{"id":12271,"date":"2026-05-15T13:05:09","date_gmt":"2026-05-15T11:05:09","guid":{"rendered":"https:\/\/lemarit.com\/?page_id=12271"},"modified":"2026-05-15T13:05:09","modified_gmt":"2026-05-15T11:05:09","slug":"cybersecurity-2","status":"publish","type":"page","link":"https:\/\/lemarit.com\/en\/cybersecurity-2\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"12271\" class=\"elementor elementor-12271 elementor-12270\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-278c25c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"278c25c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ce6e7aa\" data-id=\"ce6e7aa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4045e15e grve-elementor-align-left elementor-widget elementor-widget-impeka_title\" data-id=\"4045e15e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"grve-element grve-title grve-subtitle-text grve-text-white\"><span>Solutions for cybersecurity experts<br><\/span><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9ca4aa grve-elementor-align-left elementor-widget elementor-widget-impeka_title\" data-id=\"b9ca4aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"grve-element grve-title grve-h1 grve-text-white\"><span>Cyber resilience<br>for your domain landscape<br><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19bd653 elementor-widget elementor-widget-text-editor\" data-id=\"19bd653\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Domains sind Teil eines vulnerablen \u00d6kosystems. F\u00fcr Cybersicherheitsexperten bedeutet das: Angriffsfl\u00e4chen reduzieren, Integrit\u00e4t sicherstellen und operative Sicherheit st\u00e4rken.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-460b3af grve-elementor-align-left elementor-widget elementor-widget-impeka_button\" data-id=\"460b3af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"grve-element\"><a href=\"\/kontakt\/\" class=\"grve-btn grve-extra-round grve-bg-primary-2 grve-border-primary-2 grve-bg-hover-primary-6 grve-border-hover-primary-6 grve-text-white grve-text-hover-white grve-btn-medium grve-with-svg-icon-arrow-1\">\r\n\t\t<div class=\"grve-btn-inner\">\r\n\t\t<span>Get Started<\/span>\r\n\t\t\t\t\t\t\t<div class=\"grve-btn-svg-icon grve-with-shape grve-svg-primary-2\">\r\n\t\t\t\t\t\t<svg width=\"12px\" height=\"12px\" viewBox=\"0 0 12 12\">\r\n\t\t\t\t<polygon points=\"3.6 0 10 6 3.6 12 2 10.5 6.8 6 2 1.5\"><\/polygon>\r\n\t\t\t<\/svg>\r\n\t\t\t\t\t\t\t\t\t<div class=\"grve-shape-icon grve-circle grve-simple grve-bg-white\"><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-header-color=\"light\" class=\"elementor-section elementor-top-section elementor-element elementor-element-6fa06fa5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6fa06fa5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4292d679\" data-id=\"4292d679\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2e6fa264 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2e6fa264\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7052a07d\" data-id=\"7052a07d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a7c610c grve-elementor-align-left elementor-widget elementor-widget-impeka_title\" data-id=\"5a7c610c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"grve-element grve-title grve-h3 grve-text-primary-3\"><span>A secure foundation<br><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-10e991c\" data-id=\"10e991c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-69fdbd1\" data-id=\"69fdbd1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4005fcbe grve-elementor-align-left elementor-widget elementor-widget-impeka_animated_text\" data-id=\"4005fcbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_animated_text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"grve-element grve-animated-text grve-animated-item grve-leader-text grve-style-1 grve-text-primary-3\" data-style=\"style-1\" data-delay=\"0\" data-duration=\"normal\"><span class=\"grve-animated-entry\"><span class=\"grve-line\">From CISOs to data analysts, from technical engineers to project managers \u2013 cybersecurity experts must always find the balance between\neffectiveness and efficiency and implement the appropriate technical measures for each threat.<\/span><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1919d870 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1919d870\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-25ef816d\" data-id=\"25ef816d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6196c8b grve-elementor-align-left elementor-widget elementor-widget-impeka_title\" data-id=\"6196c8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"grve-element grve-title grve-subtitle-text grve-text-primary-3\"><span>Close vulnerabilities<br><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5697060 grve-elementor-align-left elementor-widget elementor-widget-impeka_title\" data-id=\"5697060\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"grve-element grve-title grve-h5 grve-text-primary-3\"><span>Risks for your brand<br><\/span><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2af5b25b elementor-widget elementor-widget-text-editor\" data-id=\"2af5b25b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>LEMARIT&#8217;s mission is to develop and implement security measures to reduce the risk of cyberattacks on your domain infrastructure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-4f41a9b6 elementor-invisible\" data-id=\"4f41a9b6\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:100}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f3cc0ca grve-elementor-align-left elementor-widget elementor-widget-impeka_icon_box\" data-id=\"f3cc0ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div data-animation=\"fade-in-up\" data-delay=\"100\" data-duration=\"normal\" class=\"grve-element grve-box-icon grve-medium grve-top-icon grve-animated-item\"><div class=\"grve-wrapper-icon\" style=\"\"><i aria-hidden=\"true\" class=\"grve-box-icon grve-text-primary-1 smpicon- smp-icon-fire\"><\/i><\/div><div class=\"grve-box-content\"><h3 class=\"grve-box-title grve-small-text grve-text-primary-3\">Phishing risk due to unmonitored domains<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-307ab3f elementor-invisible\" data-id=\"307ab3f\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:100}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-70c5abf grve-elementor-align-left elementor-widget elementor-widget-impeka_icon_box\" data-id=\"70c5abf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div data-animation=\"fade-in-up\" data-delay=\"100\" data-duration=\"normal\" class=\"grve-element grve-box-icon grve-medium grve-top-icon grve-animated-item\"><div class=\"grve-wrapper-icon\" style=\"\"><i aria-hidden=\"true\" class=\"grve-box-icon grve-text-primary-1 smpicon- smp-icon-globe\"><\/i><\/div><div class=\"grve-box-content\"><h3 class=\"grve-box-title grve-small-text grve-text-primary-3\">Faulty and conspicuous DNS entries<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-d57cdae elementor-invisible\" data-id=\"d57cdae\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:100}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfc4055 grve-elementor-align-left elementor-widget elementor-widget-impeka_icon_box\" data-id=\"bfc4055\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div data-animation=\"fade-in-up\" data-delay=\"100\" data-duration=\"normal\" class=\"grve-element grve-box-icon grve-medium grve-top-icon grve-animated-item\"><div class=\"grve-wrapper-icon\" style=\"\"><i aria-hidden=\"true\" class=\"grve-box-icon grve-text-primary-1 smpicon- smp-icon-lock-open\"><\/i><\/div><div class=\"grve-box-content\"><h3 class=\"grve-box-title grve-small-text grve-text-primary-3\">Unauthorized issuance of certificates<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-9ce450a elementor-invisible\" data-id=\"9ce450a\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:100}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21d7fb9 grve-elementor-align-left elementor-widget elementor-widget-impeka_icon_box\" data-id=\"21d7fb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div data-animation=\"fade-in-up\" data-delay=\"100\" data-duration=\"normal\" class=\"grve-element grve-box-icon grve-medium grve-top-icon grve-animated-item\"><div class=\"grve-wrapper-icon\" style=\"\"><i aria-hidden=\"true\" class=\"grve-box-icon grve-text-primary-1 smpicon- smp-icon-envelope-letter\"><\/i><\/div><div class=\"grve-box-content\"><h3 class=\"grve-box-title grve-small-text grve-text-primary-3\">Missing SPF, DKIM &amp; DMARC implementation<\/h3><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7ab5ae08 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7ab5ae08\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ec24e10\" data-id=\"ec24e10\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c328060 grve-elementor-align-center elementor-widget elementor-widget-impeka_title\" data-id=\"c328060\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"grve-element grve-title grve-h3\"><span>Finding effective solutions together<br><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6a2dfab elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6a2dfab\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d34c1ca\" data-id=\"d34c1ca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10d421af grve-elementor-align--mobileleft grve-elementor-align-left elementor-widget elementor-widget-impeka_title\" data-id=\"10d421af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"grve-element grve-title grve-h3\"><span>Individual solutions for certificates and DNS<br><\/span><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4db5214 elementor-widget elementor-widget-text-editor\" data-id=\"4db5214\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tLEMARIT bietet h\u00f6chstindividuelle L\u00f6sungen f\u00fcr DNS und Zertifikatsverwaltung, darunter einen hohen Grad an sicheren Automatisierungsm\u00f6glichkeiten.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db467b0 grve-elementor-align-left elementor-widget elementor-widget-impeka_button\" data-id=\"db467b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"grve-element\"><a href=\"\/security-technical-services\/\" class=\"grve-btn-text grve-btn-only-text grve-text-primary-3 grve-text-hover-primary-3 grve-btn-medium grve-with-svg-icon-arrow-1\">\r\n\t\t<div class=\"grve-btn-inner\">\r\n\t\t<span>Prioritize security<\/span>\r\n\t\t\t\t\t\t\t<div class=\"grve-btn-svg-icon grve-with-shape grve-svg-primary-2\">\r\n\t\t\t\t\t\t<svg width=\"12px\" height=\"12px\" viewBox=\"0 0 12 12\">\r\n\t\t\t\t<polygon points=\"3.6 0 10 6 3.6 12 2 10.5 6.8 6 2 1.5\"><\/polygon>\r\n\t\t\t<\/svg>\r\n\t\t\t\t\t\t\t\t\t<div class=\"grve-shape-icon grve-circle grve-simple grve-bg-primary-1\"><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1055000\" data-id=\"1055000\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52ebad5 grve-elementor-align-left elementor-widget elementor-widget-impeka_image_single\" data-id=\"52ebad5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_image_single.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div data-animation=\"fade-in-up\" data-delay=\"0\" data-duration=\"slow\" class=\"grve-element grve-image grve-animated-item\">\r\n\t<div class=\"grve-image-item\">\r\n\t\t\r\n\r\n<div class=\"grve-image-wrapper grve-radius-25 grve-none\">\r\n\t\t<div class=\"grve-thumbnail-wrapper\"  style=\"width: 2560px;\"><div class=\"grve-thumbnail\"  style=\"padding-top: 66.523%;\"><img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1703\" src=\"https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_1373-scaled.jpg\" class=\"attachment-full size-full\" alt=\"LEMARIT B\u00fcrogeb\u00e4ude in Harrislee\" data-column-space=\"auto\" data-lazyload=\"\" data-grve-filter=\"yes\" srcset=\"https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_1373-scaled.jpg 2560w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_1373-300x200.jpg 300w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_1373-1024x681.jpg 1024w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_1373-768x511.jpg 768w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_1373-1536x1022.jpg 1536w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_1373-1920x1277.jpg 1920w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" title=\"\"><\/div><\/div>\t<\/div>\r\n\t<\/div>\r\n<\/div>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2658b4f elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2658b4f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-70a6390\" data-id=\"70a6390\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f6953e1 grve-elementor-align-left elementor-widget elementor-widget-impeka_image_single\" data-id=\"f6953e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_image_single.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div data-animation=\"fade-in-up\" data-delay=\"0\" data-duration=\"slow\" class=\"grve-element grve-image grve-animated-item\">\r\n\t<div class=\"grve-image-item\">\r\n\t\t\r\n\r\n<div class=\"grve-image-wrapper grve-radius-25 grve-none\">\r\n\t\t<div class=\"grve-thumbnail-wrapper\"  style=\"width: 2560px;\"><div class=\"grve-thumbnail\"  style=\"padding-top: 66.758%;\"><img decoding=\"async\" width=\"2560\" height=\"1709\" src=\"https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/\u00a9SARIPICTURE-_-Sarah-Domandl_LEMARIT_MOODS_Laptop-Tastatur_0975_20230125-scaled.jpg\" class=\"attachment-full size-full\" alt=\"LEMARIT Arbeitsplatz mit Laptop-Nahaufnahme\" data-column-space=\"auto\" data-lazyload=\"\" data-grve-filter=\"yes\" srcset=\"https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/\u00a9SARIPICTURE-_-Sarah-Domandl_LEMARIT_MOODS_Laptop-Tastatur_0975_20230125-scaled.jpg 2560w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/\u00a9SARIPICTURE-_-Sarah-Domandl_LEMARIT_MOODS_Laptop-Tastatur_0975_20230125-300x200.jpg 300w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/\u00a9SARIPICTURE-_-Sarah-Domandl_LEMARIT_MOODS_Laptop-Tastatur_0975_20230125-1024x684.jpg 1024w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/\u00a9SARIPICTURE-_-Sarah-Domandl_LEMARIT_MOODS_Laptop-Tastatur_0975_20230125-768x513.jpg 768w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/\u00a9SARIPICTURE-_-Sarah-Domandl_LEMARIT_MOODS_Laptop-Tastatur_0975_20230125-1536x1025.jpg 1536w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/\u00a9SARIPICTURE-_-Sarah-Domandl_LEMARIT_MOODS_Laptop-Tastatur_0975_20230125-1920x1282.jpg 1920w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" title=\"\"><\/div><\/div>\t<\/div>\r\n\t<\/div>\r\n<\/div>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8cf2758\" data-id=\"8cf2758\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d0b1821 grve-elementor-align-left elementor-widget elementor-widget-impeka_title\" data-id=\"d0b1821\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"grve-element grve-title grve-h3\"><span>Consistent DNS hygiene thanks to DNSecure<br><\/span><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b8d64f elementor-widget elementor-widget-text-editor\" data-id=\"0b8d64f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nicht warten \u2013 handeln: mit technisch hochmodernen und individuellen L\u00f6sungen wie CNAME Monitoring, SPF Flattening oder DMARC Report Analyzer.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0d014d grve-elementor-align-left elementor-widget elementor-widget-impeka_button\" data-id=\"c0d014d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"grve-element\"><a href=\"\/security-technical-services\/\" class=\"grve-btn-text grve-btn-only-text grve-text-primary-3 grve-text-hover-primary-3 grve-btn-medium grve-with-svg-icon-arrow-1\">\r\n\t\t<div class=\"grve-btn-inner\">\r\n\t\t<span>Contact Experts<\/span>\r\n\t\t\t\t\t\t\t<div class=\"grve-btn-svg-icon grve-with-shape grve-svg-primary-2\">\r\n\t\t\t\t\t\t<svg width=\"12px\" height=\"12px\" viewBox=\"0 0 12 12\">\r\n\t\t\t\t<polygon points=\"3.6 0 10 6 3.6 12 2 10.5 6.8 6 2 1.5\"><\/polygon>\r\n\t\t\t<\/svg>\r\n\t\t\t\t\t\t\t\t\t<div class=\"grve-shape-icon grve-circle grve-simple grve-bg-primary-1\"><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-61906ac elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"61906ac\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-611e9a5\" data-id=\"611e9a5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dcaa4fb grve-elementor-align--mobileleft grve-elementor-align-left elementor-widget elementor-widget-impeka_title\" data-id=\"dcaa4fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"grve-element grve-title grve-h3\"><span>Early detection of phishing and spoofing activities<br><\/span><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a135067 elementor-widget elementor-widget-text-editor\" data-id=\"a135067\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEin pr\u00e4zises, kontinuierliches Monitoring verwandelt unsichtbare Risiken in steuerbare Sicherheit \u2013 und schafft eine solide Grundlage f\u00fcr echte Cyberresilienz.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b929704 grve-elementor-align-left elementor-widget elementor-widget-impeka_button\" data-id=\"b929704\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"grve-element\"><a href=\"\/monitoring-enforcement\/\" class=\"grve-btn-text grve-btn-only-text grve-text-primary-3 grve-text-hover-primary-3 grve-btn-medium grve-with-svg-icon-arrow-1\">\r\n\t\t<div class=\"grve-btn-inner\">\r\n\t\t<span>Start monitoring<\/span>\r\n\t\t\t\t\t\t\t<div class=\"grve-btn-svg-icon grve-with-shape grve-svg-primary-2\">\r\n\t\t\t\t\t\t<svg width=\"12px\" height=\"12px\" viewBox=\"0 0 12 12\">\r\n\t\t\t\t<polygon points=\"3.6 0 10 6 3.6 12 2 10.5 6.8 6 2 1.5\"><\/polygon>\r\n\t\t\t<\/svg>\r\n\t\t\t\t\t\t\t\t\t<div class=\"grve-shape-icon grve-circle grve-simple grve-bg-primary-1\"><\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5deeeb4\" data-id=\"5deeeb4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2e1e3f9 grve-elementor-align-left elementor-widget elementor-widget-impeka_image_single\" data-id=\"2e1e3f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_image_single.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div data-animation=\"fade-in-up\" data-delay=\"0\" data-duration=\"slow\" class=\"grve-element grve-image grve-animated-item\">\r\n\t<div class=\"grve-image-item\">\r\n\t\t\r\n\r\n<div class=\"grve-image-wrapper grve-radius-25 grve-none\">\r\n\t\t<div class=\"grve-thumbnail-wrapper\"  style=\"width: 2560px;\"><div class=\"grve-thumbnail\"  style=\"padding-top: 66.523%;\"><img decoding=\"async\" width=\"2560\" height=\"1703\" src=\"https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_7175-2-scaled.jpg\" class=\"attachment-full size-full\" alt=\"LEMARIT B\u00fcro in Harrislee \u2013 Arbeitsumgebung\" data-column-space=\"auto\" data-lazyload=\"\" data-grve-filter=\"yes\" srcset=\"https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_7175-2-scaled.jpg 2560w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_7175-2-300x200.jpg 300w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_7175-2-1024x681.jpg 1024w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_7175-2-768x511.jpg 768w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_7175-2-1536x1022.jpg 1536w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_7175-2-1920x1277.jpg 1920w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" title=\"\"><\/div><\/div>\t<\/div>\r\n\t<\/div>\r\n<\/div>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-20a4fea elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"20a4fea\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9766cf4\" data-id=\"9766cf4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-736a440 elementor-blockquote--skin-clean elementor-blockquote--align-center elementor-widget elementor-widget-blockquote\" data-id=\"736a440\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\t\u201eFlexibel und kompetent: Vermeintlich unl\u00f6sbare Problemstellungen sind f\u00fcr LEMARIT dank der gro\u00dfen Expertise kein Problem.\u201c\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-blockquote__author\">Peter Rezonja, Cyber Security Expert, Wienerberger AG<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-235d76f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"235d76f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-4d3fdea\" data-id=\"4d3fdea\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca60d89 grve-elementor-align-left elementor-widget elementor-widget-impeka_counter\" data-id=\"ca60d89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"grve-element grve-counter\"><div class=\"grve-counter-content\"><div class=\"grve-counter-item grve-h3 grve-text-white\"><span data-thousands-separator-vis=\"\" data-thousands-separator=\",\" data-prefix=\"\" data-suffix=\" Million\" data-start-val=\"0\" data-end-val=\"893\" data-decimal-points=\"0\" data-decimal-separator=\".\" >0<\/span><\/div><div class=\"grve-counter-title grve-small-text grve-text-white\">Phishing attacks detected in 2024, an increase of 26% compared to 2023<\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-cb7210a\" data-id=\"cb7210a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0f7280c grve-elementor-align-left elementor-widget elementor-widget-impeka_counter\" data-id=\"0f7280c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"grve-element grve-counter\"><div class=\"grve-counter-content\"><div class=\"grve-counter-item grve-h3 grve-text-white\"><span data-thousands-separator-vis=\"yes\" data-thousands-separator=\",\" data-prefix=\"\" data-suffix=\" Million\" data-start-val=\"0\" data-end-val=\"36.2\" data-decimal-points=\"1\" data-decimal-separator=\",\" >0<\/span><\/div><div class=\"grve-counter-title grve-small-text grve-text-white\">DDoS attacks in 2025 \u2013 at times one attack per second<\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-6b707c4\" data-id=\"6b707c4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ed86638 grve-elementor-align-left elementor-widget elementor-widget-impeka_counter\" data-id=\"ed86638\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"grve-element grve-counter\"><div class=\"grve-counter-content\"><div class=\"grve-counter-item grve-h3 grve-text-white\"><span data-thousands-separator-vis=\"yes\" data-thousands-separator=\",\" data-prefix=\"\" data-suffix=\" Billion\" data-start-val=\"0\" data-end-val=\"3.4\" data-decimal-points=\"1\" data-decimal-separator=\",\" >0<\/span><\/div><div class=\"grve-counter-title grve-small-text grve-text-white\">Number of phishing emails sent daily \u2013 1.2% of all emails<\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bbcbb74 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bbcbb74\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-134e33f\" data-id=\"134e33f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd2c348 grve-elementor-align-left elementor-widget elementor-widget-impeka_title\" data-id=\"dd2c348\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"grve-element grve-title grve-h3\"><span>Brauchen Sie Hilfe? Wir sind f\u00fcr Sie da.<br><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0978378 elementor-widget elementor-widget-text-editor\" data-id=\"0978378\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tVon der schnellen Zertifikatsausstellung bis hin zum Full-Service-Angebot, unser 30-k\u00f6pfiges Team aus Cybersicherheits-Experten und Domain-Spezialisten ist an Ihrer Seite.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6505a57 grve-elementor-align-left elementor-widget elementor-widget-impeka_button\" data-id=\"6505a57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"grve-element\"><a href=\"\/unsere-experten\/\" class=\"grve-btn grve-btn-outline grve-extra-round grve-border-primary-3 grve-bg-hover-primary-3 grve-border-hover-primary-3 grve-text-primary-3 grve-text-hover-white grve-btn-medium\">\r\n\t\t<span>Entdecke die LEMARIT-Experten<\/span>\r\n\t\t\t\t\t\t\t<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4767c61\" data-id=\"4767c61\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0038284 grve-elementor-align-left elementor-widget elementor-widget-impeka_image_single\" data-id=\"0038284\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"impeka_image_single.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div data-animation=\"fade-in-up\" data-delay=\"0\" data-duration=\"slow\" class=\"grve-element grve-image grve-animated-item\">\r\n\t<div class=\"grve-image-item\">\r\n\t\t\r\n\r\n<div class=\"grve-image-wrapper grve-radius-25 grve-none\">\r\n\t\t<div class=\"grve-thumbnail-wrapper\"  style=\"width: 2560px;\"><div class=\"grve-thumbnail\"  style=\"padding-top: 66.523%;\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1703\" src=\"https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_7221-scaled.jpg\" class=\"attachment-full size-full\" alt=\"LEMARIT Kundenservice-Team im Einsatz\" data-column-space=\"auto\" data-lazyload=\"\" data-grve-filter=\"yes\" srcset=\"https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_7221-scaled.jpg 2560w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_7221-300x200.jpg 300w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_7221-1024x681.jpg 1024w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_7221-768x511.jpg 768w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_7221-1536x1022.jpg 1536w, https:\/\/lemarit.com\/wp-content\/uploads\/2025\/06\/DSC_7221-1920x1277.jpg 1920w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" title=\"\"><\/div><\/div>\t<\/div>\r\n\t<\/div>\r\n<\/div>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Solutions for cybersecurity experts Cyber resiliencefor your domain landscape Domains sind Teil eines vulnerablen \u00d6kosystems. F\u00fcr Cybersicherheitsexperten bedeutet das: Angriffsfl\u00e4chen reduzieren, Integrit\u00e4t sicherstellen und operative Sicherheit st\u00e4rken. Get Started A secure foundation From CISOs to data analysts, from technical engineers to project managers \u2013 cybersecurity experts must always find the balance between effectiveness and efficiency [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-12271","page","type-page","status-publish","hentry","grve-entry-item"],"_links":{"self":[{"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/pages\/12271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/comments?post=12271"}],"version-history":[{"count":1,"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/pages\/12271\/revisions"}],"predecessor-version":[{"id":12272,"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/pages\/12271\/revisions\/12272"}],"wp:attachment":[{"href":"https:\/\/lemarit.com\/en\/wp-json\/wp\/v2\/media?parent=12271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}