{"id":1703,"date":"2026-04-20T13:02:00","date_gmt":"2026-04-20T13:02:00","guid":{"rendered":"https:\/\/stage.nguard.swiss\/?page_id=1703"},"modified":"2026-04-21T18:56:58","modified_gmt":"2026-04-21T18:56:58","slug":"multi-factor-authentifizierung","status":"publish","type":"page","link":"https:\/\/stage.nguard.swiss\/?page_id=1703","title":{"rendered":"Multi Factor Authentifizierung"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1703\" class=\"elementor elementor-1703\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f7896f1 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"f7896f1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ebd81a5 e-con-full e-flex e-con e-child\" data-id=\"ebd81a5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4464915 elementor-widget elementor-widget-heading\" data-id=\"4464915\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Multi-Factor Authentifizierung f\u00fcr Ihr Unternehmen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-204c577 elementor-widget elementor-widget-text-editor\" data-id=\"204c577\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Digitale Zug\u00e4nge sind heute das zentrale Einfallstor f\u00fcr Cyberangriffe. Gleichzeitig greifen Mitarbeitende von unterschiedlichen Ger\u00e4ten, Standorten und Netzwerken auf Unternehmenssysteme zu. Genau hier entsteht ein Spannungsfeld zwischen Benutzerfreundlichkeit und Sicherheit.<br \/>Ein Passwort allein ist dabei wie ein einzelner Schl\u00fcssel, geht er verloren, steht die T\u00fcr offen. Mit Multi Factor Authentifizierung erg\u00e4nzen Sie diesen Schl\u00fcssel um eine zus\u00e4tzliche Sicherheitsebene. So stellen Sie sicher, dass wirklich nur berechtigte Personen Zugriff erhalten. Es entsteht ein Sicherheitskonzept, das nicht nur sch\u00fctzt, sondern sich nahtlos in moderne Arbeitsumgebungen integriert.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-27530db e-con-full e-flex e-con e-child\" data-id=\"27530db\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3659fbc elementor-widget elementor-widget-button\" data-id=\"3659fbc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Jetzt SOC Audit anfordern<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b85f08c e-con-full e-flex e-con e-child\" data-id=\"b85f08c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-666eb96 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"666eb96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/file_0000000081ac71f5a63bd43943512e42-1024x1024.webp\" class=\"attachment-large size-large wp-image-1882\" alt=\"\" srcset=\"https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/file_0000000081ac71f5a63bd43943512e42-1024x1024.webp 1024w, https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/file_0000000081ac71f5a63bd43943512e42-300x300.webp 300w, https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/file_0000000081ac71f5a63bd43943512e42-150x150.webp 150w, https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/file_0000000081ac71f5a63bd43943512e42-768x768.webp 768w, https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/file_0000000081ac71f5a63bd43943512e42.webp 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8d8da9e e-flex e-con-boxed e-con e-parent\" data-id=\"8d8da9e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e74b8f3 e-con-full e-flex e-con e-child\" data-id=\"e74b8f3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-97d03d8 e-con-full e-flex e-con e-child\" data-id=\"97d03d8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f4c52a5 elementor-widget elementor-widget-heading\" data-id=\"f4c52a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Warum Multi Factor Authentifizierung heute unverzichtbar ist<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dc3108 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"1dc3108\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Passw\u00f6rter geh\u00f6ren nach wie vor zu den h\u00e4ufigsten Schwachstellen in der IT-Sicherheit. Sie werden mehrfach verwendet, sind oft zu einfach gew\u00e4hlt oder gelangen durch Phishing-Angriffe in falsche H\u00e4nde. F\u00fcr Angreifer ist der Zugriff auf Zugangsdaten deshalb einer der schnellsten Wege ins Unternehmen.<br \/>Multi Factor Authentifizierung setzt genau an diesem Punkt an. Neben dem Passwort wird eine zus\u00e4tzliche Best\u00e4tigung erforderlich, beispielsweise \u00fcber ein Smartphone oder einen Einmalcode.<br \/>Selbst wenn ein Passwort kompromittiert wird, bleibt der Zugang gesch\u00fctzt.<br \/>Gerade im Umfeld von Cloud-Diensten, Homeoffice und mobilen Arbeitspl\u00e4tzen ist diese zus\u00e4tzliche Sicherheitsebene heute ein wichtiger Bestandteil einer modernen IT-Sicherheitsstrategie.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-94b1b8f e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"94b1b8f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-57decbc e-con-full e-flex e-con e-child\" data-id=\"57decbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d0b3e0 elementor-widget elementor-widget-heading\" data-id=\"6d0b3e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Warum Multi Factor Authentifizierung heute unverzichtbar ist<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb64bfd elementor-widget elementor-widget-text-editor\" data-id=\"fb64bfd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Passw\u00f6rter geh\u00f6ren nach wie vor zu den h\u00e4ufigsten Schwachstellen in der IT-Sicherheit. Sie werden mehrfach verwendet, sind oft zu einfach gew\u00e4hlt oder gelangen durch Phishing-Angriffe in falsche H\u00e4nde. F\u00fcr Angreifer ist der Zugriff auf Zugangsdaten deshalb einer der schnellsten Wege ins Unternehmen.<br \/>Multi Factor Authentifizierung setzt genau an diesem Punkt an. Neben dem Passwort wird eine zus\u00e4tzliche Best\u00e4tigung erforderlich, beispielsweise \u00fcber ein Smartphone oder einen Einmalcode.<br \/>Selbst wenn ein Passwort kompromittiert wird, bleibt der Zugang gesch\u00fctzt.<br \/>Gerade im Umfeld von Cloud-Diensten, Homeoffice und mobilen Arbeitspl\u00e4tzen ist diese zus\u00e4tzliche Sicherheitsebene heute ein wichtiger Bestandteil einer modernen IT-Sicherheitsstrategie.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c5f550 e-con-full changeonhover e-flex e-con e-child\" data-id=\"4c5f550\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-852bd05 elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"852bd05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"&#x421;&#x43B;&#x43E;&#x439;_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 512 512\" overflow=\"visible\" xml:space=\"preserve\"><g id=\"_x23_000000ff\">\t<path d=\"M305.7,0h2.7c4.2,0.7,7.6,4.6,7.3,8.9c0.1,11.8,0,23.5,0,35.3c6.6,2.5,12.4,7.5,15,14.1c2.7,5.8,1.9,12.3,2,18.5  c18.7,0,37.5,0,56.2,0c4.9-0.1,9.9,0.2,14.5,1.8c13.1,4.3,22.7,17.5,23.1,31.3c0.1,8.8,0,17.7,0,26.6c9.1,0.1,18.2,0,27.4,0  c5,0,10.3-0.4,15.1,1.4c7.4,2.5,13.5,8.6,16,16c1.7,4.8,1.4,10,1.4,15.1c0,85.9,0,171.7,0,257.6c6.5,0.3,13.1,2.6,17.7,7.3  c4.4,4.2,7,10,7.9,16v22.4c-1,12.1-7.1,23.7-16.8,31c-6.5,5.1-14.6,7.9-22.9,8.8H39.3c-12.1-1.3-23.7-7.5-30.9-17.4  c-4.9-6.4-7.5-14.3-8.3-22.3v-22.4c1.1-12.8,12.7-23.4,25.6-23.4c0-87.9,0-175.7,0-263.6c-0.8-13.9,11.5-26.7,25.4-26.4  c11.4-0.1,22.9,0,34.3,0c0-8.8-0.1-17.7,0-26.6c0.3-14.1,10.3-27.4,23.8-31.6c5.7-1.9,11.8-1.6,17.8-1.6c51.5,0,103.1,0,154.6,0  c0-6.1-0.5-12.5,2.1-18.1c2.8-6.7,8.4-11.8,15-14.7c-0.1-11.6-0.1-23.3,0-34.9C298.4,4.7,301.6,1,305.7,0L305.7,0z M301.4,62.3  c-3.9,3.8-2.4,9.6-2.7,14.5c5.7,0,11.4,0,17.1,0c-0.4-4.7,1.3-10.3-2.3-14.2C310.5,59,304.5,58.9,301.4,62.3L301.4,62.3z   M118.2,93.9c45.9,37,91.9,73.9,137.9,110.9c45.8-37,91.9-73.8,137.7-110.9C301.9,93.8,210.1,93.8,118.2,93.9L118.2,93.9z   M102.4,112c0,59.4,0,118.7,0,178.1c-0.1,2.3,0.6,4.6,1.3,6.8c40-32.1,79.9-64.2,119.8-96.3c-39.9-32.1-79.8-64.2-119.8-96.2  C102.9,106.8,102.3,109.3,102.4,112L102.4,112z M288.5,200.6c40,32.1,79.8,64.2,119.8,96.3c0.9-2.5,1.4-5.1,1.3-7.8  c0-59,0-118,0-177.1c0.1-2.6-0.5-5.2-1.3-7.7C368.3,136.3,328.4,168.4,288.5,200.6L288.5,200.6z M42.7,163c0,87.9,0,175.8,0,263.7  c142.2,0,284.5,0.1,426.7,0c-0.1-87.9,0-175.8,0-263.7c0.4-4.7-3.5-9.3-8.3-9.3c-11.4-0.1-22.9,0-34.3,0c0,45.5,0,90.9,0,136.4  c0.1,14-9.3,27.5-22.5,32.2c-5.1,2-10.7,2.2-16.1,2.1c-18.4,0-36.8,0-55.3,0c0,5.6,0.1,11.2-0.6,16.8c-2.2,18.1-11,35.3-24.4,47.7  C295,400.5,278.3,408,261,409.4c-14,1-28.3-2-40.7-8.6c-15.8-8.3-28.5-22.3-35.3-38.8c-5.1-11.9-6.3-24.9-5.8-37.7  c-19.7,0-39.5,0-59.2,0c-7.1,0.1-14.2-2.1-20-6.2c-8.9-6.4-14.7-17-14.6-28c0-45.5,0-91,0-136.5c-11.4,0-22.9-0.1-34.3,0  C46.2,153.6,42.2,158.2,42.7,163L42.7,163z M118.2,307.1c20.3,0.1,40.7,0,61,0c0-8.4,0-16.8,0-25.2c0-5.8,1.9-11.7,6-15.8  c6.8-7.2,18.3-8.9,27.1-4.5c3.5,1.7,6.3,4.4,9,7.1c8.8,8.9,17.7,17.6,26.5,26.5c3.1,3.1,4.5,7.5,4.7,11.8c47.1,0,94.3,0.1,141.4,0  c-39.6-31.9-79.3-63.8-118.9-95.6c-5.7,4.3-11.1,10.5-18.9,10.3c-7.8,0.3-13.2-6-18.9-10.3C197.5,243.4,157.8,275.2,118.2,307.1  L118.2,307.1z M197.7,277.8c-1.4,1.3-1.4,3.4-1.5,5.2c0,16.7,0,33.4,0,50c0,12.8,4.3,25.5,12.1,35.7c9.2,12.3,23.3,20.9,38.6,23.1  c13.7,2.2,27.9-1.1,39.7-8.4c13.8-8.4,23.9-22.6,27.5-38.3c1.7-6.8,1.7-13.9,1.6-20.9c-5.6,0-11.3,0-16.9,0  c-0.2,5.3,0.2,10.6-0.8,15.8c-2.2,13.2-11,25-23,30.9c-11.5,5.8-25.7,5.9-37.3,0.3c-11.4-5.4-20.1-16.1-23-28.3  c-2-8.8-1.2-18-1.3-26.9c-0.2-4,2.6-7.9,6.6-8.5c5.1-0.6,10.3-0.1,15.4-0.3c-9.6-9.6-19.2-19.3-28.9-28.8  C204.3,276,200.2,275.6,197.7,277.8L197.7,277.8z M230.4,324.3c0.1,5.8-0.4,11.9,1.9,17.4c3.9,10.3,14.7,17.5,25.7,16.6  c9.7-0.6,18.5-7.3,21.9-16.4c2.3-5.6,1.6-11.8,1.7-17.7C264.5,324.3,247.4,324.2,230.4,324.3L230.4,324.3z M21,445.1  c-2.7,1.6-4.1,4.8-3.9,7.9c0,6-0.1,12,0.1,18c0.5,9.9,7.3,18.9,16.6,22.3c5.8,2.3,12.2,1.5,18.3,1.6c137,0,274.1,0,411.1,0  c4.6,0,9.4,0.3,13.9-1.2c9.6-2.9,16.9-11.9,17.8-21.9c0.3-5.3,0.1-10.5,0.2-15.8c-0.1-2.6,0.3-5.5-1.1-7.9  c-1.5-2.9-4.7-4.6-7.9-4.4c-44,0-87.9,0-131.9,0C348,451.8,342,460,335.9,468c-4.9,6.3-12.9,10-20.8,9.8c-39.4,0-78.8,0-118.2,0  c-8,0.2-15.9-3.6-20.8-9.9c-6.1-8-12.1-16.2-18.2-24.2c-42.6,0-85.2,0-127.8,0C27,443.8,23.7,443.3,21,445.1L21,445.1z   M179.2,443.7c3.4,4.6,6.8,9.2,10.4,13.8c1.7,2.3,4.5,3.4,7.3,3.3c39.4,0,78.8,0,118.1,0c2.8,0.1,5.7-1,7.4-3.3  c3.5-4.5,6.9-9.2,10.3-13.8C281.6,443.7,230.4,443.7,179.2,443.7z\"><\/path>\t<path d=\"M39.4,461.5c6-2.9,13.3,3.2,11.6,9.6c-1,6.1-9.3,9-13.8,4.8C32.3,472.1,33.6,463.6,39.4,461.5z\"><\/path>\t<path d=\"M73.4,461.5c4.2-2,9.7,0.3,11.3,4.7c1.8,4.3-0.7,9.7-5.1,11.2c-4.2,1.6-9.4-0.9-10.8-5.2C67.2,468.1,69.4,463.2,73.4,461.5  z\"><\/path>\t<path d=\"M108.2,461.3c1.6-0.5,3.2-0.4,4.8-0.5c10.6,0.1,21.3,0,31.9,0c4.5-0.1,8.5,3.7,8.6,8.2c0.3,4.6-3.8,8.9-8.4,8.8  c-11.4,0.1-22.8,0.1-34.3,0c-3.9,0.1-7.6-3-8.3-6.9C101.7,466.9,104.3,462.5,108.2,461.3z\"><\/path><\/g><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0e6d7ea e-con-full e-flex e-con e-child\" data-id=\"0e6d7ea\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a2a4cdc elementor-widget elementor-widget-heading\" data-id=\"a2a4cdc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Typische Angriffsszenarien im Alltag<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c203dc elementor-widget elementor-widget-text-editor\" data-id=\"6c203dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Viele Angriffe beginnen unscheinbar, und genau das macht sie so gef\u00e4hrlich:<\/p><ul><li>Phishing-Mails, die t\u00e4uschend echt wirken und Zugangsdaten abgreifen<\/li><li>Gestohlene Passw\u00f6rter durch Datenlecks externer Plattformen<\/li><li>Unsichere oder mehrfach verwendete Zugangsdaten<\/li><li>Unbemerkte Logins aus unbekannten Ger\u00e4ten oder Standorten<\/li><\/ul><p>Ohne zus\u00e4tzliche Absicherung bleiben solche Zugriffe oft lange unentdeckt.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3b82ba8 e-flex e-con-boxed e-con e-parent\" data-id=\"3b82ba8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0cd1c9b elementor-widget elementor-widget-heading\" data-id=\"0cd1c9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">So funktioniert Multi-Factor Authentifizierung<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4d7ba0 elementor-widget elementor-widget-text-editor\" data-id=\"d4d7ba0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Das Prinzip der Multi Factor Authentifizierung basiert auf einer einfachen Idee: Ein einzelner Faktor kann kompromittiert werden, mehrere gleichzeitig deutlich schwerer.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-68529fc e-grid e-con-full e-con e-child\" data-id=\"68529fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0ed260e e-con-full e-flex e-con e-child\" data-id=\"0ed260e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_offset&quot;:50,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76bbb5a elementor-widget elementor-widget-heading\" data-id=\"76bbb5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Die drei Faktoren im \u00dcberblick<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6255b8 elementor-widget elementor-widget-text-editor\" data-id=\"a6255b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Die Firewall-L\u00f6sungen von WatchGuard kombinieren mehrere Schutzfunktionen in einem System. Dazu geh\u00f6ren unter anderem:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92c8c2b elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"92c8c2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Wissen: etwas, das der Nutzer kennt (z. B. Passwort oder PIN)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Besitz: etwas, das der Nutzer besitzt (z. B. Smartphone oder Token)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Identit\u00e4t: etwas, das den Nutzer eindeutig auszeichnet (z. B. Fingerabdruck oder Gesichtserkennung)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32d08e8 elementor-widget elementor-widget-text-editor\" data-id=\"32d08e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Erst wenn mindestens zwei dieser Faktoren korrekt best\u00e4tigt werden, wird der Zugriff gew\u00e4hrt. F\u00fcr Angreifer bedeutet das: Selbst mit gestohlenen Zugangsdaten kommen sie nicht mehr einfach weiter.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d943b57 e-con-full e-flex e-con e-child\" data-id=\"d943b57\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_offset&quot;:50,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f2ce7d elementor-widget elementor-widget-heading\" data-id=\"8f2ce7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Beispiele aus dem Arbeitsalltag<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2023d2 elementor-widget elementor-widget-text-editor\" data-id=\"d2023d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Multi Factor Authentifizierung l\u00e4sst sich unkompliziert in bestehende Prozesse integrieren:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd5b642 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"bd5b642\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Login in Cloud-Dienste mit zus\u00e4tzlicher Best\u00e4tigung \u00fcber eine Authenticator-App<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">VPN-Zugriff mit Einmalcode auf dem Smartphone<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Zugriff auf sensible Systeme nur nach zus\u00e4tzlicher Best\u00e4tigung<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45c653c elementor-widget elementor-widget-text-editor\" data-id=\"45c653c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>F\u00fcr Ihre Mitarbeitenden bleibt der Ablauf einfach, f\u00fcr Angreifer wird er zur echten H\u00fcrde.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6bc5e74 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6bc5e74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Jetzt SOC Audit anfordern<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-065812e e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"065812e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-03b19c6 elementor-widget elementor-widget-heading\" data-id=\"03b19c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Unsere L\u00f6sung f\u00fcr sichere Authentifizierung<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ce0ff1 elementor-widget elementor-widget-text-editor\" data-id=\"6ce0ff1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Die Einf\u00fchrung von Multi Factor Authentifizierung ist keine reine Technikfrage. Entscheidend ist, dass die L\u00f6sung im Alltag funktioniert und von Ihren Mitarbeitenden akzeptiert wird. Wir verbinden Sicherheit mit Benutzerfreundlichkeit und entwickeln eine L\u00f6sung, die zu Ihrem Unternehmen passt, nicht umgekehrt.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2160a08 e-con-full e-flex e-con e-child\" data-id=\"2160a08\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b6946e0 e-con-full serviceHover e-flex e-con e-child\" data-id=\"b6946e0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bad26c8 elementor-widget elementor-widget-image\" data-id=\"bad26c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/1000153268-1024x683.webp\" class=\"attachment-large size-large wp-image-1827\" alt=\"\" srcset=\"https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/1000153268-1024x683.webp 1024w, https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/1000153268-300x200.webp 300w, https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/1000153268-768x512.webp 768w, https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/1000153268.webp 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6a90de elementor-widget elementor-widget-image\" data-id=\"f6a90de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"379\" height=\"512\" src=\"https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/document_white.svg\" class=\"attachment-large size-large wp-image-1889\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc3d30c e-con-full e-flex e-con e-child\" data-id=\"dc3d30c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6817350 elementor-widget elementor-widget-heading\" data-id=\"6817350\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Analyse &amp; Konzept<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2de0b51 elementor-widget elementor-widget-text-editor\" data-id=\"2de0b51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"jkit-icon-box-wrapper hover-from-left\"><div class=\"icon-box icon-box-body\"><p class=\"icon-box-description\">Zu Beginn identifizieren wir gemeinsam mit Ihnen die kritischsten Zug\u00e4nge und Systeme. Darauf aufbauend entwickeln wir ein Authentifizierungskonzept, das Sicherheit und Effizienz sinnvoll kombiniert.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-66f6923 e-con-full serviceHover e-flex e-con e-child\" data-id=\"66f6923\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-039067d elementor-widget elementor-widget-image\" data-id=\"039067d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/file_000000000524720ea9722b135aa4af5d-1024x683.webp\" class=\"attachment-large size-large wp-image-1883\" alt=\"\" srcset=\"https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/file_000000000524720ea9722b135aa4af5d-1024x683.webp 1024w, https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/file_000000000524720ea9722b135aa4af5d-300x200.webp 300w, https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/file_000000000524720ea9722b135aa4af5d-768x512.webp 768w, https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/file_000000000524720ea9722b135aa4af5d.webp 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90cd221 elementor-widget elementor-widget-image\" data-id=\"90cd221\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"496\" height=\"457\" src=\"https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/maintenance_secure_white.svg\" class=\"attachment-large size-large wp-image-1933\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-882f57d e-con-full e-flex e-con e-child\" data-id=\"882f57d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-53c60d3 elementor-widget elementor-widget-heading\" data-id=\"53c60d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Technische Umsetzung<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7235973 elementor-widget elementor-widget-text-editor\" data-id=\"7235973\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Wir integrieren die Multi-Factor Authentifizierung in Ihre bestehende IT-Infrastruktur , ob Cloud-Dienste, interne Anwendungen oder externe Zug\u00e4nge.<\/p><p>Dabei achten wir besonders auf eine saubere, stabile und nachvollziehbare Umsetzung.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-acdb304 e-con-full serviceHover e-flex e-con e-child\" data-id=\"acdb304\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d55a1e elementor-widget elementor-widget-image\" data-id=\"3d55a1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-14.-Apr.-2026-16_07_19-1024x683.webp\" class=\"attachment-large size-large wp-image-1561\" alt=\"\" srcset=\"https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-14.-Apr.-2026-16_07_19-1024x683.webp 1024w, https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-14.-Apr.-2026-16_07_19-300x200.webp 300w, https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-14.-Apr.-2026-16_07_19-768x512.webp 768w, https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/ChatGPT-Image-14.-Apr.-2026-16_07_19.webp 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a04db6 elementor-widget elementor-widget-image\" data-id=\"5a04db6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/stage.nguard.swiss\/wp-content\/uploads\/2026\/04\/continuous_white.svg\" class=\"attachment-large size-large wp-image-1892\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6eb20a2 e-con-full e-flex e-con e-child\" data-id=\"6eb20a2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-458c1e5 elementor-widget elementor-widget-heading\" data-id=\"458c1e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Betrieb &amp; Optimierung<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1027a7f elementor-widget elementor-widget-text-editor\" data-id=\"1027a7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Sicherheitsanforderungen ver\u00e4ndern sich st\u00e4ndig. Neue Tools, neue Arbeitsweisen oder neue Bedrohungen machen Anpassungen notwendig.<br \/>Wir sorgen daf\u00fcr, dass Ihre Authentifizierungsl\u00f6sung kontinuierlich weiterentwickelt wird und langfristig zuverl\u00e4ssig funktioniert.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f7921ae e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"f7921ae\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1cb84aa e-con-full e-flex e-con e-child\" data-id=\"1cb84aa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d7d3032 elementor-widget elementor-widget-heading\" data-id=\"d7d3032\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mehr Sicherheit ohne Mehraufwand<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4011131 elementor-widget elementor-widget-text-editor\" data-id=\"4011131\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Viele Unternehmen bef\u00fcrchten, dass zus\u00e4tzliche Sicherheit automatisch mehr Aufwand bedeutet. In der Praxis zeigt sich jedoch das Gegenteil: Richtig umgesetzt wird Multi Factor Authentifizierung schnell zum selbstverst\u00e4ndlichen Teil des Arbeitsalltags. Moderne L\u00f6sungen sind intuitiv, schnell und benutzerfreundlich. Der zus\u00e4tzliche Schritt dauert meist nur wenige Sekunden, erh\u00f6ht die Sicherheit aber deutlich.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-837115c e-con-full changeonhover e-flex e-con e-child\" data-id=\"837115c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45f63e0 elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"45f63e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"&#x421;&#x43B;&#x43E;&#x439;_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 676.8 676.8\" overflow=\"visible\" xml:space=\"preserve\"><path d=\"M338.4,0C151.5,0,0,151.5,0,338.4s151.5,338.4,338.4,338.4s338.4-151.5,338.4-338.4S525.3,0,338.4,0z M338.4,647.6  c-170.8,0-309.2-138.4-309.2-309.2S167.6,29.2,338.4,29.2s309.2,138.4,309.2,309.2S509.2,647.6,338.4,647.6z\"><\/path><g id=\"_x23_000000ff\">\t<path d=\"M337.8,125.2h1.2c4.7,0.2,8.9,2.7,12.1,5.9c23.7,22.9,52.6,40.3,84.2,49.6c23.8,7.2,48.7,10.1,73.5,10.4   c3.4,0.1,6.8,0,9.9,1.4c5.6,2.4,9.5,8.2,9.6,14.2c0.4,18.6,0.5,37.3,0.7,56c0.9,44.3-0.6,89-10.6,132.3   c-7.9,33.2-21.4,65.4-42,92.7c-16.4,22.2-37.2,40.9-60.2,56c-22.5,14.7-47.1,26.1-72.5,34.9c-1.5,0.4-3,0.8-4.5,1h-2.4   c-5.9-1.4-11.4-4-17.1-5.9c-23-9-45.1-20.1-65.3-34.2c-20.8-14.5-39.5-32.1-54.6-52.6c-24.1-32.6-38.6-71.6-45.2-111.3   c-6.2-35.1-7.4-70.9-6.8-106.5c0.3-20.8,0.4-41.4,0.8-62.2c0-8.3,7.5-15.7,15.9-15.5c28.7-0.2,57.8-3.5,85-13   c28.6-9.7,54.7-26.2,76.3-47C328.9,127.9,333.1,125.4,337.8,125.2L337.8,125.2z M298.5,191.1c-23,13.1-48.4,21.9-74.3,26.7   c-6.9,1.1-13.8,2.1-20.7,3.1c-7.7,0.7-15.4,1.2-23.2,1.8c-0.4,20.8-0.5,41.4-0.9,62.2c0.1,44,3,88.8,17.7,130.7   c10.6,29.6,27.9,57,51.1,78.3c25.6,24.1,57.3,40.8,90.1,52.8c16.7-6.3,33.2-13.4,48.6-22.4c31.4-17.8,59-43.3,76.9-74.8   c18.3-31.1,26.7-66.9,30.6-102.4c4.4-41.3,2.6-82.9,2.1-124.4c-7.9-0.7-15.9-1.2-23.8-1.9c-6.9-1-13.8-2-20.7-3.1   c-16.7-3.2-33.2-7.9-48.9-14.5c-23.7-9.8-45.5-23.7-64.9-40.5C326.1,173.4,312.8,183.1,298.5,191.1z\"><\/path>\t<path d=\"M393.2,297.1c3.3-3.2,7.9-5,12.5-4.5c5.2,0.4,10.2,3.6,12.6,8.3c2.4,4.4,2.5,10,0.3,14.5c-1.5,3.1-4.2,5.3-6.5,7.8   c-26,26-52.1,52.1-78.1,78.1c-2.6,2.5-5,5.1-7.6,7.5c-4.4,3.7-11,4.6-16.3,2.2c-2.6-1.1-4.7-3-6.6-5   c-13.8-13.9-27.9-27.8-41.7-41.7c-3.2-3.1-5.2-7.4-5.2-11.9c-0.1-5.8,3.3-11.4,8.4-14c5.2-2.8,12.2-2.4,16.9,1.3   c2.5,2,4.6,4.3,6.8,6.5c9.1,9.2,18.5,18.4,27.6,27.6C342.1,348.5,367.5,322.5,393.2,297.1z\"><\/path><\/g><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8cc7206 e-con-full e-flex e-con e-child\" data-id=\"8cc7206\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-479f5df elementor-widget elementor-widget-heading\" data-id=\"479f5df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Vorteile f\u00fcr Ihr Unternehmen<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-380a430 elementor-widget elementor-widget-text-editor\" data-id=\"380a430\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>Deutlich reduziertes Risiko durch kompromittierte Zugangsdaten<\/li><li>Schutz sensibler Systeme und Unternehmensdaten<\/li><li>Sichere Nutzung von Cloud- und Remote-Diensten<\/li><li>Transparente und kontrollierbare Zugriffe<\/li><li>Einfache Integration in bestehende IT-Strukturen<\/li><\/ul><p>So entsteht eine Sicherheitsl\u00f6sung, die Ihre Prozesse nicht ausbremst, sondern sinnvoll erg\u00e4nzt.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dd3b1e2 e-con-full changeonhover e-flex e-con e-child\" data-id=\"dd3b1e2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d866e6 elementor-view-stacked elementor-shape-circle elementor-widget elementor-widget-icon\" data-id=\"5d866e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"&#x421;&#x43B;&#x43E;&#x439;_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 512 512\" overflow=\"visible\" xml:space=\"preserve\"><g id=\"_x23_000000ff\">\t<path fill=\"#FFFFFF\" d=\"M376.2,0h48.9c4.1,0.9,7.7,4.1,8.3,8.4c1,7.3,1.6,14.6,2.5,21.8c6.8,3,13.4,6.8,19.4,11.2  c6.8-2.9,13.4-6.1,20.3-8.8c4.6-1.8,10,0.4,12.3,4.7c6.4,11,12.7,22,19.1,33c2,3.5,4.4,6.9,5.2,10.9v1.7c-0.5,2.7-1.6,5.4-3.9,7.1  c-5.7,4.4-11.7,8.6-17.4,12.9c0.8,7.4,0.8,14.9,0,22.3c5.8,4.3,11.7,8.5,17.4,12.9c2.3,1.7,3.5,4.4,4,7.2v2.2  c-1.4,4.4-4.1,8.3-6.4,12.3c-5.6,9.7-11.3,19.4-16.8,29.2c-1.4,2.5-3.1,5.1-5.9,6.2c-3,1.5-6.5,0.8-9.4-0.5  c-6.1-2.7-12.2-5.4-18.4-8.1c-6,4.5-12.5,8.2-19.4,11.2c-0.7,6.1-1.4,12.1-2,18.2c-0.4,3.1-0.7,6.6-3.1,8.9  c-2.4,2.8-6.3,3.3-9.8,3.2c-14.3-0.1-28.7,0-43-0.1c-4.8,0.3-9.5-3.2-10.3-8c-1.2-7.4-1.5-15-2.7-22.4c-6.9-2.8-13.2-6.6-19.2-11  c-6.1,2.7-12.2,5.4-18.3,8c-2.9,1.3-6.3,2-9.3,0.6c-2.8-1.1-4.5-3.7-6-6.2c-7.1-12.6-14.4-25-21.6-37.5c-2.6-4.1-2-10,1.9-13  c5.8-4.6,12-8.8,17.9-13.3c-0.8-7.4-0.8-14.9,0-22.3c-5.2-3.9-10.4-7.7-15.6-11.5c-2.5-1.8-5-4.1-5.5-7.3c-0.8-3.1,0.6-6.1,2.1-8.8  c7.4-12.7,14.6-25.4,22-38.1c2.3-4.3,7.8-6.4,12.3-4.5c6.8,2.7,13.4,5.9,20.2,8.7c6-4.5,12.5-8.2,19.3-11.2  c0.8-7.4,1.4-14.8,2.5-22.1C368.2,3.8,372,0.7,376.2,0L376.2,0z M386.3,20c-0.8,6.3-1.3,12.7-2.2,19c-0.5,3.9-3.6,6.9-7.2,8.1  c-7.6,2.7-14.7,6.6-20.9,11.7c-3,2.8-7.1,5.3-11.4,3.8c-6.2-2.4-12.3-5.3-18.4-7.9c-4.7,8.2-9.4,16.3-14.2,24.5  c5.3,4,10.8,7.7,15.9,11.9c3.5,2.9,3.5,7.7,2.6,11.8c-1.5,8.3-1,16.8,0.4,25c0.8,3.8-1,7.7-4.1,9.9c-4.9,3.6-9.8,7.3-14.7,10.8  c4.6,8.3,9.4,16.4,14.1,24.6c5.8-2.5,11.4-5.1,17.2-7.5c3.7-1.7,8.1-0.6,11,2.1c6.7,5.7,14.4,10.1,22.7,13.1c3.6,1.2,6.6,4.3,7,8.2  c0.9,6.3,1.4,12.6,2.2,18.9c9.4,0,18.9,0,28.3,0c0.6-5.3,1.2-10.7,1.8-16c0.3-2.5,0.6-5.3,2.2-7.3c2-3,5.8-3.8,8.9-5.1  c7.3-2.9,13.9-7.2,19.8-12.3c2.8-2.5,7-3,10.4-1.5c5.8,2.4,11.4,5,17.1,7.4c4.7-8.2,9.4-16.3,14.1-24.5  c-5.1-3.8-10.3-7.5-15.4-11.4c-3.1-2.4-4.3-6.6-3.4-10.4c1.5-8.6,1.6-17.4,0-25.9c-0.9-3.8,0.2-8,3.4-10.4  c5.1-3.9,10.3-7.5,15.4-11.4c-4.7-8.2-9.4-16.3-14.1-24.5c-5.9,2.5-11.7,5.2-17.7,7.6c-3.5,1.4-7.6,0.5-10.3-2  c-6.7-5.8-14.4-10.3-22.7-13.2c-3.7-1.1-6.8-4.3-7.3-8.2c-0.8-6.3-1.4-12.6-2.1-18.9C405.1,20,395.7,20,386.3,20z\"><\/path>\t<path fill=\"#FFFFFF\" d=\"M122.3,29.3c10.2-11.9,26.2-18.5,41.8-17.1c16.1,1.1,31.1,10.7,39.1,24.6c6.3,10.5,8.1,23.2,5.9,35.2  c12.6,0,25.3,0,37.9,0c2.9,0,6.1-0.1,8.5,1.7c3.1,2,4.6,5.7,4.5,9.3c0,56.3,0,112.7,0,169c56.3,0,112.7,0,169,0  c5.6-0.5,11,4.2,10.9,9.9c0.2,13.7,0,27.4,0.1,41.1c14.8-2.9,30.7,1,42.2,10.8c11.9,10,18.8,25.7,17.7,41.3  c-0.9,16.4-10.5,31.9-24.7,40.1c-10.5,6.3-23.2,8.1-35.2,5.9c0,12.7,0,25.3,0,38c0,2.8,0,5.9-1.6,8.4c-1.9,3.2-5.7,4.8-9.4,4.6  c-17.4,0.1-34.7,0-52,0c-2.6-0.1-5.3,0-7.6-1.5c-4-2.4-6-7.8-4-12.1c2.1-4.6,4.3-9.2,4.4-14.3c1.1-12.2-6.4-24.5-17.5-29.4  c-10.6-5-24-2.9-32.5,5.1c-8,7.1-11.6,18.7-9,29.1c0.8,3.9,3.1,7.3,4.3,11.1c1.3,5.2-2.6,11-8,11.8c-3.7,0.4-7.4,0.2-11.1,0.2  c-29,0-58,0-87,0c2.6,13.6-0.4,28.3-8.7,39.4c-8.7,12.1-23,19.8-37.8,20.6h-4.1c-15.6-0.5-30.8-8.8-39.6-21.8  c-7.7-11-10.3-25.1-7.8-38.2c-13.3,0-26.7,0-40,0c-3.6,0.2-7.3-1.4-9.3-4.5c-1.8-2.5-1.7-5.6-1.7-8.5c0.1-12.6,0-25.3,0-37.9  c-13.6,2.6-28.3-0.4-39.5-8.7c-12-8.9-19.6-23.1-20.5-37.9v-5.1c0.9-14.8,8.5-29.2,20.6-37.8c11.2-8.3,25.8-11.3,39.4-8.7  c0-27.3,0-54.6,0-81.9c-13.8,2.7-28.8-0.5-40-9.1c-11.8-8.7-19.1-22.8-20-37.3v-5.1c0.9-14.8,8.4-29.1,20.5-37.8  c11.2-8.3,25.8-11.3,39.5-8.7c0-13.7-0.1-27.3,0.1-41c-0.2-5.3,4.6-10,9.9-9.9c13.7-0.2,27.3,0,41-0.1  C108,57,112.1,40.8,122.3,29.3L122.3,29.3z M135.6,44.6c-6.2,8.4-7.4,20.3-2.9,29.7c1.2,2.7,3,5.5,2.6,8.6  c-0.3,5.1-5.1,9.3-10.2,9.1c-15,0-30.1,0-45.1,0c0,15,0,30.1,0,45.1c0.3,5.1-4,9.9-9.1,10.2c-3.1,0.4-5.9-1.4-8.7-2.6  c-7.9-3.7-17.4-3.5-25.3,0.3c-10.2,4.8-17.2,15.7-17,27c-0.2,11.8,7.5,23.2,18.4,27.6c8.8,3.8,19.1,2.7,27.3-1.9  c5.9-3.3,14.1,1.5,14.2,8.2c0.2,15.4,0,30.7,0.1,46.1c10.3,0,20.7,0,31,0c-2.9-14.5,0.9-30.3,10.4-41.7  c9.9-12.3,25.9-19.3,41.7-18.2c15.6,0.8,30.5,9.6,38.9,22.8c7.1,10.8,9.5,24.4,7,37c10.3,0,20.7,0,31,0c0-53.3,0-106.7,0-160  c-15,0-30,0-45,0c-6.2,0.4-11.6-5.9-10.2-11.9c1.3-4.2,3.9-7.8,4.5-12.2C192.3,54,184,39,170.8,34C158.6,29,143.2,33.6,135.6,44.6  L135.6,44.6z M153.1,212.8c-13.2,2.9-23.4,15.6-23.1,29.2c-0.2,5.8,2,11.2,4.5,16.3c2.8,5.9-2,13.5-8.5,13.6  c-15.4,0.2-30.7,0-46.1,0.1c0,15,0,30,0,45c0.3,5.1-3.9,9.9-9,10.3c-3.2,0.4-5.9-1.4-8.7-2.6c-9.5-4.5-21.3-3.3-29.7,2.9  c-11.2,7.7-15.7,23.5-10.2,36c5.2,12.8,19.9,20.8,33.5,17.7c4.8-0.6,8.6-3.9,13.3-4.7c5.8-0.7,11.3,4.5,10.9,10.3c0.1,15,0,30,0,45  c15,0,30,0,45,0c5.1-0.3,9.9,3.9,10.3,9c0.4,3.4-1.6,6.3-2.8,9.3c-4.4,9.8-2.7,21.9,4,30.2c8.3,10.9,24.3,14.6,36.5,8.5  c12.5-5.8,19.7-20.8,16.1-34.1c-0.8-4.5-4.3-8.2-4.5-12.9c-0.1-5.5,4.8-10.3,10.3-10c15-0.1,30,0,45.1,0c0-10.3,0-20.7,0-31  c-14.5,2.9-30.2-0.9-41.6-10.4c-12.6-10.1-19.7-26.6-18.2-42.7c1.1-14.8,9.3-28.8,21.6-37.1c11-7.7,25.1-10.4,38.2-7.8  c0-10.3,0-20.7,0-31c-15.4-0.1-30.8,0.1-46.1-0.1c-7-0.1-11.7-8.9-7.9-14.8c4.9-8.7,5.4-19.9,0.7-28.8  C180.7,216.3,166.1,209.5,153.1,212.8L153.1,212.8z M260,272c-0.1,15.4,0.1,30.7-0.1,46.1c-0.1,6.5-7.7,11.2-13.6,8.5  c-4.2-2-8.5-4.1-13.2-4.4c-13.6-1.7-27.3,7.3-31.5,20.2c-4.5,12.6,0.8,27.7,12.2,34.8c8.6,5.6,20.1,6.3,29.2,1.7  c2.7-1.4,5.8-2.9,8.9-2.1c4.7,0.8,8.3,5.4,8.1,10.1c0.1,15,0,30,0,45c10.3,0,20.7,0,31,0c-3.1-15.5,1.4-32.3,12.3-43.8  c10.4-11.5,26.4-17.6,41.9-15.9c16.1,1.5,31,11.5,38.7,25.7c5.7,10.2,7.4,22.5,5.2,34c10.3,0,20.7,0,31,0c0-15,0-30,0-45  c-0.3-5.1,4-9.9,9.1-10.3c2.8-0.4,5.4,1.1,7.9,2.2c6.9,3.5,15.1,4,22.5,1.5c8.9-2.9,16.2-10.2,19.1-19.1c4.2-12.1-0.6-26.4-11-33.7  c-9.3-6.9-22.5-7.4-32.5-1.6c-6,3.8-14.8-0.8-14.9-7.9c-0.2-15.4,0-30.7-0.1-46.1C366.7,272,313.3,272,260,272z\"><\/path>\t<path fill=\"#FFFFFF\" d=\"M393.5,75.7c8.9-1.6,18.4,0,26.2,4.5c8.9,5,15.6,13.8,18.2,23.7c2.7,10,1.2,21.1-4.2,29.9  c-5.5,9.3-15.1,16.2-25.7,18.2c-10.5,2.2-21.8-0.3-30.5-6.7c-7.1-5.2-12.4-12.8-14.7-21.3c-2.8-10.2-1.1-21.6,4.6-30.6  C373.1,84.2,382.8,77.6,393.5,75.7L393.5,75.7z M396.4,95.5c-7.1,1.5-13,7.4-14.4,14.6c-1.4,6.3,0.8,13.1,5.4,17.5  c4.8,4.7,12.2,6.4,18.6,4.4c6.7-2,12-8.1,13-15c1.2-6.7-1.6-13.8-7-17.9C407.7,95.6,401.8,94.3,396.4,95.5z\"><\/path><\/g><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-78ae000 e-con-full e-flex e-con e-child\" data-id=\"78ae000\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b8b1e0 elementor-widget elementor-widget-heading\" data-id=\"1b8b1e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Sicherheit als Teil Ihrer Gesamtstrategie<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60e8598 elementor-widget elementor-widget-text-editor\" data-id=\"60e8598\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Multi Factor Authentifizierung wirkt besonders effektiv im Zusammenspiel mit weiteren Sicherheitsmassnahmen. Dazu geh\u00f6ren unter anderem Netzwerkabsicherung, Endpoint-Schutz oder kontinuierliches Monitoring.<br \/>Erst durch diese Kombination entsteht eine ganzheitliche Sicherheitsstrategie, die Ihr Unternehmen nachhaltig sch\u00fctzt und Risiken aktiv reduziert.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ca0c083 e-flex e-con-boxed e-con e-parent\" data-id=\"ca0c083\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8450a5 elementor-widget elementor-widget-heading\" data-id=\"b8450a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jetzt starten<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ec81f1 elementor-widget elementor-widget-text-editor\" data-id=\"7ec81f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Sorgen Sie f\u00fcr eine stabile, sichere und zukunftsf\u00e4hige WLAN-Infrastruktur in Ihrem Unternehmen. Mit professionellen Wireless Access Points schaffen Sie die Basis f\u00fcr effizientes Arbeiten und sch\u00fctzen gleichzeitig Ihre Daten.<br \/>Kontaktieren Sie uns f\u00fcr eine unverbindliche Beratung und erfahren Sie, wie wir Ihre WLAN-Infrastruktur optimal gestalten k\u00f6nnen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-87df494 e-con-full e-flex e-con e-child\" data-id=\"87df494\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7cc8e93 elementor-widget elementor-widget-button\" data-id=\"7cc8e93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Angebot anfordern<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac7e488 elementor-widget elementor-widget-button\" data-id=\"ac7e488\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Test-Account starten<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a02569 e-flex e-con-boxed e-con e-parent\" data-id=\"1a02569\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9db975a e-con-full e-flex e-con e-child\" data-id=\"9db975a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-0d35975 e-con-full e-flex e-con e-child\" data-id=\"0d35975\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea89c2f elementor-widget elementor-widget-heading\" data-id=\"ea89c2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Sch\u00fctzen Sie Ihr Unternehmen mit unserem know-how noch heute:\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3815fd3 e-con-full e-flex e-con e-child\" data-id=\"3815fd3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4134e41 elementor-widget elementor-widget-button\" data-id=\"4134e41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Jetzt Kontakt aufnehmen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-147778e elementor-widget elementor-widget-button\" data-id=\"147778e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Hier geht es zum Test-Account<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Multi-Factor Authentifizierung f\u00fcr Ihr Unternehmen Digitale Zug\u00e4nge sind heute das zentrale Einfallstor f\u00fcr Cyberangriffe. Gleichzeitig greifen Mitarbeitende von unterschiedlichen Ger\u00e4ten, Standorten und Netzwerken auf Unternehmenssysteme zu. Genau hier entsteht ein Spannungsfeld zwischen Benutzerfreundlichkeit und Sicherheit.Ein Passwort allein ist dabei wie ein einzelner Schl\u00fcssel, geht er verloren, steht die T\u00fcr offen. Mit Multi Factor Authentifizierung erg\u00e4nzen [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1703","page","type-page","status-publish","hentry"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/stage.nguard.swiss\/index.php?rest_route=\/wp\/v2\/pages\/1703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stage.nguard.swiss\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/stage.nguard.swiss\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/stage.nguard.swiss\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/stage.nguard.swiss\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1703"}],"version-history":[{"count":82,"href":"https:\/\/stage.nguard.swiss\/index.php?rest_route=\/wp\/v2\/pages\/1703\/revisions"}],"predecessor-version":[{"id":1958,"href":"https:\/\/stage.nguard.swiss\/index.php?rest_route=\/wp\/v2\/pages\/1703\/revisions\/1958"}],"wp:attachment":[{"href":"https:\/\/stage.nguard.swiss\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}