-teaser-text wpex-mt-10 wpex-last-mb-0 wpex-clr\"><p>Do you have a system or operation that you would like to have security tested for?<\/p>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-teaser wpex-flex wpex-flex-col wpex-text-center\"><div class=\"vcex-teaser-media wpex-mb-20 wpex-text-center\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/security-validation-and-verification\/\" class=\"wpex-no-underline\" title=\"Consulting\"><img width=\"900\" height=\"478\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Validation-and-Verification.webp\" class=\"wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Validation-and-Verification.webp 900w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Validation-and-Verification-300x159.webp 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Validation-and-Verification-768x408.webp 768w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Validation-and-Verification-18x10.webp 18w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/div><div class=\"vcex-teaser-content\"><h3 class=\"vcex-teaser-heading wpex-heading wpex-text-lg\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/security-validation-and-verification\/\" class=\"wpex-no-underline\" title=\"Consulting\">Security Validation and Verification<\/a><\/h3><div class=\"vcex-teaser-text wpex-mt-10 wpex-last-mb-0 wpex-clr\"><p>Together we analyze your security status and carry out regular security checks<\/p>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-teaser wpex-flex wpex-flex-col wpex-text-center\"><div class=\"vcex-teaser-media wpex-mb-20 wpex-text-center\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/security-testing\/\" class=\"wpex-no-underline\"><img width=\"900\" height=\"478\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-testing.webp\" class=\"wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-testing.webp 900w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-testing-300x159.webp 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-testing-768x408.webp 768w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-testing-18x10.webp 18w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/div><div class=\"vcex-teaser-content\"><h3 class=\"vcex-teaser-heading wpex-heading wpex-text-lg\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/security-testing\/\" class=\"wpex-no-underline\">Security Testing<\/a><\/h3><div class=\"vcex-teaser-text wpex-mt-10 wpex-last-mb-0 wpex-clr\"><p>Our security tests uncover any vulnerabilities that could be exploited by attackers<\/p>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-teaser wpex-flex wpex-flex-col wpex-text-center\"><div class=\"vcex-teaser-media wpex-mb-20 wpex-text-center\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/ciso-as-a-service\/\" class=\"wpex-no-underline\" title=\"Consulting\"><img width=\"900\" height=\"478\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Cisco.webp\" class=\"wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Cisco.webp 900w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Cisco-300x159.webp 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Cisco-768x408.webp 768w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Cisco-18x10.webp 18w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/div><div class=\"vcex-teaser-content\"><h3 class=\"vcex-teaser-heading wpex-heading wpex-text-lg\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/ciso-as-a-service\/\" class=\"wpex-no-underline\" title=\"Consulting\">CISO as a Service<\/a><\/h3><div class=\"vcex-teaser-text wpex-mt-10 wpex-last-mb-0 wpex-clr\"><p>The Chief Information Security Officer plays a central role in the field of cybersecurity within a company.<\/p>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-teaser wpex-flex wpex-flex-col wpex-text-center\"><div class=\"vcex-teaser-media wpex-mb-20 wpex-text-center\"><a href=\"https:\/\/cybershield-consulting.com\/en\/leistungen\/nis2-cra-beratungsleistungen\/\" class=\"wpex-no-underline\" title=\"Consulting\"><img width=\"900\" height=\"478\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Managed-Service-900.webp\" class=\"wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Managed-Service-900.webp 900w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Managed-Service-900-300x159.webp 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Managed-Service-900-768x408.webp 768w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Managed-Service-900-18x10.webp 18w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/div><div class=\"vcex-teaser-content\"><h3 class=\"vcex-teaser-heading wpex-heading wpex-text-lg\"><a href=\"https:\/\/cybershield-consulting.com\/en\/leistungen\/nis2-cra-beratungsleistungen\/\" class=\"wpex-no-underline\" title=\"Consulting\">NIS2 &amp; CRA Advisory Services<\/a><\/h3><div class=\"vcex-teaser-text wpex-mt-10 wpex-last-mb-0 wpex-clr\"><p>Clear guidance on impact, obligations and the need for action \u2013 fast, structured and practical.<\/p>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-teaser wpex-flex wpex-flex-col wpex-text-center\"><div class=\"vcex-teaser-media wpex-mb-20 wpex-text-center\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/security-awareness\/\" class=\"wpex-no-underline\" title=\"Consulting\"><img width=\"900\" height=\"478\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Awareness.webp\" class=\"wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Awareness.webp 900w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Awareness-300x159.webp 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Awareness-768x408.webp 768w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/home-Awareness-18x10.webp 18w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/div><div class=\"vcex-teaser-content\"><h3 class=\"vcex-teaser-heading wpex-heading wpex-text-lg\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/security-awareness\/\" class=\"wpex-no-underline\" title=\"Consulting\">Security Awareness<\/a><\/h3><div class=\"vcex-teaser-text wpex-mt-10 wpex-last-mb-0 wpex-clr\"><p>Awareness modules help your employees to understand risks and thus become the first line of defence.<\/p>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-teaser wpex-flex wpex-flex-col wpex-text-center\"><div class=\"vcex-teaser-media wpex-mb-20 wpex-text-center\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/training\/\" class=\"wpex-no-underline\" title=\"Consulting\"><img width=\"900\" height=\"478\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Training_900.webp\" class=\"wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Training_900.webp 900w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Training_900-300x159.webp 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Training_900-768x408.webp 768w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Training_900-18x10.webp 18w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/div><div class=\"vcex-teaser-content\"><h3 class=\"vcex-teaser-heading wpex-heading wpex-text-lg\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/training\/\" class=\"wpex-no-underline\" title=\"Consulting\">Training<\/a><\/h3><div class=\"vcex-teaser-text wpex-mt-10 wpex-last-mb-0 wpex-clr\"><p>We offer three different categories of training courses on awareness, OT security and role courses.<\/p>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-teaser wpex-flex wpex-flex-col wpex-text-center\"><div class=\"vcex-teaser-media wpex-mb-20 wpex-text-center\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/hardening-baselines\/\" class=\"wpex-no-underline\" title=\"Consulting\"><img width=\"900\" height=\"478\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/04\/canva-MAEEMEuFRiM.webp\" class=\"wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/04\/canva-MAEEMEuFRiM.webp 900w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/04\/canva-MAEEMEuFRiM-300x159.webp 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/04\/canva-MAEEMEuFRiM-768x408.webp 768w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/04\/canva-MAEEMEuFRiM-18x10.webp 18w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/div><div class=\"vcex-teaser-content\"><h3 class=\"vcex-teaser-heading wpex-heading wpex-text-lg\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/hardening-baselines\/\" class=\"wpex-no-underline\" title=\"Consulting\">Hardening Baselines<\/a><\/h3><div class=\"vcex-teaser-text wpex-mt-10 wpex-last-mb-0 wpex-clr\"><div class=\"vcex-teaser-content\">\n<div class=\"vcex-teaser-text wpex-mt-10 wpex-last-mb-0 wpex-clr\">\n<p>Protect your company assets with a solid security foundation with our security baseline for IT and OT devices<\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-teaser wpex-flex wpex-flex-col wpex-text-center\"><div class=\"vcex-teaser-media wpex-mb-20 wpex-text-center\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/secure-file-transfer\/\" class=\"wpex-no-underline\" title=\"Consulting\"><img width=\"900\" height=\"478\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Network-Security-900.webp\" class=\"wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Network-Security-900.webp 900w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Network-Security-900-300x159.webp 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Network-Security-900-768x408.webp 768w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Network-Security-900-18x10.webp 18w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/div><div class=\"vcex-teaser-content\"><h3 class=\"vcex-teaser-heading wpex-heading wpex-text-lg\"><a href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/secure-file-transfer\/\" class=\"wpex-no-underline\" title=\"Consulting\">Secure File Transfer<\/a><\/h3><div class=\"vcex-teaser-text wpex-mt-10 wpex-last-mb-0 wpex-clr\"><div class=\"vcex-teaser-content\">\n<div class=\"vcex-teaser-text wpex-mt-10 wpex-last-mb-0 wpex-clr\">\n<p>Sending files securely within a network is critical as it is a commonly used attack vector and protects the confidentiality of sensitive data<\/p>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:50px;\"><\/div><style>.vcex-image.vcex_69fe9b2d54861{animation-duration:2s;}<\/style><figure class=\"vcex-image vcex-module wpex-text-center  wpb_animate_when_almost_visible wpb_fadeInUp fadeInUp vcex_69fe9b2d54861\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img width=\"300\" height=\"72\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png\" class=\"vcex-image-img wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width-18x4.png 18w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div><\/figure><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:50px;\"><\/div><\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"DAS BIETEN WIR IHNEN Unsere LeistungenIndustrielle Steuersysteme und Operational Technologies kommen verst\u00e4rkt in den Fokus von Angreifern. St\u00fcck f\u00fcr St\u00fcck sicherer Wir sind ein innovativer und pragmatischer IT-Security Dienstleister mit dem Fokus auf Operational Technologies. Zusammen mit unseren Kunden sorgen wir daf\u00fcr, dass die (industrielle) Welt St\u00fcck f\u00fcr St\u00fcck sicherer wird. Wir stehen f\u00fcr durchg\u00e4ngig&hellip;","protected":false},"author":5,"featured_media":31820,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-31128","page","type-page","status-publish","has-post-thumbnail","hentry","entry","has-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Leistungen - OT \u2013 CyberSecurity<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Leistungen - OT \u2013 CyberSecurity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybershield-consulting.com\/en\/our-services\/\" \/>\n<meta property=\"og:site_name\" content=\"OT \u2013 CyberSecurity\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-29T14:04:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Leitsungen-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"478\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/\",\"name\":\"Leistungen - OT \u2013 CyberSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Leitsungen-1.webp\",\"datePublished\":\"2024-02-22T15:18:03+00:00\",\"dateModified\":\"2025-12-29T14:04:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Leitsungen-1.webp\",\"contentUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Leitsungen-1.webp\",\"width\":900,\"height\":478},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/cybershield-consulting.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Leistungen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#website\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/\",\"name\":\"CyberShield - OT - CyberSecurity\",\"description\":\"Secure every Moment\",\"publisher\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybershield-consulting.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#organization\",\"name\":\"CyberShield\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/logo_coloredwhite_300width.png\",\"contentUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/logo_coloredwhite_300width.png\",\"width\":300,\"height\":72,\"caption\":\"CyberShield\"},\"image\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/linkedin.com\\\/company\\\/cybershield-gmbh\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Leistungen - OT \u2013 CyberSecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybershield-consulting.com\/en\/our-services\/","og_locale":"en_GB","og_type":"article","og_title":"Leistungen - OT \u2013 CyberSecurity","og_url":"https:\/\/cybershield-consulting.com\/en\/our-services\/","og_site_name":"OT \u2013 CyberSecurity","article_modified_time":"2025-12-29T14:04:21+00:00","og_image":[{"width":900,"height":478,"url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Leitsungen-1.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cybershield-consulting.com\/leistungen\/","url":"https:\/\/cybershield-consulting.com\/leistungen\/","name":"Leistungen - OT \u2013 CyberSecurity","isPartOf":{"@id":"https:\/\/cybershield-consulting.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybershield-consulting.com\/leistungen\/#primaryimage"},"image":{"@id":"https:\/\/cybershield-consulting.com\/leistungen\/#primaryimage"},"thumbnailUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Leitsungen-1.webp","datePublished":"2024-02-22T15:18:03+00:00","dateModified":"2025-12-29T14:04:21+00:00","breadcrumb":{"@id":"https:\/\/cybershield-consulting.com\/leistungen\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybershield-consulting.com\/leistungen\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cybershield-consulting.com\/leistungen\/#primaryimage","url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Leitsungen-1.webp","contentUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Leitsungen-1.webp","width":900,"height":478},{"@type":"BreadcrumbList","@id":"https:\/\/cybershield-consulting.com\/leistungen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cybershield-consulting.com\/"},{"@type":"ListItem","position":2,"name":"Leistungen"}]},{"@type":"WebSite","@id":"https:\/\/cybershield-consulting.com\/#website","url":"https:\/\/cybershield-consulting.com\/","name":"CyberShield - OT - CyberSecurity","description":"Secure every Moment","publisher":{"@id":"https:\/\/cybershield-consulting.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybershield-consulting.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/cybershield-consulting.com\/#organization","name":"CyberShield","url":"https:\/\/cybershield-consulting.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cybershield-consulting.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png","contentUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png","width":300,"height":72,"caption":"CyberShield"},"image":{"@id":"https:\/\/cybershield-consulting.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/linkedin.com\/company\/cybershield-gmbh\/"]}]}},"_links":{"self":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/comments?post=31128"}],"version-history":[{"count":5,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31128\/revisions"}],"predecessor-version":[{"id":34846,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31128\/revisions\/34846"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/media\/31820"}],"wp:attachment":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/media?parent=31128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}