{"id":1146,"date":"2024-07-08T15:37:04","date_gmt":"2024-07-08T13:37:04","guid":{"rendered":"http:\/\/test.h-meyer.de\/?page_id=1146"},"modified":"2026-01-05T12:22:46","modified_gmt":"2026-01-05T11:22:46","slug":"penetrationstests","status":"publish","type":"page","link":"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/","title":{"rendered":"Penetrationstests"},"content":{"rendered":"<div class=\"lazyblock-section-Syb48 wp-block-lazyblock-section\">\r\n\r\n<section  style=\"background-image: url();padding-top:0px;padding-bottom:0px;\" class=\"section is-bg-alignment-top is-color-scheme-light\">\r\n    <div class=\"lazyblock-inner-blocks\">\n<div class=\"lazyblock-hero-banner-Z2dLxRL wp-block-lazyblock-hero-banner\">\r\n\r\n<div class=\"hero-banner\">\r\n    <div class=\"row\">\r\n        <div class=\"col-lg-5 hero-banner-content-col\">\r\n            <div class=\"hero-banner-content\">\r\n                <div class=\"flex-wrap\">\r\n                                            <h1 class=\"display-3\">Penetrationstests<\/h1>\r\n                    \r\n                                            <div class=\"display-6\">Sch\u00fctze deine IT-Systeme<\/div>\r\n                    \r\n                                    <\/div>\r\n            <\/div>\r\n        <\/div>\r\n\r\n        <div class=\"col-lg-7 hero-banner-image\" style=\"background-image: url(https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Sophos_ZTNA_Header-2.png)\">\r\n            <div class=\"hero-banner-image-pattern\">\r\n                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 660.52 1000\">\r\n                    <polygon points=\"0 0 0 1000 660.52 1000 0 0\" \/>\r\n                <\/svg>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n\r\n    <div class=\"hero-banner-divider\">\r\n        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1920.1 100.5\">\r\n            <polygon points=\"1291.34 80.5 .03 .5 .03 100.39 1920.03 100.39 1920.03 .5 1291.34 80.5\" style=\"fill: currentColor;\" class=\"hero-banner-divider-main is-pattern-color-primary\"\" \/>\r\n            <path id=\"accent\" d=\"M.03.5l433.58,100s549.94-39.23,547.4-39.23S.03.5.03.5Z\" style=\"fill: currentColor;\" class=\"hero-banner-divider-accent is-pattern-color-titanium\" \/>\r\n            <polyline id=\"border\" points=\".03 .5 1291.34 80.5 1920.03 .5\" style=\"fill: none; stroke: currentColor; stroke-miterlimit: 10;\" class=\"hero-banner-divider-border\" \/>\r\n        <\/svg>\r\n    <\/div>\r\n<\/div>\r\n<\/div>\n<\/div>\r\n<\/section><\/div>\n\n<div class=\"lazyblock-section-ZEthY2 wp-block-lazyblock-section\">\r\n\r\n<section  style=\"background-image: url();padding-top:80px;padding-bottom:80px;\" class=\"section is-bg-alignment-top is-color-scheme-primary\">\r\n    <div class=\"lazyblock-inner-blocks\">\n<div class=\"lazyblock-container-ZSaRQd wp-block-lazyblock-container\">\r\n\r\n<div class=\"container wp-block-container\">\r\n    <div class=\"lazyblock-inner-blocks\">\n\n<p>Mit unserem Penetration Testing-Service helfen wir dir, potenzielle Schwachstellen in deinen IT-Systemen aufzudecken und diese proaktiv zu beheben, bevor sie von Angreifern ausgenutzt werden k\u00f6nnen.&nbsp;<\/p>\n\n<\/div>\r\n<\/div><\/div>\n<\/div>\r\n<\/section><\/div>\n\n<div class=\"lazyblock-divider-ZMAL5L wp-block-lazyblock-divider\">\n\n<div class=\"divider is-alignment-align_left\">\n            <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" viewBox=\"0 0 1920 100\">\n            <rect id=\"bottom\" width=\"1920\" height=\"99.89\" style=\"fill: currentColor; stroke-width: 0;\" class=\"divider-bottom is-bg-color-light\" \/>\n            <polygon id=\"top\" points=\"0 0 1291.31 80 1920 0 0 0\" style=\"fill: currentColor; stroke-width: 0;\" class=\"divider-top is-bg-color-primary\" \/>\n            <path id=\"accent\" d=\"M0,0l433.58,100s549.94-39.23,547.4-39.23S0,0,0,0Z\" style=\"fill: currentColor; stroke-width: 0;\" class=\"divider-accent is-bg-color-titanium\" \/>\n            <polyline id=\"border\" points=\".03 .5 1291.34 80.5 1920.03 .5\" style=\"fill: none; stroke: currentColor; stroke-miterlimit: 10;\" class=\"divider-border is-bg-color-primary\" \/>\n        <\/svg>\n    <\/div><\/div>\n\n<div class=\"lazyblock-section-ZwNYFv wp-block-lazyblock-section\">\r\n\r\n<section  style=\"background-image: url();padding-top:80px;padding-bottom:80px;\" class=\"section is-bg-alignment-top is-color-scheme-light\">\r\n    <div class=\"lazyblock-inner-blocks\">\n<div class=\"lazyblock-container-1sIsuT wp-block-lazyblock-container\">\r\n\r\n<div class=\"container wp-block-container\">\r\n    <div class=\"lazyblock-inner-blocks\">\n<div class=\"lazyblock-fancy-headline-1GkXzo wp-block-lazyblock-fancy-headline\">\r\n\r\n\r\n<div class=\"fancy-headline text-start\">\r\n    \r\n    <h2 class=\"display-3 fancy-headline-title\">\r\n        Schlie\u00dfe deine Sicherheitsl\u00fccken.    <\/h2>\r\n<\/div><\/div>\n\n\n<p>Penetration Testing, auch bekannt als Pentesting, ist eine wichtige Methode zur Sicherheitsbewertung von IT-Systemen. Bei Pentests handelt es sich um simulierte Angriffe, die aus externen oder internen Quellen stammen k\u00f6nnen. Unser Ziel ist es, potenzielle Schwachstellen in deinen Webanwendungen, Apps, Netzwerken und Infrastruktur zu identifizieren und aufzudecken, sowie die Effektivit\u00e4t deiner Sicherheitsrichtlinien und -prozesse zu bewerten.&nbsp;<\/p>\n\n\n<div class=\"lazyblock-scroll-area-2dL000 wp-block-lazyblock-scroll-area\">\r\n\r\n<div class=\"scroll-area d-none d-xl-block\">\r\n    <div class=\"scroll-area-item\">\r\n        <div class=\"row\">\r\n            <div class=\"col-lg-4 scroll-area-nav-col\">\r\n                <div class=\"scroll-area-nav\">\r\n                    <div class=\"scroll-area-nav-list\">\r\n                                                    <div class=\"scroll-area-nav-list-item scroll-area-nav-list-item-1 is-active\">\r\n                                <a href=\"#scroll-to-1\">\r\n                                    <img decoding=\"async\" class=\"scroll-area-nav-list-item-image\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Planung_inactive-1.png\" loading=\"lazy\" \/>\r\n                                    <img decoding=\"async\" class=\"scroll-area-nav-list-item-image-active\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Planung_active-1.png\" loading=\"lazy\" \/>\r\n                                <\/a>\r\n                            <\/div>\r\n                                                    <div class=\"scroll-area-nav-list-item scroll-area-nav-list-item-2 \">\r\n                                <a href=\"#scroll-to-2\">\r\n                                    <img decoding=\"async\" class=\"scroll-area-nav-list-item-image\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Informationsbeschaffung_inactive.png\" loading=\"lazy\" \/>\r\n                                    <img decoding=\"async\" class=\"scroll-area-nav-list-item-image-active\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Informationsbeschaffung_Active.png\" loading=\"lazy\" \/>\r\n                                <\/a>\r\n                            <\/div>\r\n                                                    <div class=\"scroll-area-nav-list-item scroll-area-nav-list-item-3 \">\r\n                                <a href=\"#scroll-to-3\">\r\n                                    <img decoding=\"async\" class=\"scroll-area-nav-list-item-image\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Schwachstellen_inactive.png\" loading=\"lazy\" \/>\r\n                                    <img decoding=\"async\" class=\"scroll-area-nav-list-item-image-active\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Schwachstellen_active.png\" loading=\"lazy\" \/>\r\n                                <\/a>\r\n                            <\/div>\r\n                                                    <div class=\"scroll-area-nav-list-item scroll-area-nav-list-item-4 \">\r\n                                <a href=\"#scroll-to-4\">\r\n                                    <img decoding=\"async\" class=\"scroll-area-nav-list-item-image\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Nachbereitung_inactive.png\" loading=\"lazy\" \/>\r\n                                    <img decoding=\"async\" class=\"scroll-area-nav-list-item-image-active\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Nachbereitung_Active.png\" loading=\"lazy\" \/>\r\n                                <\/a>\r\n                            <\/div>\r\n                                                    <div class=\"scroll-area-nav-list-item scroll-area-nav-list-item-5 \">\r\n                                <a href=\"#scroll-to-5\">\r\n                                    <img decoding=\"async\" class=\"scroll-area-nav-list-item-image\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Behebung_inactive.png\" loading=\"lazy\" \/>\r\n                                    <img decoding=\"async\" class=\"scroll-area-nav-list-item-image-active\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Behebung_active.png\" loading=\"lazy\" \/>\r\n                                <\/a>\r\n                            <\/div>\r\n                                            <\/div>\r\n                <\/div>\r\n            <\/div>\r\n\r\n            <div class=\"col-lg-8\">\r\n                <div class=\"row\">\r\n                    <div class=\"col-lg-6\">\r\n                                                    <div class=\"scroll-area-content\" id=\"scroll-to-1\">\r\n                                <div class=\"scroll-area-content-inner\"\r\n                                     data-index=\"1\"\r\n                                     data-image-url=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Security-Tiles-02.png\">\r\n\r\n                                    <div class=\"scroll-area-title\">\r\n                                                                                    <div class=\"display-6\">Planung und Vorbereitung<\/div>\r\n                                        \r\n                                                                            <\/div>\r\n\r\n                                    <div class=\"scroll-area-text\">\r\n                                                                                    Gemeinsam definieren wir die Ziele sowie die Rahmenbedingungen und w\u00e4hlen die geeigneten Testmethoden und Tools, um ein effektives und individuell an dein Unternehmen angepasstes Testszenario zu gew\u00e4hrleisten. Zudem stellen wir sicher, dass alle rechtlichen und organisatorischen Genehmigungen vorliegen.                                                                             <\/div>\r\n\r\n                                    \r\n                                    <div class=\"scroll-area-action\">\r\n                                                                            <\/div>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                    <div class=\"scroll-area-content\" id=\"scroll-to-2\">\r\n                                <div class=\"scroll-area-content-inner\"\r\n                                     data-index=\"2\"\r\n                                     data-image-url=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Security-Tiles-03-1.png\">\r\n\r\n                                    <div class=\"scroll-area-title\">\r\n                                                                                    <div class=\"display-6\">Informationsbeschaffung<\/div>\r\n                                        \r\n                                                                            <\/div>\r\n\r\n                                    <div class=\"scroll-area-text\">\r\n                                                                                    Um eine fundierte Basis zu schaffen, sammeln wir sowohl Daten aus \u00f6ffentlichen Quellen oder sozialen Medien als auch Daten durch direkte Interkationen mit dem Zielsystem, wie Netzwerk-Scanning oder DNS-Abfrage, um mehr \u00fcber die Infrastruktur zu erfahren.                                                                             <\/div>\r\n\r\n                                    \r\n                                    <div class=\"scroll-area-action\">\r\n                                                                            <\/div>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                    <div class=\"scroll-area-content\" id=\"scroll-to-3\">\r\n                                <div class=\"scroll-area-content-inner\"\r\n                                     data-index=\"3\"\r\n                                     data-image-url=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Security-Tiles-04-1.png\">\r\n\r\n                                    <div class=\"scroll-area-title\">\r\n                                                                                    <div class=\"display-6\">Identifizieren und ausnutzen von Schwachstellen<\/div>\r\n                                        \r\n                                                                            <\/div>\r\n\r\n                                    <div class=\"scroll-area-text\">\r\n                                                                                    Durch einer detaillierte Schwachstellenanalyse identifizieren wir potenzielle Schwachstellen in deinem System und nutzen diese, um deren tats\u00e4chliche Gef\u00e4hrdung zu bewerten. Mittels simulierter Angriffe wird versucht in das System einzudringen, um Zugang zu sensiblen Daten zu erlangen oder Systemkontrollen zu \u00fcbernehmen. Anschlie\u00dfend analysieren wir, welche Auswirkungen ein erfolgreicher Angriff auf dein Unternehmen hat.                                                                             <\/div>\r\n\r\n                                    \r\n                                    <div class=\"scroll-area-action\">\r\n                                                                            <\/div>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                    <div class=\"scroll-area-content\" id=\"scroll-to-4\">\r\n                                <div class=\"scroll-area-content-inner\"\r\n                                     data-index=\"4\"\r\n                                     data-image-url=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Security-Tiles-05-1.png\">\r\n\r\n                                    <div class=\"scroll-area-title\">\r\n                                                                                    <div class=\"display-6\">Nachbereitung<\/div>\r\n                                        \r\n                                                                            <\/div>\r\n\r\n                                    <div class=\"scroll-area-text\">\r\n                                                                                    Alle festgestellten Sicherheitsprobleme werden dir zusammen mit einer Folgenabsch\u00e4tzung, einem Vorschlag zur Risikominderung oder einer technischen L\u00f6sung sowie einer konkreten Handlungsempfehlung pr\u00e4sentiert.                                                                             <\/div>\r\n\r\n                                    \r\n                                    <div class=\"scroll-area-action\">\r\n                                                                            <\/div>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                    <div class=\"scroll-area-content\" id=\"scroll-to-5\">\r\n                                <div class=\"scroll-area-content-inner\"\r\n                                     data-index=\"5\"\r\n                                     data-image-url=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Security-Tiles-06-1.png\">\r\n\r\n                                    <div class=\"scroll-area-title\">\r\n                                                                                    <div class=\"display-6\">Schwachstellenbehebung: <\/div>\r\n                                        \r\n                                                                            <\/div>\r\n\r\n                                    <div class=\"scroll-area-text\">\r\n                                                                                    Durch Implementieren von Ma\u00dfnahmen zur Behebung der identifizierten Schwachstellen und Durchf\u00fchrung eines erneuten Tests, stellen wir sicher, dass die Schwachstellen tats\u00e4chlich behoben wurden und keine neuen Sicherheitsl\u00fccken entstanden sind.                                                                             <\/div>\r\n\r\n                                    \r\n                                    <div class=\"scroll-area-action\">\r\n                                                                            <\/div>\r\n                                <\/div>\r\n                            <\/div>\r\n                                            <\/div>\r\n\r\n                    <div class=\"col-lg-6\">\r\n                        <div class=\"scroll-area-aside\">\r\n                            <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Security-Tiles-02.png\" class=\"img-fluid\" loading=\"lazy\" \/>\r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n<div thumbsSlider=\"\" class=\"swiper scroll-area-thumbnail-slider d-none\">\r\n    <div class=\"swiper-wrapper\">\r\n                    <div class=\"swiper-slide\">\r\n                <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Planung_inactive-1.png\" class=\"scroll-area-thumbnail-slider-image img-fluid\" loading=\"lazy\" \/>\r\n                <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Planung_active-1.png\" class=\"scroll-area-thumbnail-slider-image is-active img-fluid\" loading=\"lazy\" \/>\r\n            <\/div>\r\n                    <div class=\"swiper-slide\">\r\n                <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Informationsbeschaffung_inactive.png\" class=\"scroll-area-thumbnail-slider-image img-fluid\" loading=\"lazy\" \/>\r\n                <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Informationsbeschaffung_Active.png\" class=\"scroll-area-thumbnail-slider-image is-active img-fluid\" loading=\"lazy\" \/>\r\n            <\/div>\r\n                    <div class=\"swiper-slide\">\r\n                <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Schwachstellen_inactive.png\" class=\"scroll-area-thumbnail-slider-image img-fluid\" loading=\"lazy\" \/>\r\n                <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Schwachstellen_active.png\" class=\"scroll-area-thumbnail-slider-image is-active img-fluid\" loading=\"lazy\" \/>\r\n            <\/div>\r\n                    <div class=\"swiper-slide\">\r\n                <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Nachbereitung_inactive.png\" class=\"scroll-area-thumbnail-slider-image img-fluid\" loading=\"lazy\" \/>\r\n                <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Nachbereitung_Active.png\" class=\"scroll-area-thumbnail-slider-image is-active img-fluid\" loading=\"lazy\" \/>\r\n            <\/div>\r\n                    <div class=\"swiper-slide\">\r\n                <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Behebung_inactive.png\" class=\"scroll-area-thumbnail-slider-image img-fluid\" loading=\"lazy\" \/>\r\n                <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Behebung_active.png\" class=\"scroll-area-thumbnail-slider-image is-active img-fluid\" loading=\"lazy\" \/>\r\n            <\/div>\r\n            <\/div>\r\n<\/div>\r\n\r\n<div class=\"swiper scroll-area-slider d-xl-none\">\r\n    <div class=\"swiper-wrapper\">\r\n                    <div class=\"swiper-slide scroll-area-slider-item\"\r\n                 data-index=\"0\">\r\n\r\n                <div class=\"row\">\r\n                    <div class=\"col-12 col-md-6 scroll-area-slider-item-image-col\">\r\n                        <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Security-Tiles-02.png\" class=\"img-fluid\" loading=\"lazy\" \/>\r\n                    <\/div>\r\n\r\n                    <div class=\"col-12 col-md-6 scroll-area-slider-item-content-col\">\r\n                        <div class=\"scroll-area-title\">\r\n                                                            <div class=\"display-6\">Planung und Vorbereitung<\/div>\r\n                            \r\n                                                    <\/div>\r\n\r\n                        <div class=\"scroll-area-text\">\r\n                                                            Gemeinsam definieren wir die Ziele sowie die Rahmenbedingungen und w\u00e4hlen die geeigneten Testmethoden und Tools, um ein effektives und individuell an dein Unternehmen angepasstes Testszenario zu gew\u00e4hrleisten. Zudem stellen wir sicher, dass alle rechtlichen und organisatorischen Genehmigungen vorliegen.                                                     <\/div>\r\n\r\n                        \r\n                        <div class=\"scroll-area-action\">\r\n                                                    <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/div>\r\n                    <div class=\"swiper-slide scroll-area-slider-item\"\r\n                 data-index=\"1\">\r\n\r\n                <div class=\"row\">\r\n                    <div class=\"col-12 col-md-6 scroll-area-slider-item-image-col\">\r\n                        <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Security-Tiles-03-1.png\" class=\"img-fluid\" loading=\"lazy\" \/>\r\n                    <\/div>\r\n\r\n                    <div class=\"col-12 col-md-6 scroll-area-slider-item-content-col\">\r\n                        <div class=\"scroll-area-title\">\r\n                                                            <div class=\"display-6\">Informationsbeschaffung<\/div>\r\n                            \r\n                                                    <\/div>\r\n\r\n                        <div class=\"scroll-area-text\">\r\n                                                            Um eine fundierte Basis zu schaffen, sammeln wir sowohl Daten aus \u00f6ffentlichen Quellen oder sozialen Medien als auch Daten durch direkte Interkationen mit dem Zielsystem, wie Netzwerk-Scanning oder DNS-Abfrage, um mehr \u00fcber die Infrastruktur zu erfahren.                                                     <\/div>\r\n\r\n                        \r\n                        <div class=\"scroll-area-action\">\r\n                                                    <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/div>\r\n                    <div class=\"swiper-slide scroll-area-slider-item\"\r\n                 data-index=\"2\">\r\n\r\n                <div class=\"row\">\r\n                    <div class=\"col-12 col-md-6 scroll-area-slider-item-image-col\">\r\n                        <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Security-Tiles-04-1.png\" class=\"img-fluid\" loading=\"lazy\" \/>\r\n                    <\/div>\r\n\r\n                    <div class=\"col-12 col-md-6 scroll-area-slider-item-content-col\">\r\n                        <div class=\"scroll-area-title\">\r\n                                                            <div class=\"display-6\">Identifizieren und ausnutzen von Schwachstellen<\/div>\r\n                            \r\n                                                    <\/div>\r\n\r\n                        <div class=\"scroll-area-text\">\r\n                                                            Durch einer detaillierte Schwachstellenanalyse identifizieren wir potenzielle Schwachstellen in deinem System und nutzen diese, um deren tats\u00e4chliche Gef\u00e4hrdung zu bewerten. Mittels simulierter Angriffe wird versucht in das System einzudringen, um Zugang zu sensiblen Daten zu erlangen oder Systemkontrollen zu \u00fcbernehmen. Anschlie\u00dfend analysieren wir, welche Auswirkungen ein erfolgreicher Angriff auf dein Unternehmen hat.                                                     <\/div>\r\n\r\n                        \r\n                        <div class=\"scroll-area-action\">\r\n                                                    <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/div>\r\n                    <div class=\"swiper-slide scroll-area-slider-item\"\r\n                 data-index=\"3\">\r\n\r\n                <div class=\"row\">\r\n                    <div class=\"col-12 col-md-6 scroll-area-slider-item-image-col\">\r\n                        <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Security-Tiles-05-1.png\" class=\"img-fluid\" loading=\"lazy\" \/>\r\n                    <\/div>\r\n\r\n                    <div class=\"col-12 col-md-6 scroll-area-slider-item-content-col\">\r\n                        <div class=\"scroll-area-title\">\r\n                                                            <div class=\"display-6\">Nachbereitung<\/div>\r\n                            \r\n                                                    <\/div>\r\n\r\n                        <div class=\"scroll-area-text\">\r\n                                                            Alle festgestellten Sicherheitsprobleme werden dir zusammen mit einer Folgenabsch\u00e4tzung, einem Vorschlag zur Risikominderung oder einer technischen L\u00f6sung sowie einer konkreten Handlungsempfehlung pr\u00e4sentiert.                                                     <\/div>\r\n\r\n                        \r\n                        <div class=\"scroll-area-action\">\r\n                                                    <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/div>\r\n                    <div class=\"swiper-slide scroll-area-slider-item\"\r\n                 data-index=\"4\">\r\n\r\n                <div class=\"row\">\r\n                    <div class=\"col-12 col-md-6 scroll-area-slider-item-image-col\">\r\n                        <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Security-Tiles-06-1.png\" class=\"img-fluid\" loading=\"lazy\" \/>\r\n                    <\/div>\r\n\r\n                    <div class=\"col-12 col-md-6 scroll-area-slider-item-content-col\">\r\n                        <div class=\"scroll-area-title\">\r\n                                                            <div class=\"display-6\">Schwachstellenbehebung: <\/div>\r\n                            \r\n                                                    <\/div>\r\n\r\n                        <div class=\"scroll-area-text\">\r\n                                                            Durch Implementieren von Ma\u00dfnahmen zur Behebung der identifizierten Schwachstellen und Durchf\u00fchrung eines erneuten Tests, stellen wir sicher, dass die Schwachstellen tats\u00e4chlich behoben wurden und keine neuen Sicherheitsl\u00fccken entstanden sind.                                                     <\/div>\r\n\r\n                        \r\n                        <div class=\"scroll-area-action\">\r\n                                                    <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/div>\r\n            <\/div>\r\n\r\n    <div class=\"swiper-scrollbar\"><\/div>\r\n<\/div><\/div>\n<\/div>\r\n<\/div><\/div>\n<\/div>\r\n<\/section><\/div>\n\n<div class=\"lazyblock-section-Z1nugEh wp-block-lazyblock-section\">\r\n\r\n<section  style=\"background-image: url();padding-top:80px;padding-bottom:80px;\" class=\"section is-bg-alignment-top is-color-scheme-light\">\r\n    <div class=\"lazyblock-inner-blocks\">\n<div class=\"lazyblock-container-28jppK wp-block-lazyblock-container\">\r\n\r\n<div class=\"container wp-block-container\">\r\n    <div class=\"lazyblock-inner-blocks\">\n<div class=\"lazyblock-fancy-headline-1pFA8d wp-block-lazyblock-fancy-headline\">\r\n\r\n\r\n<div class=\"fancy-headline text-start\">\r\n            <div class=\"fancy-headline-sublime h2\">\r\n            Zusammen mit unseren Partner bieten wir dir folgende        <\/div>\r\n    \r\n    <h2 class=\"display-3 fancy-headline-title\">\r\n        Pen-Testing Techniken    <\/h2>\r\n<\/div><\/div>\n\n<div class=\"lazyblock-vertical-slider-1v3brV wp-block-lazyblock-vertical-slider\">\n<div class=\"swiper vertical-slider\">\n    <div class=\"vertical-slider-bg\">\n        <div class=\"vertical-slider-bg-image\" style=\"background-image: url(https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Portfolio-Systemhaus-1920-x-1080-px-2.png);\"><\/div>\n    <\/div>\n\n    <div class=\"swiper-wrapper\">\n                    <div class=\"swiper-slide vertical-slider-item\">\n                <div class=\"row vertical-slider-item-row\">\n                    <div class=\"col-lg-6 vertical-slider-item-image-col\">\n                        <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/BlackBox.png\" class=\"img-fluid\" loading=\"lazy\" \/>\n                    <\/div>\n\n                    <div class=\"col-lg-6 vertical-slider-item-content-col\">\n                        <div class=\"vertical-slider-item-content\">\n                                                            <div class=\"display-6 vertical-slider-item-content-title\">Black-Box<\/div>\n                            \n                                                            <div class=\"vertical-slider-item-content-text\">Bei Black-Box-Penetrationstests hat der Tester keinerlei Informationen \u00fcber das Ziel. Er versucht, das System wie ein echter Hacker anzugreifen und Schwachstellen zu finden. Dieser Test ist sehr realistisch und kann komplexe Probleme und Schwachstellen wie Cross-Site-Scripting (auch als XSS bekannt, mit dem Bedrohungsakteure den Betrieb von Webseiten st\u00f6ren k\u00f6nnen), SQL-Injektionen, Server-Fehlkonfigurationen usw. zu erkennen.  <\/div>\n                            \n                                                    <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n                    <div class=\"swiper-slide vertical-slider-item\">\n                <div class=\"row vertical-slider-item-row\">\n                    <div class=\"col-lg-6 vertical-slider-item-image-col\">\n                        <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/GrayBox.png\" class=\"img-fluid\" loading=\"lazy\" \/>\n                    <\/div>\n\n                    <div class=\"col-lg-6 vertical-slider-item-content-col\">\n                        <div class=\"vertical-slider-item-content\">\n                                                            <div class=\"display-6 vertical-slider-item-content-title\">Gray-Box<\/div>\n                            \n                                                            <div class=\"vertical-slider-item-content-text\">Hierbei verf\u00fcgt der Tester \u00fcber grundlegende Kenntnisse \u00fcber dein System, deine Anwendungen und dein Netzwerk. Der Tester erh\u00e4lt Zugangsdaten, Netzwerkpl\u00e4ne und logische Flussdiagramme auf niedriger Ebene. Gray-Box-Penetrationstests sind hilfreich, da einige Schwachstellen nur durch die Betrachtung von Quellcodes gefunden werden k\u00f6nnen. Solche Anf\u00e4lligkeiten bleiben bei einem Black-Box-Penetrationstest unentdeckt.<\/div>\n                            \n                                                    <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n                    <div class=\"swiper-slide vertical-slider-item\">\n                <div class=\"row vertical-slider-item-row\">\n                    <div class=\"col-lg-6 vertical-slider-item-image-col\">\n                        <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/WhiteBox.png\" class=\"img-fluid\" loading=\"lazy\" \/>\n                    <\/div>\n\n                    <div class=\"col-lg-6 vertical-slider-item-content-col\">\n                        <div class=\"vertical-slider-item-content\">\n                                                            <div class=\"display-6 vertical-slider-item-content-title\">White-Box<\/div>\n                            \n                                                            <div class=\"vertical-slider-item-content-text\">Bei White-Box-Penetrationstests hat der Tester das Privileg alle Informationen \u00fcber das System zu erhalten. Das bedeutet, dass er bereits \u00fcber Anmeldeinformationen, Quellcodes, Infrastrukturpl\u00e4ne und alles, was f\u00fcr einen Angriff auf ein System erforderlich ist, verf\u00fcgt. Die Technik der White-Box-Penetrationstests wird grunds\u00e4tzlich angewandt, um potenzielle Schwachstellen aufzusp\u00fcren. Dabei kann es sich um einen schlecht geschriebenen Code oder das Fehlen robuster Sicherheitsma\u00dfnahmen handeln.<\/div>\n                            \n                                                    <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n            <\/div>\n\n    <div class=\"swiper-navigation\">\n        <div class=\"swiper-button-next\">\n            <span class=\"icon icon-arrow-up-right\"><?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 1000\">\n    <path d=\"M921.17,0H319.65c-43.52,0-78.83,35.31-78.83,78.83s35.31,78.83,78.83,78.83h411.21L23.1,865.43c-30.79,30.79-30.79,80.68,0,111.48,15.4,15.4,35.57,23.1,55.74,23.1s40.34-7.7,55.74-23.1L842.33,269.14v411.21c0,43.52,35.31,78.83,78.83,78.83s78.83-35.31,78.83-78.83V78.83c0-43.52-35.31-78.83-78.83-78.83Z\" \/>\n<\/svg><\/span>        <\/div>\n        <div class=\"swiper-button-prev\">\n            <span class=\"icon icon-arrow-down-left\"><?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000.02 1000\">\n    <path d=\"M980.08,19.95c-26.59-26.59-69.68-26.59-96.27,0L136.16,767.57v-452.54c0-37.61-30.47-68.08-68.08-68.08S0,277.42,0,315.03v616.89c0,37.59,30.47,68.08,68.08,68.08h616.89c37.59,0,68.08-30.49,68.08-68.08s-30.49-68.08-68.08-68.08H232.43L980.08,116.22c26.59-26.57,26.59-69.68,0-96.27Z\" \/>\n<\/svg><\/span>        <\/div>\n    <\/div>\n<\/div><\/div>\n<\/div>\r\n<\/div><\/div>\n<\/div>\r\n<\/section><\/div>\n\n<div class=\"lazyblock-divider-Z20NpSE wp-block-lazyblock-divider\">\n\n<div class=\"divider is-alignment-align_left\">\n            <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" viewBox=\"0 0 1920 100\">\n            <rect id=\"bottom\" width=\"1920\" height=\"99.89\" style=\"fill: currentColor; stroke-width: 0;\" class=\"divider-bottom is-bg-color-dark\" \/>\n            <polygon id=\"top\" points=\"0 0 1291.31 80 1920 0 0 0\" style=\"fill: currentColor; stroke-width: 0;\" class=\"divider-top is-bg-color-light\" \/>\n            <path id=\"accent\" d=\"M0,0l433.58,100s549.94-39.23,547.4-39.23S0,0,0,0Z\" style=\"fill: currentColor; stroke-width: 0;\" class=\"divider-accent is-bg-color-primary\" \/>\n            <polyline id=\"border\" points=\".03 .5 1291.34 80.5 1920.03 .5\" style=\"fill: none; stroke: currentColor; stroke-miterlimit: 10;\" class=\"divider-border is-bg-color-light\" \/>\n        <\/svg>\n    <\/div><\/div>\n\n<div class=\"lazyblock-section-JaT8D wp-block-lazyblock-section\">\r\n\r\n<section  style=\"background-image: url();padding-top:80px;padding-bottom:80px;\" class=\"section is-bg-alignment-top is-color-scheme-dark\">\r\n    <div class=\"lazyblock-inner-blocks\">\n<div class=\"lazyblock-container-1Ss2dW wp-block-lazyblock-container\">\r\n\r\n<div class=\"container wp-block-container\">\r\n    <div class=\"lazyblock-inner-blocks\">\n<div class=\"lazyblock-fancy-headline-1HHj5U wp-block-lazyblock-fancy-headline\">\r\n\r\n\r\n<div class=\"fancy-headline text-start\">\r\n    \r\n    <h2 class=\"display-3 fancy-headline-title\">\r\n        Verbessere jetzt deine IT-Sicherheit.    <\/h2>\r\n<\/div><\/div>\n\n<div class=\"lazyblock-image-text-ZP9AIs wp-block-lazyblock-image-text\">\r\n<div class=\"hero-text-image\">\r\n    <div class=\"row \">\r\n        <div class=\"col-12 col-lg-6 hero-text-image-image-col\">\r\n            <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/IT-Security-Grafik-_White.png\" alt=\"\" class=\"img-fluid\" loading=\"lazy\" \/>\r\n        <\/div>\r\n\r\n        <div class=\"col-12 col-lg-6 hero-text-image-text-col\">\r\n            <div class=\"hero-text-image-content\">\r\n                                    <div class=\"display-6 hero-text-image-content-title\">\r\n                        Verbessere jetzt deine IT-Sicherheit.                    <\/div>\r\n                \r\n                \r\n                                    <div class=\"hero-text-image-content-text\">\r\n                        Penetrationstests sind ein unverzichtbares Werkzeug zur Verbesserung der IT-Sicherheit. Ein systematischer Ansatz und die Einhaltung bew\u00e4hrter Verfahren sind dabei entscheidend f\u00fcr den Erfolg. Mit unserem Penetration Testing-Service kannst du dein Unternehmen effektiv vor potenziellen Cyberbedrohungen sch\u00fctzen und deine IT-Sicherheitsstandards deutlich erh\u00f6hen.                    <\/div>\r\n                \r\n\r\n                            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n<\/div><\/div>\n\n\n<p><\/p>\n\n<\/div>\r\n<\/div><\/div>\n<\/div>\r\n<\/section><\/div>\n\n<div class=\"lazyblock-divider-Z1NFcGW wp-block-lazyblock-divider\">\n\n<div class=\"divider is-alignment-align_left\">\n            <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" viewBox=\"0 0 1920 100\">\n            <rect id=\"bottom\" width=\"1920\" height=\"99.89\" style=\"fill: currentColor; stroke-width: 0;\" class=\"divider-bottom is-bg-color-primary-dark\" \/>\n            <polygon id=\"top\" points=\"0 0 1291.31 80 1920 0 0 0\" style=\"fill: currentColor; stroke-width: 0;\" class=\"divider-top is-bg-color-dark\" \/>\n            <path id=\"accent\" d=\"M0,0l433.58,100s549.94-39.23,547.4-39.23S0,0,0,0Z\" style=\"fill: currentColor; stroke-width: 0;\" class=\"divider-accent is-bg-color-primary\" \/>\n            <polyline id=\"border\" points=\".03 .5 1291.34 80.5 1920.03 .5\" style=\"fill: none; stroke: currentColor; stroke-miterlimit: 10;\" class=\"divider-border is-bg-color-dark\" \/>\n        <\/svg>\n    <\/div><\/div>\n\n<div class=\"lazyblock-section-ZVj9bK wp-block-lazyblock-section\">\r\n\r\n<section  style=\"background-image: url();padding-top:80px;padding-bottom:80px;\" class=\"section is-bg-alignment-top is-color-scheme-primary-dark\">\r\n    <div class=\"lazyblock-inner-blocks\">\n<div class=\"lazyblock-container-lYNAD wp-block-lazyblock-container\">\r\n\r\n<div class=\"container wp-block-container\">\r\n    <div class=\"lazyblock-inner-blocks\">\n<div class=\"lazyblock-fancy-headline-Z1ThsSU wp-block-lazyblock-fancy-headline\">\r\n\r\n\r\n<div class=\"fancy-headline text-start\">\r\n    \r\n    <h3 class=\"display-3 fancy-headline-title\">\r\n        Du w\u00fcnschst eine pers\u00f6nliche Beratung?    <\/h3>\r\n<\/div><\/div>\n\n<div class=\"lazyblock-advisor-Z3575b wp-block-lazyblock-advisor\"><div class=\"row\">\r\n            \r\n        \r\n                                    \r\n                \r\n                <div class=\"col-xl-6 advisor-col\">\r\n                    <div class=\"advisor-item\">\r\n                        <div class=\"row advisor-item-row\">\r\n                            <div class=\"col-lg-4\">\r\n                                <img decoding=\"async\" src=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2025\/09\/Bastian-Grossmann-3.png\" class=\"img-fluid\" loading=\"lazy\" \/>\r\n                            <\/div>\r\n\r\n                            <div class=\"col-lg-8\">\r\n                                <div class=\"advisor-name\">Bastian Grossmann<\/div>\r\n                                <div class=\"advisor-workspace\"><\/div>\r\n                                <div class=\"advisor-phone\">\r\n                                    <span class=\"icon icon-phone\"><?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 1003.68\">\n    <path d=\"M281.75,8.72C216.51-7.8,148.28-.77,94.78,29.16,40.33,59.63,2.1,113.58.22,185.87c-2.94,112.85,23.21,264.31,126.96,442.17,102.42,175.58,215.52,280.81,309.33,343.39,59.26,39.53,124.78,40.58,180.72,14.8,55.07-25.38,99.83-76.03,123.07-138.87,11.7-31.63,8.95-66.79-7.53-96.22l-59.74-106.67c-37.99-67.84-119.99-97.54-192.61-69.76l-41.7,15.95c-20.21,7.73-38.8,4.17-49.36-6.2-35.41-34.78-60.71-82.01-72.18-132.88-3.61-16,3.72-34.91,21.43-48.28l37.66-28.42c62.98-47.53,80.77-134.48,41.53-202.92l-60.89-106.19c-16.29-28.41-43.41-48.99-75.16-57.04ZM62.85,187.51c1.26-48.43,25.77-83.11,62.53-103.67,37.71-21.1,89.17-27.51,141-14.38,15.29,3.87,28.35,13.79,36.19,27.47l60.89,106.19c23.55,41.07,12.87,93.24-24.92,121.75l-37.66,28.42c-32.53,24.55-55.05,66.67-44.81,112.07,13.89,61.57,44.66,119.85,89.4,163.79,32.66,32.08,79.26,33.94,115.64,20.02l41.7-15.95c43.57-16.67,92.77,1.15,115.57,41.85l59.74,106.67c7.51,13.42,8.77,29.46,3.43,43.88-18.18,49.15-52.27,86.07-90.53,103.71-37.38,17.22-79.67,16.71-119.74-10.02-85.88-57.29-192.36-155.5-289.98-322.84C83.35,428.57,60.21,288.59,62.85,187.51ZM670.64,5.37c-15.12-8.4-34.2-2.95-42.6,12.17-8.4,15.12-2.95,34.19,12.17,42.6l24.06,13.36c152.55,84.75,253.9,238.87,271.26,412.52l1.97,19.72c1.72,17.21,17.07,29.78,34.28,28.05s29.77-17.07,28.05-34.29l-1.97-19.72c-19.41-194.08-132.68-366.33-303.17-461.05l-24.05-13.36ZM597.25,173.26c8.9-14.83,28.14-19.65,42.97-10.74l7.78,4.67c102.31,61.39,172.55,164.55,192.17,282.24l2.79,16.73c2.85,17.07-8.69,33.2-25.75,36.05-17.07,2.84-33.2-8.68-36.05-25.75l-2.79-16.73c-16.6-99.58-76.03-186.88-162.6-238.82l-7.78-4.67c-14.83-8.9-19.64-28.14-10.74-42.98Z\" \/>\n<\/svg><\/span>                                    <a href=\"tel: 06894 16889-126\">06894 16889-126<\/a>\r\n                                <\/div>\r\n                                <div class=\"advisor-mail\">\r\n                                    <span class=\"icon icon-envelope\"><?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 800\">\n    <path d=\"M162.5,0h675c86.66,0,157.47,67.82,162.25,153.28l.25,9.22v475c0,86.65-67.82,157.46-153.28,162.24l-9.23.26H162.5c-86.65,0-157.46-67.83-162.24-153.28l-.26-9.22V162.5C0,75.85,67.82,5.04,153.28.26l9.22-.26h675H162.5ZM925,268.65l-407.53,214.53c-9.38,4.94-20.31,5.64-30.13,2.12l-4.81-2.12L75,268.7v368.8c0,45.91,35.36,83.56,80.32,87.21l7.18.29h675c45.91,0,83.56-35.36,87.21-80.33l.29-7.18v-368.85ZM837.5,75H162.5c-45.91,0-83.56,35.36-87.21,80.32l-.29,7.18v21.45l425,223.67,425-223.72v-21.4c0-45.91-35.36-83.56-80.32-87.21l-7.18-.29Z\" \/>\n<\/svg><\/span>                                    <a href=\"mailto: bgrossmann@implement-it.de\">bgrossmann@implement-it.de<\/a>\r\n                                <\/div>\r\n                            <\/div>\r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                        <\/div>\r\n<\/div>\n<\/div>\r\n<\/div><\/div>\n<\/div>\r\n<\/section><\/div>\n\n<div class=\"lazyblock-section-thFEW wp-block-lazyblock-section\">\r\n\r\n<section  style=\"background-image: url();padding-top:0px;padding-bottom:0px;\" class=\"section is-bg-alignment-top is-color-scheme-light\">\r\n    <div class=\"lazyblock-inner-blocks\">\n<div class=\"lazyblock-contact-box-62430 wp-block-lazyblock-contact-box\">\r\n<div class=\"contact-box\">\r\n    <div class=\"container\">\r\n        <div class=\"contact-box-inner\">\r\n            <div class=\"row\">\r\n                <div class=\"col-lg-4\">\r\n                    <div class=\"contact-box-sidebar contact-box-sidebar-col\">\r\n                        <div class=\"contact-box-teaser\">\r\n                            <div class=\"display-6\">Kontakt<\/div>\r\n                            <p>\r\n                                &#8222;Bereit f\u00fcr innovative L\u00f6sungen? Kontaktieren Sie uns bei Implement-IT, Ihrem Expertenteam f\u00fcr IT-Systeml\u00f6sungen. Lassen Sie uns gemeinsam Ihre Anforderungen besprechen und die passende L\u00f6sung finden. Wir freuen uns darauf, von Ihnen zu h\u00f6ren!&#8220;                            <\/p>\r\n                        <\/div>\r\n\r\n                        <div class=\"contact-box-info is-vertrieb\">\r\n                            <span class=\"icon icon-vertrieb\"><?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 942.86\">\n    <path d=\"M300,57.14c-71.01,0-128.57,57.56-128.57,128.57s57.56,128.57,128.57,128.57,128.57-57.56,128.57-128.57-57.56-128.57-128.57-128.57ZM114.29,185.71C114.29,83.15,197.43,0,300,0s185.71,83.15,185.71,185.71-83.15,185.71-185.71,185.71-185.71-83.15-185.71-185.71ZM742.86,371.43c-78.9,0-142.86-63.96-142.86-142.86s63.96-142.86,142.86-142.86,142.86,63.96,142.86,142.86-63.96,142.86-142.86,142.86ZM556.55,453.17c-19.47-15.41-44.08-24.6-70.84-24.6H114.29c-63.12,0-114.29,51.17-114.29,114.29v3.76s0,.27,0,.27v.74c.03.59.05,1.37.09,2.32.09,1.9.25,4.51.57,7.72.63,6.42,1.87,15.31,4.3,25.86,4.84,21.04,14.54,49.15,34.02,77.35,40.06,57.98,117.4,110.54,261.01,110.54,50.69,0,93.12-6.55,128.57-17.57v-60.48c-32.25,12.63-74.11,20.91-128.57,20.91-127.82,0-186.19-45.65-213.99-85.89-14.44-20.9-21.71-41.9-25.35-57.69-1.81-7.87-2.69-14.32-3.12-18.65-.21-2.15-.31-3.77-.36-4.74l-.03-.96v-.06s0-3.44,0-3.44c0-31.56,25.58-57.14,57.14-57.14h371.43c12.12,0,23.35,3.77,32.6,10.2,8.6-3.45,17.61-6.08,26.94-7.81,2.27-12.27,6.11-23.99,11.3-34.94ZM742.86,142.86c-47.34,0-85.71,38.38-85.71,85.71s38.38,85.71,85.71,85.71,85.71-38.38,85.71-85.71-38.37-85.71-85.71-85.71ZM600,542.86v-28.57c0-47.34,38.38-85.71,85.71-85.71h114.29c47.34,0,85.71,38.38,85.71,85.71v28.57h28.57c47.34,0,85.71,38.38,85.71,85.71v85.71h-114.29v-28.57c0-15.78-12.79-28.57-28.57-28.57s-28.57,12.79-28.57,28.57v28.57h-171.43v-28.57c0-15.78-12.79-28.57-28.57-28.57s-28.57,12.79-28.57,28.57v28.57h-114.29v-85.71c0-47.34,38.38-85.71,85.71-85.71h28.57ZM657.14,514.29v28.57h171.43v-28.57c0-15.78-12.79-28.57-28.57-28.57h-114.29c-15.78,0-28.57,12.79-28.57,28.57ZM885.71,771.43h114.29v85.71c0,47.34-38.37,85.71-85.71,85.71h-342.86c-47.34,0-85.71-38.38-85.71-85.71v-85.71h114.29v28.57c0,15.78,12.79,28.57,28.57,28.57s28.57-12.79,28.57-28.57v-28.57h171.43v28.57c0,15.78,12.79,28.57,28.57,28.57s28.57-12.79,28.57-28.57v-28.57Z\" \/>\n<\/svg><\/span>                            <div class=\"h5 contact-box-info-title\">Vertrieb<\/div>\r\n\r\n                            <div class=\"contact-box-info-list\">\r\n                                <div class=\"list-item\">\r\n                                    <span class=\"icon icon-phone\"><?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 1003.68\">\n    <path d=\"M281.75,8.72C216.51-7.8,148.28-.77,94.78,29.16,40.33,59.63,2.1,113.58.22,185.87c-2.94,112.85,23.21,264.31,126.96,442.17,102.42,175.58,215.52,280.81,309.33,343.39,59.26,39.53,124.78,40.58,180.72,14.8,55.07-25.38,99.83-76.03,123.07-138.87,11.7-31.63,8.95-66.79-7.53-96.22l-59.74-106.67c-37.99-67.84-119.99-97.54-192.61-69.76l-41.7,15.95c-20.21,7.73-38.8,4.17-49.36-6.2-35.41-34.78-60.71-82.01-72.18-132.88-3.61-16,3.72-34.91,21.43-48.28l37.66-28.42c62.98-47.53,80.77-134.48,41.53-202.92l-60.89-106.19c-16.29-28.41-43.41-48.99-75.16-57.04ZM62.85,187.51c1.26-48.43,25.77-83.11,62.53-103.67,37.71-21.1,89.17-27.51,141-14.38,15.29,3.87,28.35,13.79,36.19,27.47l60.89,106.19c23.55,41.07,12.87,93.24-24.92,121.75l-37.66,28.42c-32.53,24.55-55.05,66.67-44.81,112.07,13.89,61.57,44.66,119.85,89.4,163.79,32.66,32.08,79.26,33.94,115.64,20.02l41.7-15.95c43.57-16.67,92.77,1.15,115.57,41.85l59.74,106.67c7.51,13.42,8.77,29.46,3.43,43.88-18.18,49.15-52.27,86.07-90.53,103.71-37.38,17.22-79.67,16.71-119.74-10.02-85.88-57.29-192.36-155.5-289.98-322.84C83.35,428.57,60.21,288.59,62.85,187.51ZM670.64,5.37c-15.12-8.4-34.2-2.95-42.6,12.17-8.4,15.12-2.95,34.19,12.17,42.6l24.06,13.36c152.55,84.75,253.9,238.87,271.26,412.52l1.97,19.72c1.72,17.21,17.07,29.78,34.28,28.05s29.77-17.07,28.05-34.29l-1.97-19.72c-19.41-194.08-132.68-366.33-303.17-461.05l-24.05-13.36ZM597.25,173.26c8.9-14.83,28.14-19.65,42.97-10.74l7.78,4.67c102.31,61.39,172.55,164.55,192.17,282.24l2.79,16.73c2.85,17.07-8.69,33.2-25.75,36.05-17.07,2.84-33.2-8.68-36.05-25.75l-2.79-16.73c-16.6-99.58-76.03-186.88-162.6-238.82l-7.78-4.67c-14.83-8.9-19.64-28.14-10.74-42.98Z\" \/>\n<\/svg><\/span>                                    06894 16889 \u2013 160                                <\/div>\r\n\r\n                                <div class=\"list-item\">\r\n                                    <span class=\"icon icon-envelope\"><?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 800\">\n    <path d=\"M162.5,0h675c86.66,0,157.47,67.82,162.25,153.28l.25,9.22v475c0,86.65-67.82,157.46-153.28,162.24l-9.23.26H162.5c-86.65,0-157.46-67.83-162.24-153.28l-.26-9.22V162.5C0,75.85,67.82,5.04,153.28.26l9.22-.26h675H162.5ZM925,268.65l-407.53,214.53c-9.38,4.94-20.31,5.64-30.13,2.12l-4.81-2.12L75,268.7v368.8c0,45.91,35.36,83.56,80.32,87.21l7.18.29h675c45.91,0,83.56-35.36,87.21-80.33l.29-7.18v-368.85ZM837.5,75H162.5c-45.91,0-83.56,35.36-87.21,80.32l-.29,7.18v21.45l425,223.67,425-223.72v-21.4c0-45.91-35.36-83.56-80.32-87.21l-7.18-.29Z\" \/>\n<\/svg><\/span>                                    vertrieb@implement-it.de                                <\/div>\r\n\r\n                                <div class=\"list-item\">\r\n                                    <span class=\"icon icon-working-hours\"><?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 999.99 1000\">\n  <path d=\"M159.08,454.55c0-213.38,172.98-386.36,386.36-386.36s386.36,172.98,386.36,386.36-172.98,386.36-386.35,386.36v68.18c251.04,0,454.54-203.51,454.54-454.55S796.48,0,545.44,0,90.9,203.51,90.9,454.55c0,9.36.28,18.66.84,27.89,18.73-15.2,41.94-25.09,67.34-27.38v-.51ZM545.13,211.29c-2.25-16.63-16.53-29.47-33.78-29.47-18.82,0-34.09,15.27-34.09,34.09v272.73l.31,4.62c2.25,16.64,16.53,29.47,33.78,29.47h181.82l4.62-.31c16.64-2.25,29.47-16.53,29.47-33.78,0-18.82-15.27-34.09-34.09-34.09h-147.73v-238.64l-.31-4.62ZM329.55,568.18h-159.09c-6.28,0-11.36,5.09-11.36,11.36v56.82h181.82v-56.82c0-6.28-5.09-11.36-11.36-11.36ZM90.91,636.36v-56.82c0-43.93,35.61-79.55,79.55-79.55h159.09c43.93,0,79.55,35.61,79.55,79.55v56.82h22.73c37.66,0,68.18,30.53,68.18,68.18v68.18h-90.91v-22.73c0-12.55-10.18-22.73-22.73-22.73s-22.73,10.18-22.73,22.73v22.73h-227.27v-22.73c0-12.55-10.17-22.73-22.73-22.73s-22.73,10.18-22.73,22.73v22.73H0v-68.18c0-37.65,30.53-68.18,68.18-68.18h22.73ZM363.64,840.91v-22.73h-227.27v22.73c0,12.55-10.17,22.73-22.73,22.73s-22.73-10.18-22.73-22.73v-22.73H0v113.64c0,37.65,30.53,68.18,68.18,68.18h363.64c37.66,0,68.18-30.53,68.18-68.18v-113.64h-90.91v22.73c0,12.55-10.18,22.73-22.73,22.73s-22.73-10.18-22.73-22.73Z\" \/>\n<\/svg><\/span>                                    7.30 bis 17.30 Uhr                                <\/div>\r\n                            <\/div>\r\n                        <\/div>\r\n\r\n                        <div class=\"contact-box-info is-service\">\r\n                            <span class=\"icon icon-it-service\"><?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 942.78\">\n    <path d=\"M168.15,192.17c0-66.33,53.77-120.11,120.11-120.11s120.11,53.77,120.11,120.11-53.78,120.11-120.11,120.11-120.11-53.77-120.11-120.11ZM288.26,0C182.13,0,96.09,86.04,96.09,192.17s86.04,192.17,192.17,192.17,192.17-86.04,192.17-192.17S394.39,0,288.26,0ZM648.59,240.22c0-39.8,32.26-72.07,72.07-72.07s72.07,32.26,72.07,72.07-32.26,72.07-72.07,72.07-72.07-32.26-72.07-72.07ZM720.65,96.09c-79.6,0-144.13,64.53-144.13,144.13s64.53,144.13,144.13,144.13,144.13-64.53,144.13-144.13-64.53-144.13-144.13-144.13ZM108.1,480.43c-59.7,0-108.1,48.4-108.1,108.1v12.12s0,.13,0,.13v.3s.02.8.02.8c.01.62.04,1.41.08,2.37.09,1.91.26,4.49.57,7.62.63,6.26,1.84,14.85,4.21,25.01,4.72,20.24,14.17,47.28,33.16,74.41,39.34,56.2,114.34,105.45,250.22,105.45,65.77,0,117.28-11.54,157.38-29.82-7.16-23.75-11.57-48.68-12.85-74.44-30.99,18.3-76.66,32.2-144.53,32.2-116.35,0-167.46-40.83-191.18-74.71-12.54-17.91-18.86-35.91-22.02-49.46-1.57-6.73-2.33-12.22-2.68-15.81-.18-1.79-.26-3.09-.29-3.81l-.02-.6v-11.75c0-19.9,16.13-36.03,36.03-36.03h359.47c11.94-22.9,26.63-44.14,43.64-63.27-13.12-5.66-27.58-8.8-42.78-8.8H108.1ZM589.84,527.32c15.13,52.38-16.32,106.83-69.24,119.93l-28.07,6.95c-2.16,13.82-3.28,28-3.28,42.45s1.22,29.94,3.58,44.37l25.92,6.24c53.45,12.87,85.22,67.88,69.66,120.61l-8.95,30.33c21.1,18.53,45.14,33.57,71.3,44.27l23.7-24.92c37.89-39.84,101.41-39.83,139.28.02l23.96,25.21c26.12-10.58,50.14-25.49,71.24-43.86l-9.52-32.95c-15.12-52.38,16.32-106.83,69.24-119.93l28.04-6.94c2.16-13.82,3.28-28.01,3.28-42.46s-1.23-29.95-3.58-44.37l-25.89-6.24c-53.45-12.87-85.22-67.88-69.66-120.61l8.94-30.31c-21.1-18.53-45.14-33.58-71.31-44.29l-23.69,24.91c-37.88,39.84-101.41,39.83-139.28-.02l-23.96-25.21c-26.11,10.58-50.13,25.48-71.24,43.85l9.52,32.97ZM744.63,768.71c-38.46,0-69.65-32.26-69.65-72.07s31.18-72.07,69.65-72.07,69.65,32.26,69.65,72.07-31.18,72.07-69.65,72.07Z\" \/>\n<\/svg><\/span>                            <div class=\"h5 contact-box-info-title\">IT-Service<\/div>\r\n\r\n                            <div class=\"contact-box-info-list\">\r\n                                <div class=\"list-item\">\r\n                                    <span class=\"icon icon-phone\"><?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 1003.68\">\n    <path d=\"M281.75,8.72C216.51-7.8,148.28-.77,94.78,29.16,40.33,59.63,2.1,113.58.22,185.87c-2.94,112.85,23.21,264.31,126.96,442.17,102.42,175.58,215.52,280.81,309.33,343.39,59.26,39.53,124.78,40.58,180.72,14.8,55.07-25.38,99.83-76.03,123.07-138.87,11.7-31.63,8.95-66.79-7.53-96.22l-59.74-106.67c-37.99-67.84-119.99-97.54-192.61-69.76l-41.7,15.95c-20.21,7.73-38.8,4.17-49.36-6.2-35.41-34.78-60.71-82.01-72.18-132.88-3.61-16,3.72-34.91,21.43-48.28l37.66-28.42c62.98-47.53,80.77-134.48,41.53-202.92l-60.89-106.19c-16.29-28.41-43.41-48.99-75.16-57.04ZM62.85,187.51c1.26-48.43,25.77-83.11,62.53-103.67,37.71-21.1,89.17-27.51,141-14.38,15.29,3.87,28.35,13.79,36.19,27.47l60.89,106.19c23.55,41.07,12.87,93.24-24.92,121.75l-37.66,28.42c-32.53,24.55-55.05,66.67-44.81,112.07,13.89,61.57,44.66,119.85,89.4,163.79,32.66,32.08,79.26,33.94,115.64,20.02l41.7-15.95c43.57-16.67,92.77,1.15,115.57,41.85l59.74,106.67c7.51,13.42,8.77,29.46,3.43,43.88-18.18,49.15-52.27,86.07-90.53,103.71-37.38,17.22-79.67,16.71-119.74-10.02-85.88-57.29-192.36-155.5-289.98-322.84C83.35,428.57,60.21,288.59,62.85,187.51ZM670.64,5.37c-15.12-8.4-34.2-2.95-42.6,12.17-8.4,15.12-2.95,34.19,12.17,42.6l24.06,13.36c152.55,84.75,253.9,238.87,271.26,412.52l1.97,19.72c1.72,17.21,17.07,29.78,34.28,28.05s29.77-17.07,28.05-34.29l-1.97-19.72c-19.41-194.08-132.68-366.33-303.17-461.05l-24.05-13.36ZM597.25,173.26c8.9-14.83,28.14-19.65,42.97-10.74l7.78,4.67c102.31,61.39,172.55,164.55,192.17,282.24l2.79,16.73c2.85,17.07-8.69,33.2-25.75,36.05-17.07,2.84-33.2-8.68-36.05-25.75l-2.79-16.73c-16.6-99.58-76.03-186.88-162.6-238.82l-7.78-4.67c-14.83-8.9-19.64-28.14-10.74-42.98Z\" \/>\n<\/svg><\/span>                                    06894 16889 \u2013 120                                <\/div>\r\n\r\n                                <div class=\"list-item\">\r\n                                    <span class=\"icon icon-envelope\"><?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 800\">\n    <path d=\"M162.5,0h675c86.66,0,157.47,67.82,162.25,153.28l.25,9.22v475c0,86.65-67.82,157.46-153.28,162.24l-9.23.26H162.5c-86.65,0-157.46-67.83-162.24-153.28l-.26-9.22V162.5C0,75.85,67.82,5.04,153.28.26l9.22-.26h675H162.5ZM925,268.65l-407.53,214.53c-9.38,4.94-20.31,5.64-30.13,2.12l-4.81-2.12L75,268.7v368.8c0,45.91,35.36,83.56,80.32,87.21l7.18.29h675c45.91,0,83.56-35.36,87.21-80.33l.29-7.18v-368.85ZM837.5,75H162.5c-45.91,0-83.56,35.36-87.21,80.32l-.29,7.18v21.45l425,223.67,425-223.72v-21.4c0-45.91-35.36-83.56-80.32-87.21l-7.18-.29Z\" \/>\n<\/svg><\/span>                                    support@implement-it.de                                <\/div>\r\n\r\n                                <div class=\"list-item\">\r\n                                    <span class=\"icon icon-working-hours\"><?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 999.99 1000\">\n  <path d=\"M159.08,454.55c0-213.38,172.98-386.36,386.36-386.36s386.36,172.98,386.36,386.36-172.98,386.36-386.35,386.36v68.18c251.04,0,454.54-203.51,454.54-454.55S796.48,0,545.44,0,90.9,203.51,90.9,454.55c0,9.36.28,18.66.84,27.89,18.73-15.2,41.94-25.09,67.34-27.38v-.51ZM545.13,211.29c-2.25-16.63-16.53-29.47-33.78-29.47-18.82,0-34.09,15.27-34.09,34.09v272.73l.31,4.62c2.25,16.64,16.53,29.47,33.78,29.47h181.82l4.62-.31c16.64-2.25,29.47-16.53,29.47-33.78,0-18.82-15.27-34.09-34.09-34.09h-147.73v-238.64l-.31-4.62ZM329.55,568.18h-159.09c-6.28,0-11.36,5.09-11.36,11.36v56.82h181.82v-56.82c0-6.28-5.09-11.36-11.36-11.36ZM90.91,636.36v-56.82c0-43.93,35.61-79.55,79.55-79.55h159.09c43.93,0,79.55,35.61,79.55,79.55v56.82h22.73c37.66,0,68.18,30.53,68.18,68.18v68.18h-90.91v-22.73c0-12.55-10.18-22.73-22.73-22.73s-22.73,10.18-22.73,22.73v22.73h-227.27v-22.73c0-12.55-10.17-22.73-22.73-22.73s-22.73,10.18-22.73,22.73v22.73H0v-68.18c0-37.65,30.53-68.18,68.18-68.18h22.73ZM363.64,840.91v-22.73h-227.27v22.73c0,12.55-10.17,22.73-22.73,22.73s-22.73-10.18-22.73-22.73v-22.73H0v113.64c0,37.65,30.53,68.18,68.18,68.18h363.64c37.66,0,68.18-30.53,68.18-68.18v-113.64h-90.91v22.73c0,12.55-10.18,22.73-22.73,22.73s-22.73-10.18-22.73-22.73Z\" \/>\n<\/svg><\/span>                                    08:00 bis 17.00 Uhr                                <\/div>\r\n                            <\/div>\r\n                        <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n\r\n                <div class=\"col-lg-8 contact-box-form-col\">\r\n                    <div class=\"contact-box-form\">\r\n                        \n<div class=\"wpcf7 no-js\" id=\"wpcf7-f106-o1\" lang=\"de-DE\" dir=\"ltr\" data-wpcf7-id=\"106\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/systemhaus\/wp-json\/wp\/v2\/pages\/1146#wpcf7-f106-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Kontaktformular\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"106\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"de_DE\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f106-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<div class=\"row form-row\">\n<div class=\"col-lg-6\">\n<span class=\"wpcf7-form-control-wrap\" data-name=\"salutation\"><select class=\"wpcf7-form-control wpcf7-select\" aria-invalid=\"false\" name=\"salutation\"><option value=\"\">&#8211; Bitte ausw\u00e4hlen &#8211;<\/option><option value=\"Anrede\">Anrede<\/option><option value=\"Herr\">Herr<\/option><option value=\"Frau\">Frau<\/option><\/select><\/span>\n<\/div>\n\n<div class=\"col-lg-6\">\n<span class=\"wpcf7-form-control-wrap\" data-name=\"firstname\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Vorname*\" value=\"\" type=\"text\" name=\"firstname\" \/><\/span>\n<\/div>\n\n<div class=\"col-lg-6\">\n<span class=\"wpcf7-form-control-wrap\" data-name=\"lastname\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Nachname*\" value=\"\" type=\"text\" name=\"lastname\" \/><\/span>\n<\/div>\n\n<div class=\"col-lg-6\">\n<span class=\"wpcf7-form-control-wrap\" data-name=\"mail\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"E-Mail*\" value=\"\" type=\"email\" name=\"mail\" \/><\/span>\n<\/div>\n\n<div class=\"col-lg-6\">\n<span class=\"wpcf7-form-control-wrap\" data-name=\"phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Telefon*\" value=\"\" type=\"text\" name=\"phone\" \/><\/span>\n<\/div>\n\n<div class=\"col-12\">\n<span class=\"wpcf7-form-control-wrap\" data-name=\"company\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" placeholder=\"Unternehmen\" value=\"\" type=\"text\" name=\"company\" \/><\/span>\n<\/div>\n\n<div class=\"col-12\">\n<span class=\"wpcf7-form-control-wrap\" data-name=\"interest\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" placeholder=\"Wof\u00fcr interessierst du dich?\" value=\"\" type=\"text\" name=\"interest\" \/><\/span>\n<\/div>\n\n<div class=\"col-12\">\n<span class=\"wpcf7-form-control-wrap\" data-name=\"message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" placeholder=\"Wie k\u00f6nnen wir dir weiterhelfen?\" name=\"message\"><\/textarea><\/span>\n<\/div>\n\n<div class=\"col-12\">\n<label>Einen Anhang hinzuf\u00fcgen (max. 2 MB)<\/label>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"upload-file-95\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-drag-n-drop-file d-none\" aria-invalid=\"false\" type=\"file\" multiple=\"multiple\" data-name=\"upload-file-95\" data-type=\"jpeg|png|jpg|pdf\" data-limit=\"2000000\" data-max=\"3\" data-id=\"106\" data-version=\"free version 1.3.9.6\" accept=\".jpeg, .png, .jpg, .pdf\" \/><\/span>\n<\/div>\n\n<span id=\"wpcf7-69df3b5576298-wrapper\" class=\"wpcf7-form-control-wrap address-wrap\" style=\"display:none !important; visibility:hidden !important;\"><label for=\"wpcf7-69df3b5576298-field\" class=\"hp-message\">Bitte lasse dieses Feld leer.<\/label><input id=\"wpcf7-69df3b5576298-field\"  class=\"wpcf7-form-control wpcf7-text\" type=\"text\" name=\"address\" value=\"\" size=\"40\" tabindex=\"-1\" autocomplete=\"new-password\" \/><\/span>\n\n<div class=\"col-lg-12\">\n<span class=\"wpcf7-form-control-wrap\" data-name=\"dsgvo\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"dsgvo\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">Ich habe die\u00a0<a href=\"https:\/\/implement-it.de\/systemhaus\/datenschutzerklaerung\/\">Datenschutzbedingungen<\/a>\u00a0 gelesen und stimme zu.<\/span><\/label><\/span><\/span><\/span>\n<\/div>\n\n<div class=\"col-lg-6 offset-lg-6\">\n<input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Anfrage absenden\" \/>\n<\/div>\n<\/div><!-- end .row --><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n                    <\/div>\r\n                <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n<\/div><\/div>\n\n<div class=\"lazyblock-newsletter-banner-1X81le wp-block-lazyblock-newsletter-banner\"><div class=\"newsletter-banner\">\r\n    <div class=\"container\">\r\n        <div class=\"row\">\r\n            <div class=\"col-lg-4 offset-lg-3 newsletter-banner-title\">\r\n                <div class=\"display-3\">\r\n                    Ihre IT.<br \/>Unser Business.<br \/>Ihr Newsletter.\r\n                <\/div>\r\n            <\/div>\r\n\r\n            <div class=\"col-lg-5 newsletter-banner-text\">\r\n                <span class=\"icon icon-newsletter\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 800\">\n    <path d=\"M837.5,800H162.5c-86.65,0-157.46-67.82-162.24-153.28l-.26-9.22V112.5C0,52.96,46.26,4.22,104.8.26l7.7-.26h625c59.54,0,108.28,46.26,112.24,104.8l.26,7.7v37.5h37.5c59.54,0,108.28,46.26,112.24,104.8l.26,7.7v375c0,86.65-67.82,157.46-153.28,162.24l-9.22.26H162.5h675ZM162.5,725h675c45.91,0,83.56-35.36,87.21-80.32l.29-7.18v-375c0-18.98-14.11-34.67-32.41-37.16l-5.09-.34h-37.5v387.5c0,18.98-14.11,34.68-32.41,37.16l-5.09.34c-18.98,0-34.68-14.11-37.16-32.41l-.34-5.09V112.5c0-18.98-14.11-34.67-32.41-37.16l-5.09-.34H112.5c-18.98,0-34.67,14.11-37.16,32.41l-.34,5.09v525c0,45.91,35.36,83.56,80.32,87.21l7.18.29h675H162.5ZM512.3,525h150.31c20.71,0,37.5,16.79,37.5,37.5,0,18.98-14.11,34.68-32.41,37.16l-5.09.34h-150.31c-20.71,0-37.5-16.79-37.5-37.5,0-18.98,14.11-34.68,32.41-37.16l5.09-.34h150.31-150.31ZM362.16,350.22c20.71,0,37.5,16.79,37.5,37.5v174.78c0,20.71-16.79,37.5-37.5,37.5h-174.78c-20.71,0-37.5-16.79-37.5-37.5v-174.78c0-20.71,16.79-37.5,37.5-37.5h174.78ZM324.66,425.22h-99.78v99.78h99.78v-99.78ZM512.3,350.22h150.31c20.71,0,37.5,16.79,37.5,37.5,0,18.98-14.11,34.68-32.41,37.16l-5.09.34h-150.31c-20.71,0-37.5-16.79-37.5-37.5,0-18.98,14.11-34.67,32.41-37.16l5.09-.34h150.31-150.31ZM187.39,175.12h475.22c20.71,0,37.5,16.79,37.5,37.5,0,18.98-14.11,34.67-32.41,37.16l-5.09.34H187.39c-20.71,0-37.5-16.79-37.5-37.5,0-18.98,14.11-34.67,32.41-37.16l5.09-.34h475.22H187.39Z\" \/>\n<\/svg><\/span>                <p>\r\n                    &#8222;Bleiben Sie immer informiert! Melden Sie sich f\u00fcr unseren Newsletter an und erhalten Sie regelm\u00e4\u00dfig Updates zu IT-Innovationen und exklusive Angebote direkt in Ihr Postfach.&#8220;\r\n                <\/p>\r\n            <\/div>\r\n        <\/div>\r\n\r\n        <div class=\"newsletter-banner-action\">\r\n            <a href=\"\/systemhaus\/newsletter\" class=\"btn btn-secondary btn-icon\">\r\n                Zur Anmeldung                <span class=\"icon icon-arrow-up-right\"><?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 1000\">\n    <path d=\"M921.17,0H319.65c-43.52,0-78.83,35.31-78.83,78.83s35.31,78.83,78.83,78.83h411.21L23.1,865.43c-30.79,30.79-30.79,80.68,0,111.48,15.4,15.4,35.57,23.1,55.74,23.1s40.34-7.7,55.74-23.1L842.33,269.14v411.21c0,43.52,35.31,78.83,78.83,78.83s78.83-35.31,78.83-78.83V78.83c0-43.52-35.31-78.83-78.83-78.83Z\" \/>\n<\/svg><\/span>            <\/a>\r\n        <\/div>\r\n    <\/div>\r\n<\/div><\/div>\n<\/div>\r\n<\/section><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":1207,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-1146","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Penetrationstests - Implement-IT Systemhaus<\/title>\n<meta name=\"description\" content=\"Mit dem Implement-IT Penetration Testing-Service potenzielle Schwachstellen in IT-Systemen aufdecken &amp; proaktiv beheben.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Penetrationstests - Implement-IT Systemhaus\" \/>\n<meta property=\"og:description\" content=\"Mit dem Implement-IT Penetration Testing-Service potenzielle Schwachstellen in IT-Systemen aufdecken &amp; proaktiv beheben.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/\" \/>\n<meta property=\"og:site_name\" content=\"Implement-IT\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-05T11:22:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Sophos_ZTNA_Header-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"740\" \/>\n\t<meta property=\"og:image:height\" content=\"338\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/\",\"url\":\"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/\",\"name\":\"Penetrationstests - Implement-IT Systemhaus\",\"isPartOf\":{\"@id\":\"https:\/\/implement-it.de\/systemhaus\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Sophos_ZTNA_Header-2.png\",\"datePublished\":\"2024-07-08T13:37:04+00:00\",\"dateModified\":\"2026-01-05T11:22:46+00:00\",\"description\":\"Mit dem Implement-IT Penetration Testing-Service potenzielle Schwachstellen in IT-Systemen aufdecken & proaktiv beheben.\",\"breadcrumb\":{\"@id\":\"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/#primaryimage\",\"url\":\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Sophos_ZTNA_Header-2.png\",\"contentUrl\":\"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Sophos_ZTNA_Header-2.png\",\"width\":740,\"height\":338},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/implement-it.de\/systemhaus\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Penetrationstests\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/implement-it.de\/systemhaus\/#website\",\"url\":\"https:\/\/implement-it.de\/systemhaus\/\",\"name\":\"Implement-IT\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/implement-it.de\/systemhaus\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Penetrationstests - Implement-IT Systemhaus","description":"Mit dem Implement-IT Penetration Testing-Service potenzielle Schwachstellen in IT-Systemen aufdecken & proaktiv beheben.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/","og_locale":"de_DE","og_type":"article","og_title":"Penetrationstests - Implement-IT Systemhaus","og_description":"Mit dem Implement-IT Penetration Testing-Service potenzielle Schwachstellen in IT-Systemen aufdecken & proaktiv beheben.","og_url":"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/","og_site_name":"Implement-IT","article_modified_time":"2026-01-05T11:22:46+00:00","og_image":[{"width":740,"height":338,"url":"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Sophos_ZTNA_Header-2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/","url":"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/","name":"Penetrationstests - Implement-IT Systemhaus","isPartOf":{"@id":"https:\/\/implement-it.de\/systemhaus\/#website"},"primaryImageOfPage":{"@id":"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/#primaryimage"},"image":{"@id":"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/#primaryimage"},"thumbnailUrl":"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Sophos_ZTNA_Header-2.png","datePublished":"2024-07-08T13:37:04+00:00","dateModified":"2026-01-05T11:22:46+00:00","description":"Mit dem Implement-IT Penetration Testing-Service potenzielle Schwachstellen in IT-Systemen aufdecken & proaktiv beheben.","breadcrumb":{"@id":"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/implement-it.de\/systemhaus\/penetrationstests\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/#primaryimage","url":"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Sophos_ZTNA_Header-2.png","contentUrl":"https:\/\/implement-it.de\/systemhaus\/wp-content\/uploads\/2024\/07\/Sophos_ZTNA_Header-2.png","width":740,"height":338},{"@type":"BreadcrumbList","@id":"https:\/\/implement-it.de\/systemhaus\/penetrationstests\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/implement-it.de\/systemhaus\/"},{"@type":"ListItem","position":2,"name":"Penetrationstests"}]},{"@type":"WebSite","@id":"https:\/\/implement-it.de\/systemhaus\/#website","url":"https:\/\/implement-it.de\/systemhaus\/","name":"Implement-IT","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/implement-it.de\/systemhaus\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/implement-it.de\/systemhaus\/wp-json\/wp\/v2\/pages\/1146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/implement-it.de\/systemhaus\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/implement-it.de\/systemhaus\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/implement-it.de\/systemhaus\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/implement-it.de\/systemhaus\/wp-json\/wp\/v2\/comments?post=1146"}],"version-history":[{"count":51,"href":"https:\/\/implement-it.de\/systemhaus\/wp-json\/wp\/v2\/pages\/1146\/revisions"}],"predecessor-version":[{"id":5292,"href":"https:\/\/implement-it.de\/systemhaus\/wp-json\/wp\/v2\/pages\/1146\/revisions\/5292"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/implement-it.de\/systemhaus\/wp-json\/wp\/v2\/media\/1207"}],"wp:attachment":[{"href":"https:\/\/implement-it.de\/systemhaus\/wp-json\/wp\/v2\/media?parent=1146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}