{"id":5941,"date":"2024-07-13T10:19:48","date_gmt":"2024-07-13T08:19:48","guid":{"rendered":"https:\/\/itconcepts.ch\/?page_id=5941"},"modified":"2026-04-16T01:15:47","modified_gmt":"2026-04-15T23:15:47","slug":"it-security","status":"publish","type":"page","link":"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/","title":{"rendered":"IT Security"},"content":{"rendered":"\n    <section class=\"page-block-block block-with-top-bottom-margins\" id=\"\">\n        <div class=\"cols-block  \">\n            <div class=\"col-l\">\n                <div class=\"title-block title-block-untertitel-desk\">\n                        <p class=\"subtitle\">How secure is your IT?<\/p>\n\n    <h2 class=\"like-h1\">Protecting your IT infrastructure \u2013 secure, reliable, comprehensive<\/h2>\n\n    <div class=\"text-block-simple\"><p>IT security encompasses all measures taken to protect IT systems from damage, threats and unauthorised access. This includes the protection of files, networks, end devices, servers, cloud services and data centres.<\/p>\n<p>In a connected world with constant internet access, the focus is on measures against external cyber threats such as hacker attacks, as well as internal risks such as unauthorised data access by employees. An effective IT security strategy is crucial for protecting businesses from financial loss, reputational damage and legal consequences.<\/p>\n<\/div>\n                <\/div>\n\n                                    <div class=\"links-wrapper\">\n                                                                                    <a href=\"#\" class=\"primary-button-border open-contact-overlay\"  data-source=\"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/\" data-sourcetitle=\"Protecting your IT infrastructure \u2013 secure, reliable, comprehensive\">Contact us now<\/a>\n                                                                                                                            <\/div>\n                            <\/div>\n\n            <div class=\"col-r\">\n                <div class=\"title-block title-block-untertitel-mob\">\n                        <p class=\"subtitle\">How secure is your IT?<\/p>\n\n\n                <\/div>\n\n                                    <img decoding=\"async\" src=\"https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/20250312_ITConcepts_Signe_vorlage-2-783x800.png\" class=\"\" alt=\"Protecting your IT infrastructure \u2013 secure, reliable, comprehensive\" \/>\n                            <\/div>\n        <\/div>\n    <\/section>\n\n\n\n\n    <section class=\"text-cards-4-cols-block with-grey-bg\" id=\"\">\n                    <img decoding=\"async\" src=\"https:\/\/itconcepts.ch\/wp-content\/themes\/it_concepts\/assets\/images\/red_bg_lines_left.svg\" class=\"block-lines-left block-lines-left-grey-version\" alt=\"Block Lines\" \/>\n            <img decoding=\"async\" src=\"https:\/\/itconcepts.ch\/wp-content\/themes\/it_concepts\/assets\/images\/red_bg_lines_right.svg\" class=\"block-lines-right block-lines-left-grey-version\" alt=\"Block Lines\" \/>\n        \n        <div class=\"title-block title-block-narrow\">\n                <p class=\"subtitle\">The new threat <\/p>\n\n    <h2 class=\"like-h1\">Why IT security is so important <\/h2>\n\n    <div class=\"text-block-simple\"><p>The sharp rise in the number of cyber attacks on businesses demonstrates that IT security is essential today. In addition to legal requirements, economic considerations are particularly crucial. IT security protects sensitive and personal data, ensures compliance with data protection regulations and maintains the trust of your customers. At the same time, it prevents reputational damage, financial losses and legal consequences. It is particularly critical that two out of three security breaches result from incorrect internal access rights. For this reason, Identity &#038; Access Management (IAM) is a central component of any IT security strategy.<\/p>\n<\/div>\n        <\/div>\n\n            <\/section>\n\n\n\n\n\n            <section class=\"text-slider-in-red-bg-block\" id=\"\">\n            <div class=\"text-slider-in-red-bg-block-content-wrapper\">\n                                    <p class=\"subtitle text-white mb_0\">This is how dangerous cyberattacks are<\/p>\n                    <div class=\"subtitle-divider\"><\/div>\n                \n                                    <div class=\"text-slider-in-red-bg\">\n                                                                                    <h2 class=\"very-big mb_0 text-white\"><span>A quarter<\/span> of small and medium-sized Swiss businesses have been the victims of a <span>cyberattack.<\/span><\/h2>\n                                                                                                                <h2 class=\"very-big mb_0 text-white\"><span>12,930<\/span> small and medium-sized enterprises (out of a total of 38,250) suffered <span>financial losses<\/span> as a result.<\/h2>\n                                                                                                                <h2 class=\"very-big mb_0 text-white\"><span>One in ten cyber attacks<\/span> resulted in reputational damage and\/or <span>the loss of customer data.<\/span><\/h2>\n                                                                        <\/div>\n                            <\/div>\n        <\/section>\n    \n\n\n\n    <section class=\"text-cards-4-cols-block with-grey-bg\" id=\"\">\n        \n        <div class=\"title-block title-block-narrow\">\n            \n    <h2 class=\"like-h1\">IT Security at ITConcepts<\/h2>\n\n        <\/div>\n\n                    <div class=\"text-cards-cols text-cards-cols-always-hidden\">\n                                    <div class=\"text-card\">\n                        <div class=\"text-card-inner-container text-card-inner-container-grey\">\n                                                            <div class=\"icon-wrapper\">\n                                    <div style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/Security-Management.svg')\"><\/div>\n                                <\/div>\n                            \n                                                            <h3 class=\"big mb_0 text-center\">Security Management<\/h3>\n                                <div class=\"title-divider\"><\/div>\n                            \n                                                            <p class=\"small mb_0 text-center\">Effective security monitoring, lightning-fast response times in the event of incidents, and proactive defence against even the most complex threats.<\/p>\n                            \n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"text-card\">\n                        <div class=\"text-card-inner-container text-card-inner-container-grey\">\n                                                            <div class=\"icon-wrapper\">\n                                    <div style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/Identity-Access_bearbeitet.svg')\"><\/div>\n                                <\/div>\n                            \n                                                            <h3 class=\"big mb_0 text-center\">IAM solutions<\/h3>\n                                <div class=\"title-divider\"><\/div>\n                            \n                                                            <p class=\"small mb_0 text-center\">Identity and Access Management (IAM) is essential for IT security. Efficient user management processes and consistent access policies are an integral part of this.<\/p>\n                            \n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"text-card\">\n                        <div class=\"text-card-inner-container text-card-inner-container-grey\">\n                                                            <div class=\"icon-wrapper\">\n                                    <div style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/Data-Access-Governance_bearbeitet-371dab.svg')\"><\/div>\n                                <\/div>\n                            \n                                                            <h3 class=\"big mb_0 text-center\">Data Access Governance<\/h3>\n                                <div class=\"title-divider\"><\/div>\n                            \n                                                            <p class=\"small mb_0 text-center\">Automated access controls protect your company data. With a consistent strategy, you can minimise risks and ensure compliance with IT security requirements.<\/p>\n                            \n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"text-card\">\n                        <div class=\"text-card-inner-container text-card-inner-container-grey\">\n                                                            <div class=\"icon-wrapper\">\n                                    <div style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2026\/02\/Bild1.png')\"><\/div>\n                                <\/div>\n                            \n                                                            <h3 class=\"big mb_0 text-center\">Protection against ransomware<\/h3>\n                                <div class=\"title-divider\"><\/div>\n                            \n                                                            <p class=\"small mb_0 text-center\">AI-powered anti-ransomware solution \u2013 Simple, intelligent and comprehensive protection.<\/p>\n                            \n                                                    <\/div>\n                    <\/div>\n                            <\/div>\n\n            <div class=\"text-cards-slider text-cards-slider-always-visible\">\n                                    <div class=\"text-card\">\n                        <div class=\"text-card-inner-container text-card-inner-container-grey\">\n                                                            <div class=\"icon-wrapper\">\n                                    <div style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/Security-Management.svg')\"><\/div>\n                                <\/div>\n                            \n                                                            <h3 class=\"big mb_0 text-center\">Security Management<\/h3>\n                                <div class=\"title-divider\"><\/div>\n                            \n                                                            <p class=\"small mb_0 text-center\">Effective security monitoring, lightning-fast response times in the event of incidents, and proactive defence against even the most complex threats.<\/p>\n                            \n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"text-card\">\n                        <div class=\"text-card-inner-container text-card-inner-container-grey\">\n                                                            <div class=\"icon-wrapper\">\n                                    <div style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/Identity-Access_bearbeitet.svg')\"><\/div>\n                                <\/div>\n                            \n                                                            <h3 class=\"big mb_0 text-center\">IAM solutions<\/h3>\n                                <div class=\"title-divider\"><\/div>\n                            \n                                                            <p class=\"small mb_0 text-center\">Identity and Access Management (IAM) is essential for IT security. Efficient user management processes and consistent access policies are an integral part of this.<\/p>\n                            \n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"text-card\">\n                        <div class=\"text-card-inner-container text-card-inner-container-grey\">\n                                                            <div class=\"icon-wrapper\">\n                                    <div style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/Data-Access-Governance_bearbeitet-371dab.svg')\"><\/div>\n                                <\/div>\n                            \n                                                            <h3 class=\"big mb_0 text-center\">Data Access Governance<\/h3>\n                                <div class=\"title-divider\"><\/div>\n                            \n                                                            <p class=\"small mb_0 text-center\">Automated access controls protect your company data. With a consistent strategy, you can minimise risks and ensure compliance with IT security requirements.<\/p>\n                            \n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"text-card\">\n                        <div class=\"text-card-inner-container text-card-inner-container-grey\">\n                                                            <div class=\"icon-wrapper\">\n                                    <div style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2026\/02\/Bild1.png')\"><\/div>\n                                <\/div>\n                            \n                                                            <h3 class=\"big mb_0 text-center\">Protection against ransomware<\/h3>\n                                <div class=\"title-divider\"><\/div>\n                            \n                                                            <p class=\"small mb_0 text-center\">AI-powered anti-ransomware solution \u2013 Simple, intelligent and comprehensive protection.<\/p>\n                            \n                                                    <\/div>\n                    <\/div>\n                            <\/div>\n            <\/section>\n\n\n\n\n\n            <section class=\"accordion-block block-with-top-bottom-margins\" id=\"\">\n            <div class=\"title-block title-block-narrow-left\">\n                    <p class=\"subtitle\">Top-class IT security solutions<\/p>\n\n\n            <\/div>\n\n            \n            <div class=\"accordion\">\n                <div class=\"accordion-left-part\">\n                                            <div class=\"accordion-title-wrapper active\" data-id=\"0\">\n                            <h3 class=\"medium-big mb_0\">Splunk<\/h3>\n                        <\/div>\n                                            <div class=\"accordion-title-wrapper \" data-id=\"1\">\n                            <h3 class=\"medium-big mb_0\">Halcyon<\/h3>\n                        <\/div>\n                                            <div class=\"accordion-title-wrapper \" data-id=\"2\">\n                            <h3 class=\"medium-big mb_0\">Sailpoint<\/h3>\n                        <\/div>\n                                            <div class=\"accordion-title-wrapper \" data-id=\"3\">\n                            <h3 class=\"medium-big mb_0\">Evolveum<\/h3>\n                        <\/div>\n                                    <\/div>\n\n                <div class=\"accordion-right-part\">\n                                            <div class=\"accordion-content-wrapper active\" data-id=\"0\">\n                                                            <p class=\"medium text-bold mb_0\">Operational Intelligence Platform<\/p>\n                                <div class=\"accordion-content-title-divider\"><\/div>\n                            \n                                                            <p class=\"small mb_0\">Splunk Enterprise analyses machine data from any source to deliver operational intelligence and optimise IT, security and business performance. With intuitive analytics, machine learning, standardised applications and open APIs, Splunk offers a flexible platform that scales to become an enterprise-wide analytics backbone.<\/p>\n                            \n                                                            <div class=\"links-wrapper\">\n                                                                                                                        <a href=\"https:\/\/itconcepts.ch\/software-loesungen\/splunk\/\" class=\"blue-dark-button-bg \" target=\"_blank\" data-source=\"\" data-sourcetitle=\"\">More about Splunk<\/a>\n                                                                                                            <\/div>\n                                                    <\/div>\n                                            <div class=\"accordion-content-wrapper \" data-id=\"1\">\n                                                            <p class=\"medium text-bold mb_0\">AI-powered anti-ransomware platform<\/p>\n                                <div class=\"accordion-content-title-divider\"><\/div>\n                            \n                                                            <p class=\"small mb_0\">Halcyon AI complements existing security solutions with targeted protection against ransomware \u2013 including prevention, detection and recovery.<\/p>\n                            \n                                                            <div class=\"links-wrapper\">\n                                                                                                                        <a href=\"http:\/\/itconcepts.ch\/software-loesungen\/halcyon\/\" class=\"blue-dark-button-bg \"  data-source=\"\" data-sourcetitle=\"\">More about Halcyon<\/a>\n                                                                                                            <\/div>\n                                                    <\/div>\n                                            <div class=\"accordion-content-wrapper \" data-id=\"2\">\n                                                            <p class=\"medium text-bold mb_0\">Identity &#038; Access Management<\/p>\n                                <div class=\"accordion-content-title-divider\"><\/div>\n                            \n                                                            <p class=\"small mb_0\">SailPoint is a leading provider of identity and access management (IAM) solutions that enable organisations to precisely control access rights, achieve comprehensive visibility and ensure compliance-driven security.<\/p>\n                            \n                                                            <div class=\"links-wrapper\">\n                                                                                                                        <a href=\"https:\/\/itconcepts.ch\/software-loesungen\/sailpoint\/\" class=\"blue-dark-button-bg \"  data-source=\"\" data-sourcetitle=\"\">More about Sailpoint<\/a>\n                                                                                                            <\/div>\n                                                    <\/div>\n                                            <div class=\"accordion-content-wrapper \" data-id=\"3\">\n                                                            <p class=\"medium text-bold mb_0\">Identity &#038; Access Management<\/p>\n                                <div class=\"accordion-content-title-divider\"><\/div>\n                            \n                                                            <p class=\"small mb_0\">Evolveum offers IAM solutions with a focus on IT security. The open-source platform MidPoint enables the secure, centralised management of identities and access rights \u2013 in a flexible and compliance-oriented manner.<\/p>\n                            \n                                                            <div class=\"links-wrapper\">\n                                                                                                                        <a href=\"https:\/\/itconcepts.ch\/software-loesungen\/evolveum-midpoint-schweiz\/\" class=\"blue-dark-button-bg \"  data-source=\"\" data-sourcetitle=\"\">More about Evolveum<\/a>\n                                                                                                            <\/div>\n                                                    <\/div>\n                                    <\/div>\n            <\/div>\n\n            <div class=\"accordion-slider-mobile\">\n                                    <div class=\"accordion-slide\">\n                        <div class=\"accordion-slide-inner-wrapper\">\n                            <div class=\"accordion-slide-title-wrapper\">\n                                <h3 class=\"medium-big mb_0\">Splunk<\/h3>\n                            <\/div>\n\n                            <div class=\"accordion-slide-content-wrapper\">\n                                                                    <p class=\"medium text-bold mb_0\">Operational Intelligence Platform<\/p>\n                                    <div class=\"accordion-slide-content-title-divider\"><\/div>\n                                \n                                                                    <p class=\"small mb_0\">Splunk Enterprise analyses machine data from any source to deliver operational intelligence and optimise IT, security and business performance. With intuitive analytics, machine learning, standardised applications and open APIs, Splunk offers a flexible platform that scales to become an enterprise-wide analytics backbone.<\/p>\n                                \n                                                                    <div class=\"links-wrapper\">\n                                                                                                                                    <a href=\"https:\/\/itconcepts.ch\/software-loesungen\/splunk\/\" class=\"blue-dark-button-bg \" target=\"_blank\">More about Splunk<\/a>\n                                                                                                                        <\/div>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"accordion-slide\">\n                        <div class=\"accordion-slide-inner-wrapper\">\n                            <div class=\"accordion-slide-title-wrapper\">\n                                <h3 class=\"medium-big mb_0\">Halcyon<\/h3>\n                            <\/div>\n\n                            <div class=\"accordion-slide-content-wrapper\">\n                                                                    <p class=\"medium text-bold mb_0\">AI-powered anti-ransomware platform<\/p>\n                                    <div class=\"accordion-slide-content-title-divider\"><\/div>\n                                \n                                                                    <p class=\"small mb_0\">Halcyon AI complements existing security solutions with targeted protection against ransomware \u2013 including prevention, detection and recovery.<\/p>\n                                \n                                                                    <div class=\"links-wrapper\">\n                                                                                                                                    <a href=\"http:\/\/itconcepts.ch\/software-loesungen\/halcyon\/\" class=\"blue-dark-button-bg \" >More about Halcyon<\/a>\n                                                                                                                        <\/div>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"accordion-slide\">\n                        <div class=\"accordion-slide-inner-wrapper\">\n                            <div class=\"accordion-slide-title-wrapper\">\n                                <h3 class=\"medium-big mb_0\">Sailpoint<\/h3>\n                            <\/div>\n\n                            <div class=\"accordion-slide-content-wrapper\">\n                                                                    <p class=\"medium text-bold mb_0\">Identity &#038; Access Management<\/p>\n                                    <div class=\"accordion-slide-content-title-divider\"><\/div>\n                                \n                                                                    <p class=\"small mb_0\">SailPoint is a leading provider of identity and access management (IAM) solutions that enable organisations to precisely control access rights, achieve comprehensive visibility and ensure compliance-driven security.<\/p>\n                                \n                                                                    <div class=\"links-wrapper\">\n                                                                                                                                    <a href=\"https:\/\/itconcepts.ch\/software-loesungen\/sailpoint\/\" class=\"blue-dark-button-bg \" >More about Sailpoint<\/a>\n                                                                                                                        <\/div>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"accordion-slide\">\n                        <div class=\"accordion-slide-inner-wrapper\">\n                            <div class=\"accordion-slide-title-wrapper\">\n                                <h3 class=\"medium-big mb_0\">Evolveum<\/h3>\n                            <\/div>\n\n                            <div class=\"accordion-slide-content-wrapper\">\n                                                                    <p class=\"medium text-bold mb_0\">Identity &#038; Access Management<\/p>\n                                    <div class=\"accordion-slide-content-title-divider\"><\/div>\n                                \n                                                                    <p class=\"small mb_0\">Evolveum offers IAM solutions with a focus on IT security. The open-source platform MidPoint enables the secure, centralised management of identities and access rights \u2013 in a flexible and compliance-oriented manner.<\/p>\n                                \n                                                                    <div class=\"links-wrapper\">\n                                                                                                                                    <a href=\"https:\/\/itconcepts.ch\/software-loesungen\/evolveum-midpoint-schweiz\/\" class=\"blue-dark-button-bg \" >More about Evolveum<\/a>\n                                                                                                                        <\/div>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                            <\/div>\n        <\/section>\n    \n\n\n\n\n            <section class=\"person-kontakt-block block-with-grey-bg\" id=\"\">\n            <div class=\"person-kontakt-cols\">\n                <div class=\"person-kontakt-left-part\">\n                    <div class=\"person-kontakt-left-part-inner-container\">\n                                                    <h2 class=\"like-h1\">Do you have any questions about IT security?<\/h2>\n                        \n                                                    <p>Would you like to find the right IT security solution for your business? Our experts are here to advise you free of charge and with no obligation \u2013 get in touch!<\/p>\n                        \n                                                    <div class=\"person-kontakt-email-wrapper\">\n                                <a href=\"mailto: info@itconcepts.ch\" class=\"primary-button-bg btn-medium\">Get in touch<\/a>\n                            <\/div>\n                                            <\/div>\n                <\/div>\n\n                <div class=\"person-kontakt-right-part\">\n                    <div class=\"person-kontakt-right-part-inner-container\">\n                                                    <img decoding=\"async\" src=\"https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/02\/christian_gerber_1x1-800x800.jpg\" \/>\n                        \n                                                    <h3 class=\"small text-red text-bold mb_0\">Christian Gerber<\/h3>\n                        \n                                                    <p class=\" mb_0\">CRMO<\/p>\n                                            <\/div>\n                <\/div>\n            <\/div>\n        <\/section>\n    \n\n\n\n            <section class=\"logos-slider-block  block-with-top-bottom-margins\" id=\"\">\n            <div class=\"title-block text-center\">\n                    <p class=\"subtitle\">Our partners <\/p>\n\n\n            <\/div>\n\n            <div class=\"logos-slider\">\n                                    <div class=\"logos-slide\">\n                        <div class=\"logos-slide-inner-container\">\n                                                            <div class=\"logo\" style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/Saviynt_logo_Navy_CMYK.png')\"><\/div>\n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"logos-slide\">\n                        <div class=\"logos-slide-inner-container\">\n                                                            <a href=\"http:\/\/itconcepts.ch\/plattformen\/xurrent\/\" target=\"_blank\" class=\"logo\" style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/DIGITAL_Xurrent-Formerly_Logo-TM_Preferred_FullColor.png')\"><\/a>\n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"logos-slide\">\n                        <div class=\"logos-slide-inner-container\">\n                                                            <a href=\"http:\/\/itconcepts.ch\/plattformen\/bmc-software\/\" target=\"_blank\" class=\"logo\" style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/BMC-logo-transparent.png')\"><\/a>\n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"logos-slide\">\n                        <div class=\"logos-slide-inner-container\">\n                                                            <a href=\"http:\/\/itconcepts.ch\/plattformen\/evolveum\/\" target=\"_blank\" class=\"logo\" style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/evolveum-logo-transparent.png')\"><\/a>\n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"logos-slide\">\n                        <div class=\"logos-slide-inner-container\">\n                                                            <a href=\"http:\/\/itconcepts.ch\/plattformen\/nexthink\/\" target=\"_blank\" class=\"logo\" style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/nexthink-web-transparent.png')\"><\/a>\n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"logos-slide\">\n                        <div class=\"logos-slide-inner-container\">\n                                                            <a href=\"http:\/\/itconcepts.ch\/plattformen\/splunk\/\" target=\"_blank\" class=\"logo\" style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/Splunk-logo-transparent.png')\"><\/a>\n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"logos-slide\">\n                        <div class=\"logos-slide-inner-container\">\n                                                            <a href=\"http:\/\/itconcepts.ch\/plattformen\/sailpoint\/\" target=\"_blank\" class=\"logo\" style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/Sailpoint-logo-transparent.png')\"><\/a>\n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"logos-slide\">\n                        <div class=\"logos-slide-inner-container\">\n                                                            <a href=\"http:\/\/itconcepts.ch\/plattformen\/workato\/\" target=\"_blank\" class=\"logo\" style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/06\/Workato-logo-black-1.png')\"><\/a>\n                                                    <\/div>\n                    <\/div>\n                                    <div class=\"logos-slide\">\n                        <div class=\"logos-slide-inner-container\">\n                                                            <a href=\"https:\/\/itconcepts.ch\/software-loesungen\/halcyon\/\" target=\"_blank\" class=\"logo\" style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2026\/02\/Logo-Halcyon.png')\"><\/a>\n                                                    <\/div>\n                    <\/div>\n                            <\/div>\n        <\/section>\n    \n\n\n\n\n            <section class=\"blog-slider-block with-grey-bg\" id=\"\">\n            <div class=\"title-block text-center\">\n                \n\n            <\/div>\n\n            <div class=\"blog-cards blog-slider\">\n                <div class=\"blog-card\">\n    <a href=\"https:\/\/itconcepts.ch\/en\/workato-the-agentic-ai-platform-for-businesses\/\" class=\"blog-card-inner-container grey-bg\">\n        <div class=\"top-wrapper\">\n            <div class=\"blog-image-block\" style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2026\/01\/iStock-2209981183-800x533.png')\">\n                <img decoding=\"async\" src=\"https:\/\/itconcepts.ch\/wp-content\/themes\/it_concepts\/assets\/images\/post_placeholder.png\" alt=\"Placeholder\" \/>\n            <\/div>\n\n            <div class=\"top-content-wrapper\">\n                <h2 class=\"like-h1 mb_0\">Workato \u2013 The Agentic AI platform for businesses<\/h2>\n\n                            <\/div>\n        <\/div>\n\n        <div class=\"link-wrapper\">\n            <div class=\"fake-primary-button-bg\">Read more<\/div>\n        <\/div>\n    <\/a>\n<\/div>\n<div class=\"blog-card\">\n    <a href=\"https:\/\/itconcepts.ch\/en\/gartner-magic-quadrant-for-ipaas\/\" class=\"blog-card-inner-container grey-bg\">\n        <div class=\"top-wrapper\">\n            <div class=\"blog-image-block\" style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/08\/iStock-1471444483-800x450.jpg')\">\n                <img decoding=\"async\" src=\"https:\/\/itconcepts.ch\/wp-content\/themes\/it_concepts\/assets\/images\/post_placeholder.png\" alt=\"Placeholder\" \/>\n            <\/div>\n\n            <div class=\"top-content-wrapper\">\n                <h2 class=\"like-h1 mb_0\">Gartner\u00ae Magic Quadrant\u2122 for iPaaS<\/h2>\n\n                            <\/div>\n        <\/div>\n\n        <div class=\"link-wrapper\">\n            <div class=\"fake-primary-button-bg\">Read more<\/div>\n        <\/div>\n    <\/a>\n<\/div>\n<div class=\"blog-card\">\n    <a href=\"https:\/\/itconcepts.ch\/en\/siam-itsm-und-itil-kurz-erklaert\/\" class=\"blog-card-inner-container grey-bg\">\n        <div class=\"top-wrapper\">\n            <div class=\"blog-image-block\" style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/02\/was-ist-der-unterschied-zwischen-itsm-und-siam-700x367.5-c-default.png')\">\n                <img decoding=\"async\" src=\"https:\/\/itconcepts.ch\/wp-content\/themes\/it_concepts\/assets\/images\/post_placeholder.png\" alt=\"Placeholder\" \/>\n            <\/div>\n\n            <div class=\"top-content-wrapper\">\n                <h2 class=\"like-h1 mb_0\">SIAM, ITSM and ITIL: briefly explained<\/h2>\n\n                                    <div class=\"blog-slide-title-divider\"><\/div>\n                    <p class=\"mb_0 text-black\">The IT world is full of abbreviations &#8211; but what do SIAM, ITSM and ITIL really mean? In this article, you will learn in a compact and understandable way how these concepts are connected and what role they play in IT service management.<\/p>\n                            <\/div>\n        <\/div>\n\n        <div class=\"link-wrapper\">\n            <div class=\"fake-primary-button-bg\">Read more<\/div>\n        <\/div>\n    <\/a>\n<\/div>\n<div class=\"blog-card\">\n    <a href=\"https:\/\/itconcepts.ch\/en\/bmc-als-leader-im-gartner-magic-quadrant-2024\/\" class=\"blog-card-inner-container grey-bg\">\n        <div class=\"top-wrapper\">\n            <div class=\"blog-image-block\" style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/02\/gartner-quadrant-post-1-700x491.29213483146-c-default.png')\">\n                <img decoding=\"async\" src=\"https:\/\/itconcepts.ch\/wp-content\/themes\/it_concepts\/assets\/images\/post_placeholder.png\" alt=\"Placeholder\" \/>\n            <\/div>\n\n            <div class=\"top-content-wrapper\">\n                <h2 class=\"like-h1 mb_0\">BMC as a Leader in the Gartner\u00ae Magic Quadrant\u2122 2024<\/h2>\n\n                                    <div class=\"blog-slide-title-divider\"><\/div>\n                    <p class=\"mb_0 text-black\">BMC once again sets standards in IT service management! The company was recognized as a Leader in the current Gartner\u00ae Magic Quadrant\u2122 2024. Find out which innovations and strengths catapult BMC to the top of the industry.<\/p>\n                            <\/div>\n        <\/div>\n\n        <div class=\"link-wrapper\">\n            <div class=\"fake-primary-button-bg\">Read more<\/div>\n        <\/div>\n    <\/a>\n<\/div>\n<div class=\"blog-card\">\n    <a href=\"https:\/\/itconcepts.ch\/en\/how-control-m-dominos-supports-data-driven-knowledge-delivery\/\" class=\"blog-card-inner-container grey-bg\">\n        <div class=\"top-wrapper\">\n            <div class=\"blog-image-block\" style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/02\/header-success-story-700x419.88333333333-c-default.png')\">\n                <img decoding=\"async\" src=\"https:\/\/itconcepts.ch\/wp-content\/themes\/it_concepts\/assets\/images\/post_placeholder.png\" alt=\"Placeholder\" \/>\n            <\/div>\n\n            <div class=\"top-content-wrapper\">\n                <h2 class=\"like-h1 mb_0\">How Control-M helps Domino&#8217;s deliver data-driven insights<\/h2>\n\n                                    <div class=\"blog-slide-title-divider\"><\/div>\n                    <p class=\"mb_0 text-black\">Efficient data processing is the key to better business decisions &#8211; also at Domino&#8217;s. Find out how Control-M helps the company to seamlessly orchestrate data, automate processes and gain valuable insights in real time. <\/p>\n                            <\/div>\n        <\/div>\n\n        <div class=\"link-wrapper\">\n            <div class=\"fake-primary-button-bg\">Read more<\/div>\n        <\/div>\n    <\/a>\n<\/div>\n<div class=\"blog-card\">\n    <a href=\"https:\/\/itconcepts.ch\/en\/bmc-helix-itsm-als-fuehrende-loesung-im-gigaom-radar-fuer-itsm-ausgezeichnet\/\" class=\"blog-card-inner-container grey-bg\">\n        <div class=\"top-wrapper\">\n            <div class=\"blog-image-block\" style=\"background-image: url('https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/02\/headergigaom-radar-700x419.88333333333-c-default.png')\">\n                <img decoding=\"async\" src=\"https:\/\/itconcepts.ch\/wp-content\/themes\/it_concepts\/assets\/images\/post_placeholder.png\" alt=\"Placeholder\" \/>\n            <\/div>\n\n            <div class=\"top-content-wrapper\">\n                <h2 class=\"like-h1 mb_0\">BMC Helix ITSM recognized as a leading solution in the GigaOm Radar for ITSM!<\/h2>\n\n                                    <div class=\"blog-slide-title-divider\"><\/div>\n                    <p class=\"mb_0 text-black\">BMC Helix ITSM impresses again and secures a top position in the GigaOm Radar for ITSM! Find out why this solution was rated as a leader and how it helps organizations manage IT services smarter and more efficiently.<\/p>\n                            <\/div>\n        <\/div>\n\n        <div class=\"link-wrapper\">\n            <div class=\"fake-primary-button-bg\">Read more<\/div>\n        <\/div>\n    <\/a>\n<\/div>\n            <\/div>\n\n                    <\/section>\n    \n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":18,"featured_media":3154,"parent":2617,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5941","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IT Security - IT Concepts<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"IT Concepts\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-15T23:15:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/header_16x9.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/\",\"url\":\"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/\",\"name\":\"IT Security - IT Concepts\",\"isPartOf\":{\"@id\":\"https:\/\/itconcepts.ch\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/header_16x9.jpg\",\"datePublished\":\"2024-07-13T08:19:48+00:00\",\"dateModified\":\"2026-04-15T23:15:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/#primaryimage\",\"url\":\"https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/header_16x9.jpg\",\"contentUrl\":\"https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/header_16x9.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itconcepts.ch\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\/\/itconcepts.ch\/en\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itconcepts.ch\/#website\",\"url\":\"https:\/\/itconcepts.ch\/\",\"name\":\"IT Concepts\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itconcepts.ch\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"IT Concepts\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IT Security - IT Concepts","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/","og_locale":"en_US","og_type":"article","og_title":"IT Security","og_url":"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/","og_site_name":"IT Concepts","article_modified_time":"2026-04-15T23:15:47+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/header_16x9.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/","url":"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/","name":"IT Security - IT Concepts","isPartOf":{"@id":"https:\/\/itconcepts.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/#primaryimage"},"image":{"@id":"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/header_16x9.jpg","datePublished":"2024-07-13T08:19:48+00:00","dateModified":"2026-04-15T23:15:47+00:00","breadcrumb":{"@id":"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itconcepts.ch\/en\/solutions\/it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/#primaryimage","url":"https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/header_16x9.jpg","contentUrl":"https:\/\/itconcepts.ch\/wp-content\/uploads\/2025\/03\/header_16x9.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itconcepts.ch\/en\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/itconcepts.ch\/en\/solutions\/"},{"@type":"ListItem","position":3,"name":"IT Security"}]},{"@type":"WebSite","@id":"https:\/\/itconcepts.ch\/#website","url":"https:\/\/itconcepts.ch\/","name":"IT Concepts","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itconcepts.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itconcepts.ch\/en\/solutions\/it-security\/#local-main-organization-logo","url":"","contentUrl":"","caption":"IT Concepts"}]}},"_links":{"self":[{"href":"https:\/\/itconcepts.ch\/en\/wp-json\/wp\/v2\/pages\/5941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itconcepts.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itconcepts.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itconcepts.ch\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/itconcepts.ch\/en\/wp-json\/wp\/v2\/comments?post=5941"}],"version-history":[{"count":3,"href":"https:\/\/itconcepts.ch\/en\/wp-json\/wp\/v2\/pages\/5941\/revisions"}],"predecessor-version":[{"id":5947,"href":"https:\/\/itconcepts.ch\/en\/wp-json\/wp\/v2\/pages\/5941\/revisions\/5947"}],"up":[{"embeddable":true,"href":"https:\/\/itconcepts.ch\/en\/wp-json\/wp\/v2\/pages\/2617"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itconcepts.ch\/en\/wp-json\/wp\/v2\/media\/3154"}],"wp:attachment":[{"href":"https:\/\/itconcepts.ch\/en\/wp-json\/wp\/v2\/media?parent=5941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}