{"id":8216,"date":"2024-05-31T08:19:55","date_gmt":"2024-05-31T06:19:55","guid":{"rendered":"https:\/\/smarttecs.com\/cyber-security\/methodology\/"},"modified":"2025-06-23T08:34:26","modified_gmt":"2025-06-23T06:34:26","slug":"methodology","status":"publish","type":"page","link":"https:\/\/smarttecs.com\/en\/cyber-security\/methodology\/","title":{"rendered":"Methodology"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"8216\" class=\"elementor elementor-8216 elementor-1519\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-73da8f5 e-con-full e-flex e-con e-parent\" data-id=\"73da8f5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-87859ad e-flex e-con-boxed e-con e-child\" data-id=\"87859ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-adb1c6b elementor-hidden-tablet elementor-hidden-mobile_extra elementor-hidden-mobile elementor-widget elementor-widget-the7-breadcrumb\" data-id=\"adb1c6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7-breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"assistive-text\">You are here:<\/div><ol class=\"breadcrumbs text-small rcrumbs\" itemscope itemtype=\"https:\/\/schema.org\/BreadcrumbList\"><li itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><a itemprop=\"item\" href=\"https:\/\/smarttecs.com\/en\/\" title=\"Home\"><span itemprop=\"name\">Home<\/span><\/a><meta itemprop=\"position\" content=\"1\" \/><\/li><li class=\"current\" itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><span itemprop=\"name\">Page<\/span><meta itemprop=\"position\" content=\"2\" \/><\/li><\/ol>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34fda23 elementor-widget elementor-widget-heading\" data-id=\"34fda23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Methodology<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e64d76 elementor-widget elementor-widget-heading\" data-id=\"2e64d76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Standardized and certified processes<br>lead to maximum customer satisfaction<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-78c7f30 e-con-full e-flex e-con e-child\" data-id=\"78c7f30\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-8458980 e-flex e-con-boxed e-con e-child\" data-id=\"8458980\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9223d33 elementor-widget elementor-widget-heading\" data-id=\"9223d33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Clear strategies. Proven methods. <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f809370 elementor-widget elementor-widget-text-editor\" data-id=\"f809370\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\">\n<div class=\"min-h-[20px] text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"8b627770-1bf1-4f1f-b530-f88fca258c77\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert dark\">\n<p>Our methodology forms the foundation of our successful collaboration. Whether it is identifying the right target groups, the structured testing procedure or the use of the latest tools and certified processes &#8211; we work precisely and on an equal footing. <\/p>\n<p>Find out more about how we use clearly defined processes and proven technologies to minimize risks, identify vulnerabilities and ensure the security of your systems. Our approaches are practical and proven &#8211; always aimed at achieving the best possible results for your individual requirements. <\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"mb-2 flex gap-3 empty:hidden -ml-2\">\n<div class=\"items-center justify-start rounded-xl p-1 flex\">\n<div class=\"flex items-center\"> <\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f7faf52 e-flex e-con-boxed e-con e-parent\" data-id=\"f7faf52\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e29c8cb e-flex e-con-boxed e-con e-child\" data-id=\"e29c8cb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d22a9f8 elementor-widget elementor-widget-image\" data-id=\"d22a9f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/smarttecs.com\/cyber-security\/methodik\/zielgruppen\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/smarttecs.com\/wp-content\/uploads\/elementor\/thumbs\/cs_zielgruppe_hq-scaled-qul23yk0culdhdqdmw16b33nm7aptgocj5kdrhcdum.webp\" title=\"cs_zielgruppe_hq\" alt=\"Zielgruppen\" class=\"elementor-animation-float\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f6222f elementor-widget elementor-widget-heading\" data-id=\"4f6222f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Target groups<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5940f7 elementor-widget elementor-widget-text-editor\" data-id=\"a5940f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Information about which industries and companies our security solutions are best suited for and how we meet their specific needs.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4256f62 elementor-widget elementor-widget-the7_button_widget\" data-id=\"4256f62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_button_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\"><a href=\"https:\/\/smarttecs.com\/cyber-security\/methodik\/zielgruppen\/\" class=\"box-button elementor-button elementor-size-lg\">learn more<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d348511 e-flex e-con-boxed e-con e-child\" data-id=\"d348511\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8bbbf03 elementor-widget elementor-widget-image\" data-id=\"8bbbf03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/smarttecs.com\/cyber-security\/methodik\/testvorgehen\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/smarttecs.com\/wp-content\/uploads\/elementor\/thumbs\/cs_testvorgehen_hq-scaled-qul24arwtp23ob8mnjbbpi0nc7mhlj0uwu1p02u9lq.webp\" title=\"cs_testvorgehen_hq\" alt=\"Testmetodik\" class=\"elementor-animation-float\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31a63ad elementor-widget elementor-widget-heading\" data-id=\"31a63ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Test procedure<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7349f8f elementor-widget elementor-widget-text-editor\" data-id=\"7349f8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Detailed description of our structured testing methods for identifying and eliminating security risks in IT systems.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45ee046 elementor-widget elementor-widget-the7_button_widget\" data-id=\"45ee046\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_button_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\"><a href=\"https:\/\/smarttecs.com\/cyber-security\/methodik\/testvorgehen\/\" class=\"box-button elementor-button elementor-size-lg\">learn more<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f678efe e-flex e-con-boxed e-con e-child\" data-id=\"f678efe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d3445ec elementor-widget elementor-widget-image\" data-id=\"d3445ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/smarttecs.com\/cyber-security\/methodik\/tools-zertifikate\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/smarttecs.com\/wp-content\/uploads\/elementor\/thumbs\/cs_tools-certs_hq-scaled-qul24dlfe75yn54j72j7ezb14d8l8mc1x805fwq332.webp\" title=\"cs_tools-certs_hq\" alt=\"Tools und Zertifikate\" class=\"elementor-animation-float\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ca9cf7 elementor-widget elementor-widget-heading\" data-id=\"9ca9cf7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Tools &amp; Certificates<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5febe13 elementor-widget elementor-widget-text-editor\" data-id=\"5febe13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Overview of the technologies and certifications we use to ensure the highest standards in cybersecurity.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fec568 elementor-widget elementor-widget-the7_button_widget\" data-id=\"1fec568\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"the7_button_widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\"><a href=\"https:\/\/smarttecs.com\/cyber-security\/methodik\/tools-zertifikate\/\" class=\"box-button elementor-button elementor-size-lg\">learn more<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Sie befinden sich hier: Start Methodology Standardized and certified processes lead to maximum customer satisfaction Clear strategies. Proven methods. Our methodology forms the foundation of our successful collaboration. Whether it is identifying the right target groups, the structured testing procedure or the use of the latest tools and certified processes &#8211; we work precisely and&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":8013,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-microsite.php","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-8216","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/pages\/8216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/comments?post=8216"}],"version-history":[{"count":2,"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/pages\/8216\/revisions"}],"predecessor-version":[{"id":8218,"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/pages\/8216\/revisions\/8218"}],"up":[{"embeddable":true,"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/pages\/8013"}],"wp:attachment":[{"href":"https:\/\/smarttecs.com\/en\/wp-json\/wp\/v2\/media?parent=8216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}