{"id":67202,"date":"2026-01-23T15:41:05","date_gmt":"2026-01-23T15:41:05","guid":{"rendered":"https:\/\/www.overit.ai\/?page_id=67202"},"modified":"2026-02-26T14:27:56","modified_gmt":"2026-02-26T14:27:56","slug":"cybersicherheit","status":"publish","type":"page","link":"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/","title":{"rendered":"Cybersicherheit"},"content":{"rendered":"<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-no-padding \n  overit-block-wide-info-image\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n\n\n\n<div class=\"wii right  \" id=\"\">\n        <div class=\"wii__content\" >\n                  <div class=\"wii__section-title\" style=\"\">CYBERSICHERHEIT<\/div>\n          \n                      <h1 id=\"wii-title-6a02adbe551df\" class=\"wii__title\" style=\"  \">F\u00fcr die Sicherheit und den Schutz der Gemeinschaften. Gemeinsam!<\/h1>\n          \n          <div class=\"wii__description\" style=\" \">\n        <p>Vertrauen ist einer unserer Grundwerte. Nichts ist wichtiger als die Zuverl\u00e4ssigkeit unserer Systeme, die Cybersicherheit und das Wort, das wir unseren Kunden, Partnern und Mitarbeitern geben.<\/p>\n\n      <\/div>\n    \n        \n    \n    \n    \n      <\/div>\n  \n      <div class=\"wii__image\" >\n                        <img decoding=\"async\" src=\"https:\/\/www.overit.ai\/app\/uploads\/2024\/06\/OverIT-Cybersecurity.png\" alt=\"OverIT Cybersecurity\" width=\"1540\" height=\"1078\" \/>\n                  <\/div>\n  \n  <\/div>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--light-gray overit-radius-full overit-no-margin overit-padding-medium overit-block--fullwidth\n  overit-block-configurable-jumbotron\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n<section class=\"configurable-jumbotron center\" >\n    \n    \n                  <div class=\"cj-subtitle medium\"><p>Cyberattacken sind f\u00fcr alle CIOs ein wichtiges Thema, und die OverIT NextGen Platform bietet erstklassige Sicherheit und Skalierbarkeit.<\/p>\n<p>Als ein f\u00fchrendes SaaS-Unternehmen vertrauen uns unsere Kunden, indem sie uns ihre Daten und Abl\u00e4ufe zur Verf\u00fcgung stellen. Wir d\u00fcrfen nicht scheitern! Deshalb arbeiten wir jeden Tag daran, unsere Plattform und unsere Prozesse zu st\u00e4rken und die Sicherheit und Konformit\u00e4t unserer Systeme zu gew\u00e4hrleisten.<\/p>\n<\/div>\n          \n        <\/section>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-padding-small \n  overit-block-multi-info-cards\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n<div class=\"info-cards info-cards--3 info-cards--align-center\">\n        <div class=\"info-cards__sections \">\n                  <div class=\"info-card info-card--3\n           info-card--bg-gray           \n          \n          info-card--top-line\n        \">\n        <div class=\"info-card-inner\">\n                                  <div class=\"info-card__icon\">\n                            <i aria-hidden=\"true\" style=\"color: #FF8200;font-size: 32px;\" class=\"fa-classic fa-light fa-user-lock\" aria-hidden=\"true\"><\/i>\n            <\/div>\n                                            <div class=\"info-card__title \" >\n              Erkennen, verhindern und beheben Sie potenzielle <br>Sicherheitsprobleme und Schwachstellen.\n            <\/div>\n                            <\/div>\n      <\/div>\n                  <div class=\"info-card info-card--3\n           info-card--bg-gray           \n          \n          info-card--top-line\n        \">\n        <div class=\"info-card-inner\">\n                                  <div class=\"info-card__icon\">\n                            <i aria-hidden=\"true\" style=\"color: #FF8200;font-size: 32px;\" class=\"fa-classic fa-light fa-shield-check\" aria-hidden=\"true\"><\/i>\n            <\/div>\n                                            <div class=\"info-card__title \" >\n              Stellen Sie sicher, dass Ihre Dienste <br>immer auf dem neuesten Stand sind.\n            <\/div>\n                            <\/div>\n      <\/div>\n                  <div class=\"info-card info-card--3\n           info-card--bg-gray           \n          \n          info-card--top-line\n        \">\n        <div class=\"info-card-inner\">\n                                  <div class=\"info-card__icon\">\n                            <i aria-hidden=\"true\" style=\"color: #FF8200;font-size: 31px;\" class=\"fa-classic fa-light fa-display-chart-up\" aria-hidden=\"true\"><\/i>\n            <\/div>\n                                            <div class=\"info-card__title \" >\n              Verbessern Sie Ihre <br>Field Service Management-Abl\u00e4ufe.\n            <\/div>\n                            <\/div>\n      <\/div>\n          <\/div>\n  <\/div>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-padding-small overit-block--fullwidth\n  overit-block-configurable-jumbotron\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n<section class=\"configurable-jumbotron center\" >\n                  <div class=\"cj-section-title\">Compliance im Bereich Sicherheit<\/div>\n          \n                  <div class=\"cj-title medium\">OverIT hat sich verpflichtet, die wichtigsten Standards der Sicherheitsindustrie zu erf\u00fcllen<\/div>\n          \n    \n        <\/section>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-padding-medium-bottom \n  overit-block-marchitecture\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n\n  <div class=\"block-ma\">\n    <div class=\"block-ma-head-title\">\n            \n    <\/div>\n          <div class=\"block-ma-tab-nav\">\n                           \n          <div>\n            <div class=\"block-ma-tab-nav-item  block-ma-tab-nav-item--active \">\n              <div class=\"block-list-boxes__icon\">\n                                \n              <\/div>\n              <div class=\"block-ma-tab-side-title-inner\">\n                                  SOC1 Typ II\n                              <\/div>\n            <\/div>\n          <\/div>\n                             \n          <div>\n            <div class=\"block-ma-tab-nav-item \">\n              <div class=\"block-list-boxes__icon\">\n                                \n              <\/div>\n              <div class=\"block-ma-tab-side-title-inner\">\n                                  SOC2 Typ II\n                              <\/div>\n            <\/div>\n          <\/div>\n                             \n          <div>\n            <div class=\"block-ma-tab-nav-item \">\n              <div class=\"block-list-boxes__icon\">\n                                \n              <\/div>\n              <div class=\"block-ma-tab-side-title-inner\">\n                                  SOC3\n                              <\/div>\n            <\/div>\n          <\/div>\n                             \n          <div>\n            <div class=\"block-ma-tab-nav-item \">\n              <div class=\"block-list-boxes__icon\">\n                                \n              <\/div>\n              <div class=\"block-ma-tab-side-title-inner\">\n                                  ISO 27001:2022\n                              <\/div>\n            <\/div>\n          <\/div>\n                             \n          <div>\n            <div class=\"block-ma-tab-nav-item \">\n              <div class=\"block-list-boxes__icon\">\n                                \n              <\/div>\n              <div class=\"block-ma-tab-side-title-inner\">\n                                  ISO 27017\n                              <\/div>\n            <\/div>\n          <\/div>\n                             \n          <div>\n            <div class=\"block-ma-tab-nav-item \">\n              <div class=\"block-list-boxes__icon\">\n                                \n              <\/div>\n              <div class=\"block-ma-tab-side-title-inner\">\n                                  ISO 27018\n                              <\/div>\n            <\/div>\n          <\/div>\n                        <\/div>\n    \n    <div class=\"block-ma-tabs\">\n                             <div class=\"block-ma-tab  block-ma-tab--active \">\n          <div class=\"block-ma-tab-side\">\n            <div class=\"block-ma-tab-side-title\">\n              <div class=\"block-ma-tab-side-title-bg\"\n                                  style=\"background: transparent linear-gradient(103deg, #C1C6C3 0%, #ff8200 100%) 0% 0% no-repeat padding-box;\"\n                              >\n                              <div class=\"block-ma-tab-side-title-inner\">SOC1 Typ II<\/div>\n                              <div class=\"block-ma-tab-slides-nav\">\n                                                                             <div class=\"block-ma-tab-slides-nav-title  block-ma-tab-slides-nav-title--active \">\n                      <span>SOC1 Typ II<\/span>\n                    <\/div>\n                                                      <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n\n          <div class=\"block-ma-tab-slides\">\n                                         <div class=\"block-ma-tab-slide\">\n                <div class=\"block-ma-tab-slide-nav  block-ma-tab-slide-nav--with-description \">\n                                      SOC1 Typ II\n                                  <\/div>\n                                  <div class=\"block-ma-tab-slide-description\">\n                    <p>Der SOC1-Bericht konzentriert sich auf ausgelagerte Dienstleistungen, die von Dienstleistungsorganisationen erbracht werden und f\u00fcr die Finanzberichterstattung eines Unternehmens (der Anwenderorganisation) relevant sind.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.overit.ai\/app\/uploads\/2024\/06\/AICPA-SOC-LOGO-nobg.png\" alt=\"SOC1\" \/><\/p>\n\n                  <\/div>\n                                                              <\/div>\n                      <\/div>\n        <\/div>\n                               <div class=\"block-ma-tab \">\n          <div class=\"block-ma-tab-side\">\n            <div class=\"block-ma-tab-side-title\">\n              <div class=\"block-ma-tab-side-title-bg\"\n                              >\n                              <div class=\"block-ma-tab-side-title-inner\">SOC2 Typ II<\/div>\n                              <div class=\"block-ma-tab-slides-nav\">\n                                                                             <div class=\"block-ma-tab-slides-nav-title  block-ma-tab-slides-nav-title--active \">\n                      <span>SOC2 Typ II<\/span>\n                    <\/div>\n                                                      <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n\n          <div class=\"block-ma-tab-slides\">\n                                         <div class=\"block-ma-tab-slide\">\n                <div class=\"block-ma-tab-slide-nav  block-ma-tab-slide-nav--with-description \">\n                                      SOC2 Typ II\n                                  <\/div>\n                                  <div class=\"block-ma-tab-slide-description\">\n                    <p>Der SOC2 Typ II-Bericht bezieht sich auf interne Kontrolle und basiert sich auf dem Berichtsstandard AT 101. Er erfasst, wie ein Unternehmen Kundendaten sch\u00fctzt und wie gut diese Kontrollen funktionieren. Unternehmen, die Cloud-Service-Anbieter nutzen, verwenden SOC2-Berichte, um die mit den Technologiedienstleistungen Dritter verbundenen Risiken zu bewerten und anzugehen. Diese Berichte werden von einem unabh\u00e4ngigen Dritten erstellt, der die Grunds\u00e4tze der Sicherheit, Verf\u00fcgbarkeit, Vertraulichkeit und des Datenschutzes pr\u00fcft.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.overit.ai\/app\/uploads\/2024\/06\/AICPA-SOC-LOGO-nobg.png\" alt=\"SOC1\" \/><\/p>\n\n                  <\/div>\n                                                              <\/div>\n                      <\/div>\n        <\/div>\n                               <div class=\"block-ma-tab \">\n          <div class=\"block-ma-tab-side\">\n            <div class=\"block-ma-tab-side-title\">\n              <div class=\"block-ma-tab-side-title-bg\"\n                              >\n                              <div class=\"block-ma-tab-side-title-inner\">SOC3<\/div>\n                              <div class=\"block-ma-tab-slides-nav\">\n                                                                             <div class=\"block-ma-tab-slides-nav-title  block-ma-tab-slides-nav-title--active \">\n                      <span>SOC 3<\/span>\n                    <\/div>\n                                                      <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n\n          <div class=\"block-ma-tab-slides\">\n                                         <div class=\"block-ma-tab-slide\">\n                <div class=\"block-ma-tab-slide-nav  block-ma-tab-slide-nav--with-description \">\n                                      SOC 3\n                                  <\/div>\n                                  <div class=\"block-ma-tab-slide-description\">\n                    <p>Der SOC3-Bericht bietet eine Zusammenfassung auf hoher Ebene der internen Kontrollen eines Unternehmens in Bezug auf Sicherheit, Verf\u00fcgbarkeit, Verarbeitungsintegrit\u00e4t, Vertraulichkeit und Datenschutz. Im Gegensatz zum SOC2-Bericht, der detaillierte und eingeschr\u00e4nkte Informationen enth\u00e4lt, ist der SOC3-Bericht f\u00fcr die \u00f6ffentliche Verbreitung bestimmt und zeigt die Verpflichtung zur Einhaltung der AICPA Trust Services Criteria. Diese Berichte werden von unabh\u00e4ngigen Wirtschaftspr\u00fcfern erstellt und dienen als \u00f6ffentliche Bescheinigung \u00fcber die betriebliche Effizienz einer Dienstleistungsorganisation \u00fcber einen bestimmten Zeitraum.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.overit.ai\/app\/uploads\/2024\/06\/AICPA-SOC-LOGO-nobg.png\" alt=\"SOC1\" \/><\/p>\n\n                  <\/div>\n                                                              <\/div>\n                      <\/div>\n        <\/div>\n                               <div class=\"block-ma-tab \">\n          <div class=\"block-ma-tab-side\">\n            <div class=\"block-ma-tab-side-title\">\n              <div class=\"block-ma-tab-side-title-bg\"\n                              >\n                              <div class=\"block-ma-tab-side-title-inner\">ISO 27001:2022<\/div>\n                              <div class=\"block-ma-tab-slides-nav\">\n                                                                             <div class=\"block-ma-tab-slides-nav-title  block-ma-tab-slides-nav-title--active \">\n                      <span>ISO 27001:2022<\/span>\n                    <\/div>\n                                                      <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n\n          <div class=\"block-ma-tab-slides\">\n                                         <div class=\"block-ma-tab-slide\">\n                <div class=\"block-ma-tab-slide-nav  block-ma-tab-slide-nav--with-description \">\n                                      <a class=\"block-ma-tab-slide-nav-link\" href=\"https:\/\/docs.overit.ai\/hubfs\/Legal\/Cybersecurity\/ISO-IEC_27001-ENG-C819305-1-20251201.pdf\">\n                                      ISO 27001:2022\n                                      <\/a>\n                                  <\/div>\n                                  <div class=\"block-ma-tab-slide-description\">\n                    <p>ISO\/IEC 27001 ist ein Sicherheitsstandard, der ein Information Security Management System (ISMS) formal spezifiziert, das dazu bestimmt ist, die Informationssicherheit unter ausdr\u00fcckliche Managementkontrolle zu stellen. Als formale Spezifikation legt es Anforderungen fest, die definieren, wie das ISMS umsetzt, \u00fcberwacht, aufrechterhalten und kontinuierlich verbessert werden soll. Der Standard schreibt auch eine Reihe von Best Practices vor, die Dokumentationsanforderungen, Verantwortungsbereiche, Verf\u00fcgbarkeit, Zugangskontrolle, Sicherheit, Audits sowie Korrektur- und Pr\u00e4ventivma\u00dfnahmen umfassen.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.overit.ai\/app\/uploads\/2025\/12\/InformationSecuritySys_ISOIEC27001_col.webp\" alt=\"ISO 27001\" width=\"250\" height=\"250\" \/><\/p>\n\n                  <\/div>\n                                                              <\/div>\n                      <\/div>\n        <\/div>\n                               <div class=\"block-ma-tab \">\n          <div class=\"block-ma-tab-side\">\n            <div class=\"block-ma-tab-side-title\">\n              <div class=\"block-ma-tab-side-title-bg\"\n                              >\n                              <div class=\"block-ma-tab-side-title-inner\">ISO 27017<\/div>\n                              <div class=\"block-ma-tab-slides-nav\">\n                                                                             <div class=\"block-ma-tab-slides-nav-title  block-ma-tab-slides-nav-title--active \">\n                      <span>ISO 27017<\/span>\n                    <\/div>\n                                                      <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n\n          <div class=\"block-ma-tab-slides\">\n                                         <div class=\"block-ma-tab-slide\">\n                <div class=\"block-ma-tab-slide-nav  block-ma-tab-slide-nav--with-description \">\n                                      ISO 27017\n                                  <\/div>\n                                  <div class=\"block-ma-tab-slide-description\">\n                    <p>Dieser internationale Standard bietet zus\u00e4tzliche, cloud-spezifische Umsetzungsleitlinien auf Grundlage von ISO\/IEC 27002 und stellt zus\u00e4tzliche Kontrollen bereit, um cloud-spezifische Bedrohungen und Risiken der Informationssicherheit zu adressieren, unter Bezugnahme auf die Abschnitte 5\u201318 in ISO\/IEC 27002: 2013 f\u00fcr Kontrollen, Umsetzungsleitlinien und andere Informationen.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.overit.ai\/app\/uploads\/2025\/12\/InformationSecuritySys_ISOIEC27001_col.webp\" alt=\"ISO 27001\" width=\"250\" height=\"250\" \/><\/p>\n\n                  <\/div>\n                                                              <\/div>\n                      <\/div>\n        <\/div>\n                               <div class=\"block-ma-tab \">\n          <div class=\"block-ma-tab-side\">\n            <div class=\"block-ma-tab-side-title\">\n              <div class=\"block-ma-tab-side-title-bg\"\n                              >\n                              <div class=\"block-ma-tab-side-title-inner\">ISO 27018<\/div>\n                              <div class=\"block-ma-tab-slides-nav\">\n                                                                             <div class=\"block-ma-tab-slides-nav-title  block-ma-tab-slides-nav-title--active \">\n                      <span>ISO 27018<\/span>\n                    <\/div>\n                                                      <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n\n          <div class=\"block-ma-tab-slides\">\n                                         <div class=\"block-ma-tab-slide\">\n                <div class=\"block-ma-tab-slide-nav  block-ma-tab-slide-nav--with-description \">\n                                      ISO 27018\n                                  <\/div>\n                                  <div class=\"block-ma-tab-slide-description\">\n                    <p>ISO hat ISO\/IEC 27018:2014 \u00fcbernommen, einen Zusatz zu ISO\/IEC 27001, ein Rahmenwerk f\u00fcr Cloud-Datenschutz. Dieser Standard st\u00fctzt sich haupts\u00e4chlich auf die EU-Datenschutzgesetze und enth\u00e4lt spezifische Kontrollen und Leitlinien f\u00fcr Cloud Service Provider (CSPs), die als Verarbeiter personenbezogener Daten handeln.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.overit.ai\/app\/uploads\/2025\/12\/InformationSecuritySys_ISOIEC27001_col.webp\" alt=\"ISO 27001\" width=\"250\" height=\"250\" \/><\/p>\n\n                  <\/div>\n                                                              <\/div>\n                      <\/div>\n        <\/div>\n                  <\/div>\n  <\/div>\n\n<div class=\"\">\n<\/div>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-padding-medium-top \n  overit-block-configurable-jumbotron\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n<section class=\"configurable-jumbotron center\" >\n    \n                  <div class=\"cj-title small\">OverIT, Ihr zuverl\u00e4ssiger SaaS FSM-Partner<\/div>\n          \n    \n        <\/section>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-padding-medium-top \n  overit-block-list-boxes\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n<div class=\"block-list-boxes\">\n  <div class=\"block-list-boxes__content\">\n    <div class=\"block-list-boxes__items\">\n              \n                <div class=\"block-list-boxes__slide\">\n          <div class=\"block-list-boxes__item\">\n            \n                                        <div class=\"block-list-boxes__icon\">\n                                <i style=\"color: #FF8200;font-size: 32px;\" class=\"fa-classic fa-solid fa-shield-check\" aria-hidden=\"true\"><\/i>\n              <\/div>\n            \n            <div class=\"block-list-boxes__title\">\n              SSDLC (SECURE SOFTWARE DEVELOPMENT LIFE CYCLE)\n            <\/div>\n\n            <div class=\"block-list-boxes__text\">\n              OverIT ist verpflichtet, sein Code sicher zu halten \n            <\/div>\n\n            <div class=\"block-list-boxes__list\">\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Einsatz modernster SAST-Tools (Static Application Security Testing) und SCA-Tools (Software Composition Analysis)<\/div>\n                <\/div>\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Gew\u00e4hrleistung sicherer Softwarekomponenten von Anfang an<\/div>\n                <\/div>\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>\u00dcberwachung neuer Schwachstellen und Angriffstechniken<\/div>\n                <\/div>\n                          <\/div>\n          <\/div>\n        <\/div>\n              \n                <div class=\"block-list-boxes__slide\">\n          <div class=\"block-list-boxes__item\">\n            \n                                        <div class=\"block-list-boxes__icon\">\n                                <i style=\"color: #FF8200;font-size: 32px;\" class=\"fa-classic fa-regular fa-cloud\" aria-hidden=\"true\"><\/i>\n              <\/div>\n            \n            <div class=\"block-list-boxes__title\">\n              SAAS-SICHERHEIT\n            <\/div>\n\n            <div class=\"block-list-boxes__text\">\n              Die SaaS-Infrastrukturen von OverIT sind durch eine fortschrittliche Technologie gesch\u00fctzt\n            <\/div>\n\n            <div class=\"block-list-boxes__list\">\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Gew\u00e4hrleistung der Sicherheit der Arbeitslasten<\/div>\n                <\/div>\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>\u00dcbermittlung von Daten \u00fcber sichere Kan\u00e4le und Schutz der Daten w\u00e4hrend der Speicherung<\/div>\n                <\/div>\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Auslegung unserer SaaS-Betriebsabl\u00e4ufe auf Ausfallsicherheit und Effektivit\u00e4t auch im Falle von DDoS-Angriffen<\/div>\n                <\/div>\n                          <\/div>\n          <\/div>\n        <\/div>\n          <\/div>\n  <\/div>\n  <div class=\"block-list-boxes__bg\"><\/div>\n<\/div>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-padding-medium-top \n  overit-block-list-boxes\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n<div class=\"block-list-boxes\">\n  <div class=\"block-list-boxes__content\">\n    <div class=\"block-list-boxes__items\">\n              \n                <div class=\"block-list-boxes__slide\">\n          <div class=\"block-list-boxes__item\">\n            \n                                        <div class=\"block-list-boxes__icon\">\n                                <i style=\"color: #FF8200;font-size: 32px;\" class=\"fa-classic fa-brands fa-watchman-monitoring\" aria-hidden=\"true\"><\/i>\n              <\/div>\n            \n            <div class=\"block-list-boxes__title\">\n              SICHERHEITS\u00dcBERWACHUNG &amp; REAKTION AUF VORF\u00c4LLE\n            <\/div>\n\n            <div class=\"block-list-boxes__text\">\n              Die Dienste von OverIT werden st\u00e4ndig von einem spezialisierten SOC (Security Operation Center) \u00fcberwacht\n            <\/div>\n\n            <div class=\"block-list-boxes__list\">\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>\u00dcberwachung aller von verschiedenen Quellen gesammelten Sicherheitsereignisse und Telemetriedaten<\/div>\n                <\/div>\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Untersuchung von Ereignissen und Anomalien durch Sicherheitsanalysten, um echte Sicherheitsprobleme zu erkennen<\/div>\n                <\/div>\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Gew\u00e4hrleistung, dass sich die gesamte Gemeinschaft der verschiedenen Sicherheitsbedrohungen bewusst ist, um sie zu erkennen und mit allen verf\u00fcgbaren Instrumenten und Verfahren angemessen zu reagieren<\/div>\n                <\/div>\n                          <\/div>\n          <\/div>\n        <\/div>\n              \n                <div class=\"block-list-boxes__slide\">\n          <div class=\"block-list-boxes__item\">\n            \n                                        <div class=\"block-list-boxes__icon\">\n                                <i style=\"color: #FF8200;font-size: 32px;\" class=\"fa-classic fa-solid fa-user-shield\" aria-hidden=\"true\"><\/i>\n              <\/div>\n            \n            <div class=\"block-list-boxes__title\">\n              TRAINING &amp; SENSIBILISIERUNG\n            <\/div>\n\n            <div class=\"block-list-boxes__text\">\n              OverIT ist davon \u00fcberzeugt, dass jeder in der Organisation eine aktive und wichtige Rolle im Kampf gegen Cyber-Bedrohungen spielt\n            <\/div>\n\n            <div class=\"block-list-boxes__list\">\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Organisation mehrerer Schulungen zum Sicherheitsbewusstsein<\/div>\n                <\/div>\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Vertrauen auf eine anerkannte Plattform f\u00fcr Sicherheitsbewusstsein<\/div>\n                <\/div>\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Gew\u00e4hrleistung, dass sich die gesamte Gemeinschaft der verschiedenen Sicherheitsbedrohungen bewusst ist, um sie zu erkennen und mit allen verf\u00fcgbaren Instrumenten und Verfahren angemessen zu reagieren<\/div>\n                <\/div>\n                          <\/div>\n          <\/div>\n        <\/div>\n          <\/div>\n  <\/div>\n  <div class=\"block-list-boxes__bg\"><\/div>\n<\/div>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-no-padding \n  overit-block-configurable-jumbotron\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n<section class=\"configurable-jumbotron center\" >\n    \n                  <h3  class=\"cj-title small\">Melden Sie uns ein Cybersicherheitsereignis<\/h3 >\n          \n    \n        <\/section>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-padding-medium \n  overit-block-form-single\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n<div class=\"single-form-cont\">\n      \n\n                                            \n              <!--[if lte IE 8]>\n  <script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2-legacy.js\"><\/script>\n<![endif]-->\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"https:\/\/js.hsforms.net\/forms\/v2.js\"><\/script>\n<script>\n  var langElm = document.querySelector('html');\n  var languageAttr = langElm.getAttribute('lang');\n  var language = 'English';\n  var languageLocal = 'en';\n  var thankYou = \"Thank you.\";\n  if (languageAttr) {\n    if (languageAttr.includes('it')) {\n      language = 'Italian';\n      languageLocal = 'it';\n      thankYou = \"Grazie.\";\n    } else if (languageAttr.includes('es')) {\n      language = 'Spanish';\n      languageLocal = 'es';\n      thankYou = \"Gracias.\";\n    } else if (languageAttr.includes('de')) {\n      language = 'German';\n      languageLocal = 'de';\n      thankYou = \"Danke.\";\n    }\n  }\n\n  \/\/ Localized error messages\n  var errorMessages = {\n    en: {\n      emailAt: \"Email must contain '@'.\",\n      emailInvalid: \"Please enter a valid email address.\",\n      checkbox: \"Please check this box to continue.\"\n    },\n    it: {\n      emailAt: \"L'email deve contenere '@'.\",\n      emailInvalid: \"Inserisci un indirizzo email valido.\",\n      checkbox: \"Seleziona questa casella per continuare.\"\n    },\n    es: {\n      emailAt: \"El correo debe contener '@'.\",\n      emailInvalid: \"Por favor, introduce una direcci\u00f3n de correo v\u00e1lida.\",\n      checkbox: \"Marca esta casilla para continuar.\"\n    },\n    de: {\n      emailAt: \"Die E-Mail muss ein '@' enthalten.\",\n      emailInvalid: \"Bitte geben Sie eine g\u00fcltige E-Mail-Adresse ein.\",\n      checkbox: \"Bitte aktivieren Sie dieses K\u00e4stchen, um fortzufahren.\"\n    }\n  };\n  \/\/ Helper to get custom error message for a field\n  function getCustomMessage(field) {\n    if (field.name === 'email') {\n      var value = field.value || '';\n      if (!value.includes('@')) {\n        return errorMessages[languageLocal].emailAt;\n      } else if (!\/^\\S+@\\S+\\.\\S+$\/.test(value)) {\n        return errorMessages[languageLocal].emailInvalid;\n      }\n    }\n    if (field.type === 'checkbox') {\n      return errorMessages[languageLocal].checkbox;\n    }\n    \/\/ For other fields, return the original error message if present\n    var fieldWrapper = field.closest ? field.closest('.hs-form-field') : field.parentNode;\n    var errorMessage = fieldWrapper ? fieldWrapper.querySelector('.hs-error-msg, .hs-error-msgs li, .error-message, .invalid-message') : null;\n    if (errorMessage && errorMessage.textContent) {\n      return errorMessage.textContent;\n    }\n    return '';\n  }\n  \/\/ General function to set custom error message and ARIA attributes\n  function setCustomError(field, errorMessage, customMessage) {\n    if (!errorMessage) return;\n    if (customMessage) {\n      errorMessage.innerHTML = '<label class=\"hs-error-msg hs-main-font-element\">' + customMessage + '<\/label>';\n      if (!errorMessage.id) {\n        var baseId = field.id || field.name || 'field';\n        errorMessage.id = baseId + '-error';\n      }\n      field.setAttribute('aria-invalid', 'true');\n      field.setAttribute('aria-describedby', errorMessage.id);\n      errorMessage.setAttribute('role', 'alert');\n    } else {\n      errorMessage.innerHTML = '';\n      field.removeAttribute('aria-invalid');\n      field.removeAttribute('aria-describedby');\n    }\n  }\n\n  hbspt.forms.create({\n    region: \"na1\",\n    portalId: \"4800556\",\n        formId: \"f4661cd1-26dd-4c16-a657-02825d6164b2\",\n    inlineMessage: thankYou,\n    locale: `${languageLocal}`,\n    onFormSubmitted: function($form) {\n      setTimeout(function() {\n        const confirmation = document.querySelector('.submitted-message');\n        if (confirmation) {\n          confirmation.setAttribute('tabindex', '-1');\n          confirmation.focus();\n        }\n      }, 500);\n    },\n    translations: {\n      en: {\n        fieldLabels: {\n          firstname: \"First name\",\n          lastname: \"Last Name\",\n          company: \"Company name\",\n          email: \"Email\",\n          phone: \"Phone number\",\n          mobilephone: \"Mobile\",\n          industry_overit: \"Industry\",\n          state: \"Country\",\n          number_of_on_field_resources: \"Number of on field resources\",\n          message: \"Message\",\n          security_system_or_services_impacted: \"System or services Impacted\",\n          security_description: \"Description\",\n          security_subject: \"Subject\",\n          file_upload: \"File upload\"\n        }\n      },\n      es: {\n        fieldLabels: {\n          firstname: \"Nombre\",\n          lastname: \"Apellidos\",\n          company: \"Nombre de la empresa\",\n          email: \"Correo\",\n          phone: \"N\u00famero de tel\u00e9fono\",\n          mobilephone: \"N\u00famero de m\u00f3vil\",\n          industry_overit: \"Industria\",\n          state: \"Pa\u00eds\",\n          number_of_on_field_resources: \"N\u00famero de recursos en el campo\",\n          message: \"Mensaje\",\n          security_system_or_services_impacted: \"Sistema o servicios impactados\",\n          security_description: \"Descripci\u00f3n\",\n          security_subject: \"Asunto\",\n          file_upload: \"Cargar un archivo\"\n        }\n      },\n      it: {\n        fieldLabels: {\n          firstname: \"Nome\",\n          lastname: \"Cognome\",\n          company: \"Nome azienda\",\n          email: \"E-mail\",\n          phone: \"Numero di telefono\",\n          mobilephone: \"Numero di cellulare\",\n          industry_overit: \"Settore\",\n          state: \"Paese\",\n          number_of_on_field_resources: \"Numero di risorse sul campo\",\n          message: \"Messaggio\",\n          security_system_or_services_impacted: \"Sistemi o servizi interessati\",\n          security_description: \"Descrizione\",\n          security_subject: \"Oggetto\",\n          file_upload: \"Carica un file\"\n        }\n      },\n      de: {\n        fieldLabels: {\n          firstname: \"Vorname\",\n          lastname: \"Nachname\",\n          company: \"Unternehmen\",\n          email: \"E-Mail\",\n          phone: \"Mobiltelefon\",\n          mobilephone: \"Handy\",\n          industry_overit: \"Branche\",\n          state: \"Land\",\n          number_of_on_field_resources: \"Anzahl der Au\u00dfendienstressourcen\",\n          message: \"Nachricht\",\n          security_system_or_services_impacted: \"Betroffene Systeme oder Dienste\",\n          security_description: \"Beschreibung\",\n          security_subject: \"Betreff\",\n          file_upload: \"Datei hochladen\"\n        }\n      }\n    },\n    onFormReady: function ($form, e) {\n      window.hubspotformElements = window.hubspotformElements || {};\n      var formId = 'f4661cd1-26dd-4c16-a657-02825d6164b2';\n      window.hubspotformElements[formId] = $form[0];\n      var formElement = window.hubspotformElements[formId];\n      \/\/ Real-time validation for email and required checkboxes\n      var emailInput = formElement.querySelector('input[name=\"email\"]');\n      if (emailInput) {\n        emailInput.addEventListener('blur', function() {\n          setTimeout(function() {\n            var value = emailInput.value || '';\n            var fieldWrapper = emailInput.closest('.hs-form-field') || emailInput.parentNode;\n            var errorMessage = fieldWrapper ? fieldWrapper.querySelector('.hs-error-msg, .hs-error-msgs li, .error-message, .invalid-message') : null;\n            var customMessage = getCustomMessage(emailInput);\n            setCustomError(emailInput, errorMessage, customMessage);\n          }, 150);\n        });\n      }\n      var requiredCheckboxes = formElement.querySelectorAll('input[type=\"checkbox\"].hs-input');\n      requiredCheckboxes.forEach(function(checkbox) {\n        checkbox.addEventListener('change', function() {\n          var fieldWrapper = checkbox.closest('.hs-form-field') || checkbox.parentNode;\n          var errorMessage = fieldWrapper ? fieldWrapper.querySelector('.hs-error-msg, .hs-error-msgs li, .error-message, .invalid-message') : null;\n          var customMessage = getCustomMessage(checkbox);\n          setCustomError(checkbox, errorMessage, customMessage);\n        });\n      });\n      var consetRichElm = formElement.querySelectorAll('.legal-consent-container .hs-richtext');\n      var subType1 = formElement.querySelector('[class*=\"hs_LEGAL_CONSENT.subscription_type_5261220\"] label > span p');\n      var subType2 = formElement.querySelector('[class*=\"hs_LEGAL_CONSENT.subscription_type_5382246\"] label > span p');\n      if (subType2 == null) {\n        subType2 = formElement.querySelector('[class*=\"hs_LEGAL_CONSENT.subscription_type_5382246\"] label > span');\n      }\n      if(language == 'Spanish') {\n        if(consetRichElm[0]) {\n          consetRichElm[0].innerHTML = '<p>Declaro que he le\u00eddo y comprendido la <a href=\"\/es\/privacy-policy\/\" target=\"_blank\" rel=\"noopener\">Pol\u00edtica de Privacidad<\/a> de OverIT y, por lo tanto:<\/p>';\n        }\n        if(subType1) {\n          subType1.innerHTML = 'Consiento el tratamiento de mis datos personales para recibir una respuesta a mi solicitud'\n        }\n        if(subType2){\n          subType2.innerHTML = 'Consiento el tratamiento de mis datos personales con fines de marketing.'\n        }\n        if(consetRichElm[1]) {\n          consetRichElm[1].innerHTML = '<p><\/p>';\n        }\n      }\n      if(language == 'Italian') {\n        if(consetRichElm[0]) {\n          consetRichElm[0].innerHTML = '<p>Dichiaro di aver letto e compreso <a href=\"\/it\/privacy-policy\/\" target=\"_blank\" rel=\"noopener\">l\\'Informativa sulla Privacy<\/a> di OverIT e pertanto:<\/p>';\n        }\n        if(subType1) {\n          subType1.innerHTML = 'Acconsento al trattamento dei miei dati personali per ottenere una risposta alla mia richiesta.';\n        }\n        if(subType2){\n          subType2.innerHTML = 'Acconsento al trattamento dei miei dati personali per finalit\u00e0 di marketing.';\n        }\n        if(consetRichElm[1]) {\n          consetRichElm[1].innerHTML = '<p><\/p>';\n        }\n      }\n      if(language == 'German') {\n        if(consetRichElm[0]) {\n          consetRichElm[0].innerHTML = '<p>Ich erkl\u00e4re, dass ich die <a href=\"\/de\/privacy-policy\/\" target=\"_blank\" rel=\"noopener\">Datenschutzerkl\u00e4rung<\/a> von OverIT zur Kenntnis genommen habe und deshalb:<\/p>';\n        }\n        if(subType1) {\n          subType1.innerHTML = 'Ich stimme der Verarbeitung meiner pers\u00f6nlichen Daten zu, um eine Antwort auf meine Anfrage zu erhalten.';\n        }\n        if(subType2){\n          subType2.innerHTML = 'Ich stimme der Verarbeitung meiner pers\u00f6nlichen Daten f\u00fcr Marketingzwecke zu.';\n        }\n        if(consetRichElm[1]) {\n          consetRichElm[1].innerHTML = '<p><\/p>';\n        }\n      }\n\n      \/\/ File upload customization\n      var fileInput = formElement.querySelector('input[type=\"file\"]');\n\n\n      if (fileInput) {\n        \/\/ Hide the default file input\n        fileInput.style.display = 'none';\n\n        \/\/ Create a custom button\n        var customButton = document.createElement('button');\n        customButton.type = 'button';\n        customButton.className = 'hs-button primary upload';\n\n        \/\/ Create the text for selected files\n        var fileText = document.createElement('div');\n        fileText.className = 'file-text';\n\n        \/\/ Set the text based on the language\n        var buttonText, noFileText, filesSelectedText;\n\n        if (language == 'Spanish') {\n          buttonText = 'Seleccionar archivo';\n          noFileText = 'Ning\u00fan archivo seleccionado';\n          filesSelectedText = 'archivos seleccionados';\n        } else if (language == 'Italian') {\n          buttonText = 'Scegli file';\n          noFileText = 'Nessun file selezionato';\n          filesSelectedText = 'file selezionati';\n        } else if (language == 'German') {\n          buttonText = 'Datei ausw\u00e4hlen';\n          noFileText = 'Keine Datei wurde ausgew\u00e4hlt';\n          filesSelectedText = 'Ausgew\u00e4hlte Dateien';\n        } else {\n          buttonText = 'Choose Files';\n          noFileText = 'No file chosen';\n          filesSelectedText = 'files selected';\n        }\n\n        customButton.textContent = buttonText;\n        fileText.textContent = noFileText;\n\n        \/\/ Add elements to the DOM\n        fileInput.parentNode.classList.add('hs-form-file-upload');\n        fileInput.parentNode.appendChild(customButton);\n        fileInput.parentNode.appendChild(fileText);\n\n        \/\/ Handle click on custom button\n        customButton.addEventListener('click', function() {\n          fileInput.click();\n        });\n\n        \/\/ Handle file change\n        fileInput.addEventListener('change', function() {\n          var files = this.files;\n          if (files.length > 0) {\n            if (files.length === 1) {\n              fileText.textContent = files[0].name;\n            } else {\n              fileText.textContent = files.length + ' ' + filesSelectedText;\n            }\n          } else {\n            fileText.textContent = noFileText;\n          }\n        });\n      }\n    },\n    onBeforeFormSubmit: function($form) {\n      var htmlForm = $form[0];\n\n      var langSelector = htmlForm.querySelector('[name=\"language\"]');\n      if (langSelector) {\n        langSelector.value = language;\n      }\n\n      var pageURLSelector = htmlForm.querySelector('[name=\"last_touchpoint_url\"]');\n      if (pageURLSelector) {\n        pageURLSelector.value = window.location.href;\n      }\n\n      var pageTitleSelector = htmlForm.querySelector('[name=\"last_touchpoint\"]');\n      if (pageTitleSelector) {\n        pageTitleSelector.value = document.title;\n      }\n\n      var reachedFromSelector = htmlForm.querySelector('[name=\"referring_page_url\"]');\n      if (reachedFromSelector) {\n        reachedFromSelector.value = document.referrer;\n      }\n    },\n    onFormError: function() {\n      \/\/ Retrieve the correct formElement using formId\n      var formId = 'f4661cd1-26dd-4c16-a657-02825d6164b2';\n      var formElement = window.hubspotformElements[formId];\n      if (!formElement) return;\n      setTimeout(function() {\n        \/\/ Find all fields with errors\n        var errorFields = Array.from(formElement.querySelectorAll('.invalid, .error'));\n        \/\/ Also include required checkboxes with visible error messages\n        var requiredCheckboxes = Array.from(formElement.querySelectorAll('input[type=\"checkbox\"].hs-input'));\n        requiredCheckboxes.forEach(function(checkbox) {\n          var wrapper = checkbox.closest('.hs-form-field');\n          var errorMsg = wrapper ? wrapper.querySelector('.hs-error-msg, .hs-error-msgs li, .error-message, .invalid-message') : null;\n          if (errorMsg && errorMsg.offsetParent !== null && !errorFields.includes(checkbox)) {\n            errorFields.push(checkbox);\n          }\n        });\n        if (errorFields.length > 0) {\n          errorFields.forEach(function(field, index) {\n            var fieldWrapper = field.closest ? field.closest('.hs-form-field') : field.parentNode;\n            if (!fieldWrapper) return;\n            var errorMessage = fieldWrapper.querySelector('.hs-error-msg, .hs-error-msgs li, .error-message, .invalid-message');\n            if (!errorMessage) return;\n            var customMessage = getCustomMessage(field);\n            setCustomError(field, errorMessage, customMessage);\n          });\n          \/\/ Focus and scroll to the first error field\n          var firstErrorField = errorFields[0];\n          var target = firstErrorField.closest ? firstErrorField.closest('.hs-form-field') : firstErrorField;\n          target.scrollIntoView({\n            behavior: 'smooth',\n            block: 'center'\n          });\n          setTimeout(function() {\n            firstErrorField.focus();\n          }, 300);\n        }\n      }, 100);\n    },\n    onFormSubmit: function($form) {\n      window.overit.hubspot.onFormSubmit($form);\n    }\n  });\n<\/script>\n      <\/div>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-padding-medium \n  overit-block-wide-info-image\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n\n\n\n<div class=\"wii left  \" id=\"\">\n        <div class=\"wii__image\" >\n                        <img decoding=\"async\" src=\"https:\/\/www.overit.ai\/app\/uploads\/2024\/06\/Cybersecurity-whitepaper-mockup.png\" alt=\"Cybersecurity-whitepaper-mockup\" width=\"1903\" height=\"1324\" \/>\n                  <\/div>\n  \n      <div class=\"wii__content\" >\n    \n                      <h3 id=\"wii-title-6a02adbe672a3\" class=\"wii__title\" style=\"  \">OverIT Information Security &amp; Data Protection Whitepaper<\/h3>\n          \n          <div class=\"wii__description\" style=\" \">\n        <p>Erfahren Sie mehr \u00fcber den Ansatz von OverIT in Bezug auf Informationssicherheit, Datenschutz, Cloud-Sicherheit und Compliance. Laden Sie das vollst\u00e4ndige Whitepaper herunter und erfahren Sie, wie wir Ihre Daten sch\u00fctzen.<\/p>\n\n      <\/div>\n    \n        \n    \n          <div class=\"wii__cta\">\n        <a\n          href=\"https:\/\/www.overit.ai\/resources\/information-security-and-data-protection\/\"\n                    class=\"wii__cta--orange \"\n          aria-describedby=\"wii-title-6a02adbe672a3\"\n        >\n          ZUGRIFF AUF DAS WHITEPAPER\n        <\/a>\n      <\/div>\n    \n    \n      <\/div>\n  \n  <\/div>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":67204,"parent":67147,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"case_study_category":[],"class_list":["post-67202","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.6 (Yoast SEO v25.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersicherheit-L\u00f6sungen von OverIT<\/title>\n<meta name=\"description\" content=\"Erfahren Sie, wie OverIT mit modernsten Cybersicherheit-L\u00f6sungen ein sicheres Field Service Management gew\u00e4hrleistet.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersicherheit-L\u00f6sungen von OverIT\" \/>\n<meta property=\"og:description\" content=\"Erfahren Sie, wie OverIT mit modernsten Cybersicherheit-L\u00f6sungen ein sicheres Field Service Management gew\u00e4hrleistet.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"OverIT\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-26T14:27:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.overit.ai\/app\/uploads\/2023\/03\/OverIT-cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1027\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cybersicherheit\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/\",\"url\":\"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/\",\"name\":\"Cybersicherheit-L\u00f6sungen von OverIT\",\"isPartOf\":{\"@id\":\"https:\/\/www.overit.ai\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.overit.ai\/app\/uploads\/2023\/03\/OverIT-cybersecurity.jpg\",\"datePublished\":\"2026-01-23T15:41:05+00:00\",\"dateModified\":\"2026-02-26T14:27:56+00:00\",\"description\":\"Erfahren Sie, wie OverIT mit modernsten Cybersicherheit-L\u00f6sungen ein sicheres Field Service Management gew\u00e4hrleistet.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/#primaryimage\",\"url\":\"https:\/\/www.overit.ai\/app\/uploads\/2023\/03\/OverIT-cybersecurity.jpg\",\"contentUrl\":\"https:\/\/www.overit.ai\/app\/uploads\/2023\/03\/OverIT-cybersecurity.jpg\",\"width\":2048,\"height\":1027,\"caption\":\"OverIT cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.overit.ai\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unternehmen\",\"item\":\"https:\/\/www.overit.ai\/de\/unternehmen\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.overit.ai\/de\/#website\",\"url\":\"https:\/\/www.overit.ai\/de\/\",\"name\":\"OverIT\",\"description\":\"Innovation in Field Service Management\",\"publisher\":{\"@id\":\"https:\/\/www.overit.ai\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.overit.ai\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.overit.ai\/de\/#organization\",\"name\":\"OverIT\",\"url\":\"https:\/\/www.overit.ai\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.overit.ai\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.overit.ai\/app\/uploads\/2021\/10\/OverIT-logo-400.png\",\"contentUrl\":\"https:\/\/www.overit.ai\/app\/uploads\/2021\/10\/OverIT-logo-400.png\",\"width\":400,\"height\":250,\"caption\":\"OverIT\"},\"image\":{\"@id\":\"https:\/\/www.overit.ai\/de\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersicherheit-L\u00f6sungen von OverIT","description":"Erfahren Sie, wie OverIT mit modernsten Cybersicherheit-L\u00f6sungen ein sicheres Field Service Management gew\u00e4hrleistet.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/","og_locale":"de_DE","og_type":"article","og_title":"Cybersicherheit-L\u00f6sungen von OverIT","og_description":"Erfahren Sie, wie OverIT mit modernsten Cybersicherheit-L\u00f6sungen ein sicheres Field Service Management gew\u00e4hrleistet.","og_url":"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/","og_site_name":"OverIT","article_modified_time":"2026-02-26T14:27:56+00:00","og_image":[{"width":2048,"height":1027,"url":"https:\/\/www.overit.ai\/app\/uploads\/2023\/03\/OverIT-cybersecurity.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Cybersicherheit","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/","url":"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/","name":"Cybersicherheit-L\u00f6sungen von OverIT","isPartOf":{"@id":"https:\/\/www.overit.ai\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/#primaryimage"},"image":{"@id":"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.overit.ai\/app\/uploads\/2023\/03\/OverIT-cybersecurity.jpg","datePublished":"2026-01-23T15:41:05+00:00","dateModified":"2026-02-26T14:27:56+00:00","description":"Erfahren Sie, wie OverIT mit modernsten Cybersicherheit-L\u00f6sungen ein sicheres Field Service Management gew\u00e4hrleistet.","breadcrumb":{"@id":"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/#primaryimage","url":"https:\/\/www.overit.ai\/app\/uploads\/2023\/03\/OverIT-cybersecurity.jpg","contentUrl":"https:\/\/www.overit.ai\/app\/uploads\/2023\/03\/OverIT-cybersecurity.jpg","width":2048,"height":1027,"caption":"OverIT cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.overit.ai\/de\/unternehmen\/cybersicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.overit.ai\/de\/"},{"@type":"ListItem","position":2,"name":"Unternehmen","item":"https:\/\/www.overit.ai\/de\/unternehmen\/"},{"@type":"ListItem","position":3,"name":"Cybersicherheit"}]},{"@type":"WebSite","@id":"https:\/\/www.overit.ai\/de\/#website","url":"https:\/\/www.overit.ai\/de\/","name":"OverIT","description":"Innovation in Field Service Management","publisher":{"@id":"https:\/\/www.overit.ai\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.overit.ai\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.overit.ai\/de\/#organization","name":"OverIT","url":"https:\/\/www.overit.ai\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.overit.ai\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.overit.ai\/app\/uploads\/2021\/10\/OverIT-logo-400.png","contentUrl":"https:\/\/www.overit.ai\/app\/uploads\/2021\/10\/OverIT-logo-400.png","width":400,"height":250,"caption":"OverIT"},"image":{"@id":"https:\/\/www.overit.ai\/de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.overit.ai\/de\/wp-json\/wp\/v2\/pages\/67202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.overit.ai\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.overit.ai\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.overit.ai\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.overit.ai\/de\/wp-json\/wp\/v2\/comments?post=67202"}],"version-history":[{"count":9,"href":"https:\/\/www.overit.ai\/de\/wp-json\/wp\/v2\/pages\/67202\/revisions"}],"predecessor-version":[{"id":68803,"href":"https:\/\/www.overit.ai\/de\/wp-json\/wp\/v2\/pages\/67202\/revisions\/68803"}],"up":[{"embeddable":true,"href":"https:\/\/www.overit.ai\/de\/wp-json\/wp\/v2\/pages\/67147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.overit.ai\/de\/wp-json\/wp\/v2\/media\/67204"}],"wp:attachment":[{"href":"https:\/\/www.overit.ai\/de\/wp-json\/wp\/v2\/media?parent=67202"}],"wp:term":[{"taxonomy":"case_study_category","embeddable":true,"href":"https:\/\/www.overit.ai\/de\/wp-json\/wp\/v2\/case_study_category?post=67202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}