{"id":7193,"date":"2026-01-15T16:57:37","date_gmt":"2026-01-15T16:57:37","guid":{"rendered":"https:\/\/locaterisk.com\/?post_type=landing&#038;p=7193"},"modified":"2026-01-19T12:51:00","modified_gmt":"2026-01-19T12:51:00","slug":"easm-daten-fuer-soc","status":"publish","type":"landing","link":"https:\/\/locaterisk.com\/en\/landing\/easm-daten-fuer-soc\/","title":{"rendered":"Analysis data for your SOC"},"content":{"rendered":"<div class=\"wp-block-lr-landing-header-container\"><div class=\"content\"><div class=\"upload-image\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/01\/Bildschirmfoto-2026-01-08-um-15.32.54.png\"\/><\/div><div class=\"content-container\"><p class=\"pre-headline\">IT risk analyses for SOC, SIEM, SOAR and ticketing<\/p><h1 class=\"headline\">Increase your turnover with extended SOC services<\/h1><p class=\"subline\">LocateRisk enhances your SOC with continuous information about current risks in the external IT infrastructure. The technology automatically identifies the systems and allows recurring checks of the entire ecosystem: company + suppliers. The scan data can be integrated into existing SOC architectures and supports the implementation of relevant regulatory and normative requirements such as NIS-2, GDPR, ISO 27001, TISAX or DORA.<br><div class=\"message_length_controller\" style=\"grid-area: more;\"><\/div><div class=\"message_reactions\" style=\"overflow: hidden; user-select: none; grid-area: reactions; display: flex; flex-wrap: wrap; align-items: flex-start; gap: 4px;\"><\/div><div class=\"unread_marker message_unread_marker\" style=\"opacity: 0; transition: 0.3s ease-out; grid-area: message_unread_marker;\"><\/div><\/p><a id=\"landing-button-ghost\" class=\"pr-2\"><\/a><a id=\"landing-button\" class=\"pr-2\" target=\"\" href=\"#formular\">Arrange demo appointment<\/a><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-lr-image-text-module undefined light left\">\n  <div class=\"content\">\n    \n    <div class=\"column-2\">\n      <img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/01\/Grafik-Scan-Ergebnisse-fuer-mehr-Wachstum.png\" class=\"image\"\/>\n    <\/div>\n    \n    <div class=\"column-2 pad-left-128\">\n      <h3>Open up new sources of income for your SOC<\/h3>\n     <h4>Automated scan results for more growth<\/h4>\n      \n      <p style=\"margin-bottom: 8px;\">\n        Integrate validated information on the external attack surface directly into your workflow and develop your SOC into a proactive security consultancy. You can easily expand your services, provide customers with more comprehensive support and increase your turnover with little effort.\n      <\/p>\n\n      <ul style=\"list-style-type: disc; font-size: 20px; line-height: 1.4; padding-left: 18px; margin-top: 0; margin-left: 0; margin-bottom: 0;\">\n        <li style=\"margin-bottom: 8px; padding-left: 5px;\">\n          <strong>Seamless integration:<\/strong> Scan results (e.g. open ports, expired certificates, CVEs) flow directly into your existing ticket systems (Jira, ServiceNow) or SIEM\/SOAR solutions via the REST API.\n        <\/li>\n        <li style=\"margin-bottom: 8px; padding-left: 5px;\">\n          <strong>More efficient processes<\/strong> Through the automated prioritization of vulnerabilities.\n        <\/li>\n        <li style=\"margin-bottom: 0; padding-left: 5px;\">\n          <strong>Focus on problem solving:<\/strong> You receive prepared information that you can work with directly - no endless lists of raw data.\n        <\/li>\n      <\/ul>\n\n      <div style=\"margin-top: 25px; clear: both; display: block;\">\n        <a class=\"pr-2\" target=\"\" href=\"#formular\">Arrange demo appointment<\/a>\n      <\/div>\n      \n    <\/div> <\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-lr-image-text-module undefined light right\">\n  <div class=\"content\">\n    \n    <div class=\"column-2 pad-right-128\">\n      <h3>Simplify customer communication<\/h3>\n     <h4>Comprehensible reporting for faster protection<\/h4>\n      \n      <p style=\"margin-bottom: 8px;\">\n        Save yourself time-consuming detailed work and rely on comprehensible analyses with context-related details for quick protection. With LocateRisk, you can transform time-consuming manual reporting into automated processes - scalable across all clients, locations and asset groups.\n      <\/p>\n\n      <ul style=\"list-style-type: disc; font-size: 20px; line-height: 1.4; padding-left: 18px; margin-top: 0; margin-left: 0; margin-bottom: 25px;\">\n        <li style=\"margin-bottom: 8px; padding-left: 5px;\">\n          <strong>Indicative score (0-100): <\/strong> Show management clearly where action is needed.\n\n        <\/li>\n        <li style=\"margin-bottom: 8px; padding-left: 5px;\">\n          <strong>Visible progress:<\/strong><\/strong> Easily document how your IT security situation is continuously improving.\n\n        <\/li>\n        <li style=\"margin-bottom: 0; padding-left: 5px;\">\n          <strong>Keep an overview:<\/strong> Multi-client capable - manage subsidiaries and clients easily and efficiently in one central location.\n        <\/li>\n      <\/ul>\n\n      <a class=\"pr-2\" style=\"display: inline-block;\" target=\"\" href=\"#formular\">Arrange demo appointment<\/a>\n    <\/div>\n\n    <div class=\"column-2\">\n      <img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/01\/Bildschirmfoto-2026-01-14-um-17.25.15-Kopie.png\" class=\"image\"\/>\n    <\/div>\n    \n  <\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-lr-image-text-module undefined light left\">\n  <div class=\"content\">\n    \n    <div class=\"column-2\">\n      <img src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/01\/Bildschirmfoto-2026-01-14-um-17.29.12-Kopie.png\"\" class=\"image\"\/>\n    <\/div>\n    \n    <div class=\"column-2 pad-left-128\">\n      <h3>Scale your supplier risk management<\/h3>\n     <h4>Supply Chain Security &amp; IT Compliance<\/h4>\n      \n      <p style=\"margin-bottom: 8px;\">\n        LocateRisk supports the development of supplier cyber risk management in the context of ISO 27001\/27002, NIS-2, TISAX and DORA. \n      <\/p>\n\n      <ul style=\"list-style-type: disc; font-size: 20px; line-height: 1.4; padding-left: 18px; margin-top: 0; margin-left: 0; margin-bottom: 0;\">\n        <li style=\"margin-bottom: 8px; padding-left: 5px;\">\n          <strong>Cyber Vendor Risk Management (C-VRM):<\/strong> Evaluate, compare and monitor hundreds of suppliers simultaneously.\n        <\/li>\n        <li style=\"margin-bottom: 8px; padding-left: 5px;\">\n          <strong>Preventive detection: <\/strong> Identify security issues with partners before a network connection is established.\n        <\/li>\n        <li style=\"margin-bottom: 0; padding-left: 5px;\">\n          <strong>Manage everything centrally in one place\n<\/strong>Automated scans and digital security questionnaires combined in one dashboard - for complete supplier cyber risk management.\n        <\/li>\n      <\/ul>\n\n      <div style=\"margin-top: 25px; clear: both; display: block;\">\n        <a class=\"pr-2\" target=\"\" href=\"#formular\">Arrange demo appointment<\/a>\n      <\/div>\n      \n    <\/div> <\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Expand Managed SOC profitably now<br><\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Solve the problem of data overload and missing context. With LocateRisk, you can increase your revenue without increasing your team's workload. Request your demo now!<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"easm-daten-fuer-soc\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p>I agree to the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\">privacy policy.<\/a><\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\">Request a Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"author":8,"template":"","class_list":["post-7193","landing","type-landing","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Analysedaten f\u00fcr Ihr SOC - LocateRisk<\/title>\n<meta name=\"description\" content=\"Integrieren Sie validierte Informationen zur externen Angriffsfl\u00e4che direkt in Ihren Workflow und entwickeln Sie Ihr SOC zur proaktiven Sicherheitsberatung. Sie k\u00f6nnen Ihre Services einfach erweitern, Kunden umfassender betreuen und steigern ohne gro\u00dfen Aufwand den Umsatz.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/landing\/easm-daten-fuer-soc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analysedaten f\u00fcr Ihr SOC - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Integrieren Sie validierte Informationen zur externen Angriffsfl\u00e4che direkt in Ihren Workflow und entwickeln Sie Ihr SOC zur proaktiven Sicherheitsberatung. Sie k\u00f6nnen Ihre Services einfach erweitern, Kunden umfassender betreuen und steigern ohne gro\u00dfen Aufwand den Umsatz.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/landing\/easm-daten-fuer-soc\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-19T12:51:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/01\/Bildschirmfoto-2026-01-08-um-15.32.54.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/landing\\\/easm-daten-fuer-soc\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/landing\\\/easm-daten-fuer-soc\\\/\",\"name\":\"Analysedaten f\u00fcr Ihr SOC - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/landing\\\/easm-daten-fuer-soc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/landing\\\/easm-daten-fuer-soc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Bildschirmfoto-2026-01-08-um-15.32.54.png\",\"datePublished\":\"2026-01-15T16:57:37+00:00\",\"dateModified\":\"2026-01-19T12:51:00+00:00\",\"description\":\"Integrieren Sie validierte Informationen zur externen Angriffsfl\u00e4che direkt in Ihren Workflow und entwickeln Sie Ihr SOC zur proaktiven Sicherheitsberatung. Sie k\u00f6nnen Ihre Services einfach erweitern, Kunden umfassender betreuen und steigern ohne gro\u00dfen Aufwand den Umsatz.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/landing\\\/easm-daten-fuer-soc\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/landing\\\/easm-daten-fuer-soc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/landing\\\/easm-daten-fuer-soc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Bildschirmfoto-2026-01-08-um-15.32.54.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/Bildschirmfoto-2026-01-08-um-15.32.54.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/landing\\\/easm-daten-fuer-soc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Analysedaten f\u00fcr Ihr SOC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analysis data for your SOC - LocateRisk","description":"Integrate validated information on the external attack surface directly into your workflow and develop your SOC into a proactive security consultancy. You can easily expand your services, provide customers with more comprehensive support and increase your turnover with little effort.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/landing\/easm-daten-fuer-soc\/","og_locale":"en_US","og_type":"article","og_title":"Analysedaten f\u00fcr Ihr SOC - LocateRisk","og_description":"Integrieren Sie validierte Informationen zur externen Angriffsfl\u00e4che direkt in Ihren Workflow und entwickeln Sie Ihr SOC zur proaktiven Sicherheitsberatung. Sie k\u00f6nnen Ihre Services einfach erweitern, Kunden umfassender betreuen und steigern ohne gro\u00dfen Aufwand den Umsatz.","og_url":"https:\/\/locaterisk.com\/en\/landing\/easm-daten-fuer-soc\/","og_site_name":"LocateRisk","article_modified_time":"2026-01-19T12:51:00+00:00","og_image":[{"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/01\/Bildschirmfoto-2026-01-08-um-15.32.54.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/landing\/easm-daten-fuer-soc\/","url":"https:\/\/locaterisk.com\/landing\/easm-daten-fuer-soc\/","name":"Analysis data for your SOC - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/landing\/easm-daten-fuer-soc\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/landing\/easm-daten-fuer-soc\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/01\/Bildschirmfoto-2026-01-08-um-15.32.54.png","datePublished":"2026-01-15T16:57:37+00:00","dateModified":"2026-01-19T12:51:00+00:00","description":"Integrate validated information on the external attack surface directly into your workflow and develop your SOC into a proactive security consultancy. You can easily expand your services, provide customers with more comprehensive support and increase your turnover with little effort.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/landing\/easm-daten-fuer-soc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/landing\/easm-daten-fuer-soc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/landing\/easm-daten-fuer-soc\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/01\/Bildschirmfoto-2026-01-08-um-15.32.54.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/01\/Bildschirmfoto-2026-01-08-um-15.32.54.png"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/landing\/easm-daten-fuer-soc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Analysedaten f\u00fcr Ihr SOC"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/landing\/7193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/landing"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/landing"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/8"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=7193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}