{"id":11432,"date":"2021-04-27T14:22:13","date_gmt":"2021-04-27T12:22:13","guid":{"rendered":"https:\/\/usd.formwandler.rocks\/leistungen\/"},"modified":"2025-02-21T13:41:07","modified_gmt":"2025-02-21T12:41:07","slug":"services","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/services\/","title":{"rendered":"Services"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" module_id=\"1\" _builder_version=\"4.27.0\" _module_preset=\"default\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/Slider-usd-Services-400px.jpg\" background_position=\"bottom_center\" custom_padding=\"80px||80px||true|\" locked=\"off\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.0\" _module_preset=\"default\" header_text_color=\"#F07F1D\" global_colors_info=\"{}\"]<\/p>\n<h1><span style=\"color: #ffffff;line-height: 1.2\"><strong>WE PROTECT COMPANIES<\/strong><\/span><br \/>\n<span style=\"color: #ffffff;line-height: 1.2\">AGAINST HACKERS AND CRIMINALS.<\/span><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"50px|||||\" locked=\"off\" global_colors_info=\"{}\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||16px|||\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.0\" _module_preset=\"default\" global_colors_info=\"{}\"]<\/p>\n<h2 class=\"p1\" style=\"text-align: center\">Our focus. more security.<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.27.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.27.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-services-security-audits.jpg\" title_text=\"usd-services-security-audits\" url=\"https:\/\/www.usd.de\/en\/security-audits\/\" _builder_version=\"4.27.0\" _module_preset=\"default\" custom_margin=\"0px||||false|false\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_font_size=\"14px\" custom_margin=\"21px|21px|21px|21px|true|true\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"]<\/p>\n<h3 class=\"ba-card-title\">Security Audits<\/h3>\n<p><span>NIS-2. KRITIS. Supply Chain. Cloud. Due Diligence.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-audits\/\" button_text=\"Learn more\" _builder_version=\"4.27.0\" _module_preset=\"default\" custom_margin=\"0px|||20px|false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.27.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-pci-4.0.jpg\" title_text=\"usd-ag-pci-4.0\" url=\"https:\/\/www.usd.de\/en\/pci-security-services\/\" _builder_version=\"4.27.0\" _module_preset=\"default\" custom_margin=\"0px||||false|false\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_font_size=\"14px\" custom_margin=\"21px|21px|21px|21px|true|true\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"]<\/p>\n<h3 class=\"ba-card-title\">PCI Security Services<\/h3>\n<p><span><\/span><span>DSS. SSF. P2PE. 3DS. PIN. SWIFT. Consulting. Assessments. Certifications. ASV Scans.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pci-payment-security\/\" button_text=\"Learn more\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px|||20px|false|false\" hover_enabled=\"0\" global_colors_info=\"{}\" sticky_enabled=\"0\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.27.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-services-pentest.jpg\" title_text=\"usd-services-pentest\" url=\"https:\/\/www.usd.de\/en\/pentest\/\" _builder_version=\"4.27.0\" _module_preset=\"default\" height=\"197px\" custom_margin=\"0px||||false|false\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.0\" _module_preset=\"default\" text_font_size=\"14px\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\"]<\/p>\n<h3 class=\"ba-card-title\">Pentests &amp; Red Teaming<\/h3>\n<p>Systems. Applications. Mainframes. SAP. Cloud. AD. Red Team Assessments.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/\" button_text=\"Learn more\" _builder_version=\"4.27.0\" _module_preset=\"default\" custom_margin=\"0px|||20px|false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.27.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"1_3\" _builder_version=\"4.27.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-services-security-analysis.jpg\" title_text=\"usd-services-security-analysis\" url=\"https:\/\/www.usd.de\/en\/security-analysis-pentests\/\" _builder_version=\"4.27.0\" _module_preset=\"default\" custom_margin=\"0px||||false|false\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.2\" _module_preset=\"default\" text_font_size=\"14px\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\"]<\/p>\n<h3 class=\"ba-card-title\">Security Analyses<\/h3>\n<p><span>Security Scans. Code Review. Incident Response. Forensics. Vulnerability Management.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-analysis-pentests\/\" button_text=\"Learn more\" _builder_version=\"4.27.0\" _module_preset=\"default\" custom_margin=\"0px|||20px|false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.27.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-consulting-isms-beratung-1.jpeg\" title_text=\"usd-consulting-isms-beratung-1\" url=\"https:\/\/www.usd.de\/en\/security-consulting\/isms-iso27001-consulting\/\" _builder_version=\"4.27.0\" _module_preset=\"default\" custom_margin=\"0px||||false|false\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.0\" _module_preset=\"default\" text_font_size=\"14px\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\"]<\/p>\n<h3 class=\"ba-card-title\">Security Consulting: ISMS \/ ISO 27001<\/h3>\n<p><span><\/span><span>Strategy. Consulting. Implementation. Audit Readiness.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-consulting\/isms-iso27001-consulting\/\" button_text=\"Learn more\" _builder_version=\"4.27.0\" _module_preset=\"default\" custom_margin=\"0px|||20px|false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.27.0\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-beitragsbild-finanzwesen-bait-harmonisierung.jpg\" alt=\"BAIT Harmonisierung\" title_text=\"usd-ag-beitragsbild-finanzwesen-bait-harmonisierung\" url=\"https:\/\/www.usd.de\/en\/security-consulting\/information-security-in-finance\/\" _builder_version=\"4.27.0\" _module_preset=\"default\" height=\"197px\" custom_margin=\"0px||||false|false\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.0\" _module_preset=\"default\" text_font_size=\"14px\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\"]<\/p>\n<h3 class=\"ba-card-title\">Security Consulting: InfoSec in Finance<\/h3>\n<p>DORA. Regulatory Requirements. Strategy. Consulting. Implementation.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-consulting\/information-security-in-finance\/\" button_text=\"Learn more\" _builder_version=\"4.27.0\" _module_preset=\"default\" custom_margin=\"0px|||20px|false|false\" global_colors_info=\"{}\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WE PROTECT COMPANIES AGAINST HACKERS AND CRIMINALS.Our focus. more security.Security Audits NIS-2. KRITIS. Supply Chain. Cloud. Due Diligence.PCI Security Services DSS. SSF. P2PE. 3DS. PIN. SWIFT. Consulting. Assessments. Certifications. ASV Scans.Pentests &amp; Red Teaming Systems. Applications. Mainframes. SAP. Cloud. AD. Red Team Assessments.Security Analyses Security Scans. Code Review. Incident Response. Forensics. Vulnerability Management.Security Consulting: ISMS [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:divi\/placeholder \/-->","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-11432","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11432","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=11432"}],"version-history":[{"count":5,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11432\/revisions"}],"predecessor-version":[{"id":56517,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11432\/revisions\/56517"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=11432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}