{"id":15095,"date":"2024-11-04T09:48:08","date_gmt":"2024-11-04T08:48:08","guid":{"rendered":"https:\/\/cluetec-audit.de\/efficient-audit-platform-for-optimal-quality-management\/audit-platform-security\/"},"modified":"2025-12-16T15:53:11","modified_gmt":"2025-12-16T14:53:11","slug":"audit-platform-security","status":"publish","type":"page","link":"https:\/\/cluetec-audit.de\/en\/audit-software\/audit-platform-security\/","title":{"rendered":"Audit Platform \u2013 Security"},"content":{"rendered":"<h1>Do you consider your data to be worth protecting? We do.<\/h1>\n<p>In today&#8217;s digital business landscape, information security is paramount \u2013 especially in sensitive and regulated industries such as the automotive sector. A proven standard that meets these requirements is TISAX (Trusted Information Security Assessment Exchange). Companies that prioritize data security benefit from a TISAX-certified software partner like cluetec Audit.  <\/p>\n<p>TISAX was developed by the German Association of the Automotive Industry (VDA) to establish a high standard for the secure exchange of sensitive data. This includes confidential prototype data, development information, and business-critical data that must be protected. This standard is relevant not only for the automotive industry, but also for other sectors where information protection is a top priority \u2013 such as IT, logistics, or manufacturing. TISAX certification builds trust and facilitates collaboration with security-conscious partners.   <\/p>\n<p>\t\t\t\t\t<a href=\"https:\/\/cluetec-audit.de\/wp-content\/uploads\/2025\/08\/cluetec-TISAX-Teilnahme_04-2025.pdf\" target=\"_blank\"><br \/>\n\t\t\t\t<svg aria-hidden=\"true\" viewBox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48z\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t\t\t\tMore about TISAX participation<br \/>\n\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"263\" height=\"165\" src=\"https:\/\/cluetec-audit.de\/wp-content\/uploads\/2024\/11\/tisax.svg?wsr\" alt=\"Tisax Logo\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<details id=\"e-n-accordion-item-2090\" open>\n<summary data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-2090\" >\n\t\t\t\t\t Maximum data security<br \/>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\"><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" fill=\"#ABC400\"><\/rect><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" stroke=\"#ABC400\" stroke-width=\"2\"><\/rect><path d=\"M16 24.9999H34\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><path d=\"M34 25.0001L16 25.0001\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><\/svg><br \/>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\"><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" fill=\"#ABC400\"><\/rect><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" stroke=\"#ABC400\" stroke-width=\"2\"><\/rect><path d=\"M16 24.9999H34\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><path d=\"M25 15.9999L25 33.9999\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t<\/summary>\n<p>As a TISAX participant, we ensure that all sensitive data is processed at the highest security level. Whether mobile applications or cloud-based systems \u2013 at cluetec Audit, all data is comprehensively protected and managed according to the strictest security requirements. <\/p>\n<\/details>\n<details id=\"e-n-accordion-item-2091\" >\n<summary data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2091\" >\n\t\t\t\t\t Trustworthy cooperation<br \/>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\"><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" fill=\"#ABC400\"><\/rect><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" stroke=\"#ABC400\" stroke-width=\"2\"><\/rect><path d=\"M16 24.9999H34\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><path d=\"M34 25.0001L16 25.0001\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><\/svg><br \/>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\"><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" fill=\"#ABC400\"><\/rect><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" stroke=\"#ABC400\" stroke-width=\"2\"><\/rect><path d=\"M16 24.9999H34\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><path d=\"M25 15.9999L25 33.9999\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t<\/summary>\n<p>TISAX participation demonstrates that cluetec adheres to the highest security standards. This strengthens trust between partners and enables secure business relationships \u2013 especially in highly regulated industries such as the automotive sector. <\/p>\n<\/details>\n<details id=\"e-n-accordion-item-2092\" >\n<summary data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2092\" >\n\t\t\t\t\t Efficient and transparent processes<br \/>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\"><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" fill=\"#ABC400\"><\/rect><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" stroke=\"#ABC400\" stroke-width=\"2\"><\/rect><path d=\"M16 24.9999H34\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><path d=\"M34 25.0001L16 25.0001\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><\/svg><br \/>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\"><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" fill=\"#ABC400\"><\/rect><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" stroke=\"#ABC400\" stroke-width=\"2\"><\/rect><path d=\"M16 24.9999H34\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><path d=\"M25 15.9999L25 33.9999\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t<\/summary>\n<p>The cluetec audit platform enables companies to manage audit processes entirely digitally \u2013 from planning and execution to follow-up. This allows companies to save time, reduce costs, and minimize sources of error. <\/p>\n<\/details>\n<details id=\"e-n-accordion-item-2093\" >\n<summary data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2093\" >\n\t\t\t\t\t Scalable SaaS solution<br \/>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\"><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" fill=\"#ABC400\"><\/rect><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" stroke=\"#ABC400\" stroke-width=\"2\"><\/rect><path d=\"M16 24.9999H34\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><path d=\"M34 25.0001L16 25.0001\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><\/svg><br \/>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\"><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" fill=\"#ABC400\"><\/rect><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" stroke=\"#ABC400\" stroke-width=\"2\"><\/rect><path d=\"M16 24.9999H34\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><path d=\"M25 15.9999L25 33.9999\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t<\/summary>\n<p>As a SaaS solution, cluetec Audit offers flexibility and scalability. Companies can effortlessly adapt and expand their audit processes without compromising data security. <\/p>\n<\/details>\n<details id=\"e-n-accordion-item-2094\" >\n<summary data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2094\" >\n\t\t\t\t\t TISAX vs. ISO 27001<br \/>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\"><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" fill=\"#ABC400\"><\/rect><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" stroke=\"#ABC400\" stroke-width=\"2\"><\/rect><path d=\"M16 24.9999H34\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><path d=\"M34 25.0001L16 25.0001\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><\/svg><br \/>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\"><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" fill=\"#ABC400\"><\/rect><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" stroke=\"#ABC400\" stroke-width=\"2\"><\/rect><path d=\"M16 24.9999H34\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><path d=\"M25 15.9999L25 33.9999\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t<\/summary>\n<p>Although ISO 27001 and TISAX both set high standards for information security, there are key differences. TISAX, especially at Level 3, places higher demands on the protection of highly sensitive data. <\/p>\n<\/details>\n<details id=\"e-n-accordion-item-2095\" >\n<summary data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2095\" >\n\t\t\t\t\t Compliance Guidelines<br \/>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\"><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" fill=\"#ABC400\"><\/rect><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" stroke=\"#ABC400\" stroke-width=\"2\"><\/rect><path d=\"M16 24.9999H34\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><path d=\"M34 25.0001L16 25.0001\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><\/svg><br \/>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\"><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" fill=\"#ABC400\"><\/rect><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" stroke=\"#ABC400\" stroke-width=\"2\"><\/rect><path d=\"M16 24.9999H34\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><path d=\"M25 15.9999L25 33.9999\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t<\/summary>\n<p>For us as part of the Possehl Group, compliance is not just a technical term, but an elementary component of our daily activities.<\/p>\n<p>Therefore, trust is essential for the success of cluetec as part of an internationally active corporate group. Good cooperation is based on the trust of customers and business partners, employees, and the respective local business environment. A prerequisite for this is the consistent adherence to high standards of social conduct such as integrity, loyalty, and honesty.  <\/p>\n<p><a href=\"https:\/\/cluetec-audit.de\/en\/compliance\/\">More about compliance<\/a><\/p>\n<\/details>\n<details id=\"e-n-accordion-item-2096\" >\n<summary data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2096\" >\n\t\t\t\t\t Privacy policies<br \/>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\"><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" fill=\"#ABC400\"><\/rect><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" stroke=\"#ABC400\" stroke-width=\"2\"><\/rect><path d=\"M16 24.9999H34\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><path d=\"M34 25.0001L16 25.0001\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><\/svg><br \/>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\"><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" fill=\"#ABC400\"><\/rect><rect x=\"1\" y=\"1\" width=\"48\" height=\"48\" rx=\"24\" stroke=\"#ABC400\" stroke-width=\"2\"><\/rect><path d=\"M16 24.9999H34\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><path d=\"M25 15.9999L25 33.9999\" stroke=\"white\" stroke-width=\"3\" stroke-linecap=\"round\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t<\/summary>\n<p>At cluetec, we take the protection of your personal data very seriously. Detailed information on data protection can be found in our privacy policy. <\/p>\n<p><a href=\"https:\/\/cluetec-audit.de\/en\/privacy-statement-eu\/\">Privacy policy for our website<\/a><\/p>\n<p><a href=\"https:\/\/cluetec-audit.de\/en\/privacy-statement-saas-de\/\">Privacy policy for our SAAS solutions<\/a><\/p>\n<\/details>\n<p>As a TISAX participant, we ensure that all sensitive data is processed at the highest security level. Whether mobile applications or cloud-based systems \u2013 at cluetec Audit, all data is comprehensively protected and managed according to the strictest security requirements. <\/p>\n<p>TISAX participation demonstrates that cluetec adheres to the highest security standards. This strengthens trust between partners and enables secure business relationships \u2013 especially in highly regulated industries such as the automotive sector. <\/p>\n<p>The cluetec audit platform enables companies to manage audit processes entirely digitally \u2013 from planning and execution to follow-up. This allows companies to save time, reduce costs, and minimize sources of error. <\/p>\n<p>As a SaaS solution, cluetec Audit offers flexibility and scalability. Companies can effortlessly adapt and expand their audit processes without compromising data security. <\/p>\n<p>Although ISO 27001 and TISAX both set high standards for information security, there are key differences. TISAX, especially at Level 3, places higher demands on the protection of highly sensitive data. <\/p>\n<p>For us as part of the Possehl Group, compliance is not just a technical term, but an elementary component of our daily activities.<\/p>\n<p>Therefore, trust is essential for the success of cluetec as part of an internationally active corporate group. Good cooperation is based on the trust of customers and business partners, employees, and the respective local business environment. A prerequisite for this is the consistent adherence to high standards of social conduct such as integrity, loyalty, and honesty.  <\/p>\n<p><a href=\"https:\/\/cluetec-audit.de\/en\/compliance\/\">More about compliance<\/a><\/p>\n<p>At cluetec, we take the protection of your personal data very seriously. Detailed information on data protection can be found in our privacy policy. <\/p>\n<p><a href=\"https:\/\/cluetec-audit.de\/en\/privacy-statement-eu\/\">Privacy policy for our website<\/a><\/p>\n<p><a href=\"https:\/\/cluetec-audit.de\/en\/privacy-statement-saas-de\/\">Privacy policy for our SAAS solutions<\/a><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"400\" height=\"160\" src=\"https:\/\/cluetec-audit.de\/wp-content\/uploads\/2025\/01\/part-logo_possehl-secure.svg?wsr\" alt=\"Logo: Possehl Secure\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<h2>Possehl Secure<\/h2>\n<p>Our sister company, Possehl Secure, is an IT security consulting firm that offers customized security solutions for medium-sized and large companies. Their focus is on profitable and customized IT security solutions. <\/p>\n<ul>\n<li>\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Ebene_1\" data-name=\"Ebene 1\" viewBox=\"0 0 48 48\"><defs><\/p>\n<style>      .fuck {        fill: #b9c400;      }      .me {        fill: #eee;      }      .bitch {        fill: #639599;      }    <\/style>\n<p><\/defs><circle cx=\"24\" cy=\"24\" r=\"24\"><\/circle><g><path d=\"M39.57,19.64c1.95-1.95,1.95-5.11,0-7.06s-5.11-1.95-7.06,0l-12.35,12.35,3.53,3.53s0,0,0,0c1.94,1.94,5.08,1.94,7.03.03l8.85-8.85Z\"><\/path><path d=\"M30.72,28.49c-1.95,1.92-5.09,1.91-7.03-.03,0,0,0,0,0,0l-8.27-8.27c-1.95-1.95-5.11-1.95-7.06,0s-1.95,5.11,0,7.06l8.23,8.23s.02.02.03.03c.98.98,2.25,1.46,3.53,1.46,1.28,0,2.56-.49,3.53-1.46,0,0,.02-.02.03-.03l7-7Z\"><\/path><\/g><\/svg><br \/>\n\t\t\t\t\t\t\t\t\t\tPenetration testing and red teaming: uncovering vulnerabilities\n\t\t\t\t\t\t\t\t\t<\/li>\n<li>\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Ebene_1\" data-name=\"Ebene 1\" viewBox=\"0 0 48 48\"><defs><\/p>\n<style>      .fuck {        fill: #b9c400;      }      .me {        fill: #eee;      }      .bitch {        fill: #639599;      }    <\/style>\n<p><\/defs><circle cx=\"24\" cy=\"24\" r=\"24\"><\/circle><g><path d=\"M39.57,19.64c1.95-1.95,1.95-5.11,0-7.06s-5.11-1.95-7.06,0l-12.35,12.35,3.53,3.53s0,0,0,0c1.94,1.94,5.08,1.94,7.03.03l8.85-8.85Z\"><\/path><path d=\"M30.72,28.49c-1.95,1.92-5.09,1.91-7.03-.03,0,0,0,0,0,0l-8.27-8.27c-1.95-1.95-5.11-1.95-7.06,0s-1.95,5.11,0,7.06l8.23,8.23s.02.02.03.03c.98.98,2.25,1.46,3.53,1.46,1.28,0,2.56-.49,3.53-1.46,0,0,.02-.02.03-.03l7-7Z\"><\/path><\/g><\/svg><br \/>\n\t\t\t\t\t\t\t\t\t\tEmail security and identity and access management\n\t\t\t\t\t\t\t\t\t<\/li>\n<li>\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Ebene_1\" data-name=\"Ebene 1\" viewBox=\"0 0 48 48\"><defs><\/p>\n<style>      .fuck {        fill: #b9c400;      }      .me {        fill: #eee;      }      .bitch {        fill: #639599;      }    <\/style>\n<p><\/defs><circle cx=\"24\" cy=\"24\" r=\"24\"><\/circle><g><path d=\"M39.57,19.64c1.95-1.95,1.95-5.11,0-7.06s-5.11-1.95-7.06,0l-12.35,12.35,3.53,3.53s0,0,0,0c1.94,1.94,5.08,1.94,7.03.03l8.85-8.85Z\"><\/path><path d=\"M30.72,28.49c-1.95,1.92-5.09,1.91-7.03-.03,0,0,0,0,0,0l-8.27-8.27c-1.95-1.95-5.11-1.95-7.06,0s-1.95,5.11,0,7.06l8.23,8.23s.02.02.03.03c.98.98,2.25,1.46,3.53,1.46,1.28,0,2.56-.49,3.53-1.46,0,0,.02-.02.03-.03l7-7Z\"><\/path><\/g><\/svg><br \/>\n\t\t\t\t\t\t\t\t\t\tCyber Incident Simulation and Security Operation Center (SOC)\n\t\t\t\t\t\t\t\t\t<\/li>\n<\/ul>\n<p>\t\t\t\t\t<a href=\"https:\/\/www.possehl-secure.de\/\" target=\"_blank\" rel=\"nofollow noopener\"><br \/>\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"18\" height=\"16\" viewBox=\"0 0 18 16\" fill=\"none\"><path d=\"M17.1094 8.89844L10.8594 15.1484C10.625 15.3828 10.3125 15.5 10 15.5C9.64844 15.5 9.33594 15.3828 9.10156 15.1484C8.59375 14.6797 8.59375 13.8594 9.10156 13.3906L13.2031 9.25H1.25C0.546875 9.25 0 8.70312 0 8C0 7.33594 0.546875 6.75 1.25 6.75H13.2031L9.10156 2.64844C8.59375 2.17969 8.59375 1.35938 9.10156 0.890625C9.57031 0.382812 10.3906 0.382812 10.8594 0.890625L17.1094 7.14062C17.6172 7.60938 17.6172 8.42969 17.1094 8.89844Z\" fill=\"white\"><\/path><\/svg><br \/>\n\t\t\t\t\t\t\t\t\tMore<br \/>\n\t\t\t\t\t<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you consider your data to be worth protecting? We do. In today&#8217;s digital business landscape, information security is paramount [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":14965,"parent":15060,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","_improvement_type_select":"improve_an_existing","_thumb_yes_seoaic":false,"_frame_yes_seoaic":false,"seoaic_generate_description":"","seoaic_improve_instructions_prompt":"","seoaic_rollback_content_improvement":"","seoaic_idea_thumbnail_generator":"","thumbnail_generated":false,"thumbnail_generate_prompt":"","seoaic_article_description":"","inline_featured_image":false,"footnotes":""},"class_list":["post-15095","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/cluetec-audit.de\/en\/wp-json\/wp\/v2\/pages\/15095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cluetec-audit.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cluetec-audit.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cluetec-audit.de\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cluetec-audit.de\/en\/wp-json\/wp\/v2\/comments?post=15095"}],"version-history":[{"count":0,"href":"https:\/\/cluetec-audit.de\/en\/wp-json\/wp\/v2\/pages\/15095\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/cluetec-audit.de\/en\/wp-json\/wp\/v2\/pages\/15060"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cluetec-audit.de\/en\/wp-json\/wp\/v2\/media\/14965"}],"wp:attachment":[{"href":"https:\/\/cluetec-audit.de\/en\/wp-json\/wp\/v2\/media?parent=15095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}