{"id":7708,"date":"2026-03-11T14:13:54","date_gmt":"2026-03-11T14:13:54","guid":{"rendered":"https:\/\/locaterisk.com\/?page_id=7708"},"modified":"2026-03-11T15:22:05","modified_gmt":"2026-03-11T15:22:05","slug":"case-study-it-sicherheit-im-kritis-umfeld","status":"publish","type":"page","link":"https:\/\/locaterisk.com\/en\/case-study-it-sicherheit-im-kritis-umfeld\/","title":{"rendered":"Case study: IT security in the KRITIS environment"},"content":{"rendered":"<h1 class=\"wp-block-heading blog-title\" id=\"case-study-mit-it-monitoring-in-richtung-sichere-stadt\">How Pfeifer &amp; Langen IT-Solutions KG eliminates shadow IT and makes KRITIS compliance verifiable<br><\/h1>\n\n\n\n<p><strong>As the internal IT service provider of Pfeifer &amp; Langen Industrie- und Handels-KG, a leading manufacturer in the food and luxury food industry, one of the challenges the team faces is ensuring the compliance of decentralized systems. The company uses LocateRisk to continuously identify and evaluate its external attack surface. This supports the daily defense and audits.<\/strong><\/p>\n\n\n<p><span style=\"font-weight: 400;\">The networking of IT and OT as well as growing infrastructures are increasing the complexity of the IT landscape. At the same time, decentralized system implementations and service provider connections are making complete transparency of the digital footprint ever more demanding. J\u00f6rg Marczinek, IT Governance Manager at Pfeifer &amp; Langen IT-Solutions KG, faced precisely this challenge.\u00a0<\/span><span style=\"font-weight: 400;\">\u201eDue to the networking and expansion, we have many more external service providers that we have to coordinate,\u201c explains J\u00f6rg Marczinek. <\/span><span style=\"font-weight: 400;\">Specialist departments commission agencies, register domains or set up servers in order to remain agile. <\/span><span style=\"font-weight: 400;\">However, these systems are not always recorded in the central IT administration. \u201eThere is already a server somewhere that is not secure, but over which we have no control,\u201c says J\u00f6rg Marczinek, describing the challenge. <\/span><\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"losung\"><strong><strong>From sporadic checks to a continuous overview<\/strong><\/strong><\/h3>\n\n\n\n<p>Before LocateRisk was used, there was no structured overview of the external IT attack surface. Sporadic orders from IT service providers only provided snapshots. The idea to commission LocateRisk came at an IT event in D\u00fcsseldorf, when the then still young start-up presented itself professionally and competently.&nbsp;<\/p>\n\n\n\n<p>The primary goal was transparency. \u201eIt was about establishing a systematic approach and gaining an overview of which servers and domains are susceptible to attacks and highlighting security gaps,\u201c says J\u00f6rg Marczinek. The first scans also revealed systems that were assigned to the company by name but were not under its direct control; an important step towards clarifying responsibilities and cleaning up the assets.<\/p>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-c9707d13a510fb7d65d30d7cb7878ca8\" style=\"color:#36ddcf\"><strong>\u201eWe can present the report to inspectors and auditors and prove that we carry out regular risk analyses for the external IT infrastructure.\u201c<\/strong> <span style=\"display:inline-flex; align-items:center;\"><span style=\"display:inline-block;\"><span style=\"display:inline-flex; align-items:center;\"><span style=\"display:inline-block;\">\u2014 &nbsp;<\/span><\/span>J\u00f6rg Marczinek, IT Governance Manager at Pfeifer &amp; Langen IT-Solutions KG<\/span><\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"ergebnis\"><strong><strong><strong>Support with audits and insurance issues<\/strong><\/strong><\/strong><\/h3>\n\n\n\n<p>Today, quarterly analysis is an integral part of IT security. The solution is particularly helpful when communicating with inspectors and auditors. \u201eWe can present the report to inspectors and auditors and prove that we carry out regular risk analyses for the external IT infrastructure,\u201c explains J\u00f6rg Marczinek. This creates trust and speeds up the processing of inquiries. Although the scans do not replace the complete internal documentation, they do provide the necessary data points to objectively substantiate the current security status.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong><strong>Compliance risks at a glance: NIS-2 and GDPR<\/strong><\/strong><\/strong><\/h3>\n\n\n\n<p>In addition to the technical inventory, the team uses the <a href=\"https:\/\/locaterisk.com\/en\/landing\/cybersecurity-compliance-mapping\/\" target=\"_blank\" rel=\"noreferrer noopener\">Compliance mapping<\/a> from LocateRisk. The function visualizes how well the servers and domains in the scope are set up with regard to standards such as GDPR and NIS-2. \u201eI'm responsible for regulatory issues, so it's helpful to get direct indications of vulnerabilities without having to investigate them manually,\u201c says J\u00f6rg Marczinek. Even if the visualizations sometimes paint an optimistic picture, they help to focus on areas where action is actually needed.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>Conclusion: <strong>Automated processes in response to growing IT infrastructures&nbsp;<\/strong><\/strong><\/strong><\/h3>\n\n\n\n<p>For Pfeifer &amp; Langen IT-Solutions KG, the change from sporadic audits to continuous monitoring has proven its worth. The key benefit lies in the validation of the company's own perception through an objective external perspective. \u201eFor us, the ongoing identification and evaluation of our external digital presence is absolutely essential in order to close the gap between documented IT and actual exposure on the network,\u201c summarizes J\u00f6rg Marczinek. The next steps have already been defined: In future, the results are to be incorporated into incident management in a more automated manner in order to further streamline processes and shorten response times.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading has-white-color has-text-color has-link-color wp-elements-fac916facea006225b08bac8f3423364\"><strong>The advantages for Pfeifer &amp; Langen IT-Solutions KG<\/strong><\/h3>\n\n\n\n<div style=\"max-width: 843px; margin: 0 auto; color: #ffffff;\">\n<ul style=\"list-style-type: disc; font-size: 20px; line-height: 1.67; padding-left: 18px; margin: 16px 0 25px 0; text-align: left;\">\n<li style=\"margin-bottom: 8px; padding-left: 5px; word-wrap: break-word;\"><strong>Create visibility:<\/strong> Overview of external attack surfaces and IT security vulnerabilities.<\/li>\n<li style=\"margin-bottom: 8px; padding-left: 5px; word-wrap: break-word;\"><strong>Audit Support:<\/strong> Objective evidence in the context of audits.<\/li>\n<li style=\"margin-bottom: 8px; padding-left: 5px; word-wrap: break-word;\"><strong>Compliance Mapping:<\/strong> Visualization of the external IT security status in relation to existing laws.<\/li>\n<li style=\"margin-bottom: 8px; padding-left: 5px; word-wrap: break-word;\"><strong>Structure:<\/strong> Establishment of a continuous, automated testing process.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"case-study-it-sicherheit-im-kritis-umfeld\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p>I agree to the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_blank\" rel=\"noreferrer noopener\">privacy policy.<\/a> read<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\">Schedule a Live Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Wie Pfeifer &amp; Langen IT-Solutions KG Schatten-IT eliminiert und KRITIS-Compliance nachweisbar macht Als interner IT-Dienstleister der Pfeifer &amp; Langen Industrie- und Handels-KG, einem f\u00fchrenden Hersteller der Nahrungs- und Genussmittelindustrie, steht das Team unter anderem vor der Herausforderung, die Compliance dezentraler Systeme zu gew\u00e4hrleisten. Mit LocateRisk identifiziert und bewertet das Unternehmen seine externe Angriffsfl\u00e4che kontinuierlich. Das [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7708","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Case Study: IT-Sicherheit im KRITIS-Umfeld - LocateRisk<\/title>\n<meta name=\"description\" content=\"Erfahren Sie, wie Pfeifer &amp; Langen IT-Solutions Schatten-IT eliminiert und KRITIS-Compliance durch kontinuierliches Monitoring mit LocateRisk nachweisbar macht.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/case-study-it-sicherheit-im-kritis-umfeld\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Case Study: IT-Sicherheit im KRITIS-Umfeld - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Erfahren Sie, wie Pfeifer &amp; Langen IT-Solutions Schatten-IT eliminiert und KRITIS-Compliance durch kontinuierliches Monitoring mit LocateRisk nachweisbar macht.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/case-study-it-sicherheit-im-kritis-umfeld\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-11T15:22:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_Generisch_03-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/case-study-it-sicherheit-im-kritis-umfeld\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/case-study-it-sicherheit-im-kritis-umfeld\\\/\",\"name\":\"Case Study: IT-Sicherheit im KRITIS-Umfeld - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"datePublished\":\"2026-03-11T14:13:54+00:00\",\"dateModified\":\"2026-03-11T15:22:05+00:00\",\"description\":\"Erfahren Sie, wie Pfeifer & Langen IT-Solutions Schatten-IT eliminiert und KRITIS-Compliance durch kontinuierliches Monitoring mit LocateRisk nachweisbar macht.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/case-study-it-sicherheit-im-kritis-umfeld\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/case-study-it-sicherheit-im-kritis-umfeld\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/case-study-it-sicherheit-im-kritis-umfeld\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Study: IT-Sicherheit im KRITIS-Umfeld\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Case study: IT security in the KRITIS environment - LocateRisk","description":"Find out how Pfeifer &amp; Langen IT Solutions eliminates shadow IT and makes KRITIS compliance verifiable through continuous monitoring with LocateRisk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/case-study-it-sicherheit-im-kritis-umfeld\/","og_locale":"en_US","og_type":"article","og_title":"Case Study: IT-Sicherheit im KRITIS-Umfeld - LocateRisk","og_description":"Erfahren Sie, wie Pfeifer & Langen IT-Solutions Schatten-IT eliminiert und KRITIS-Compliance durch kontinuierliches Monitoring mit LocateRisk nachweisbar macht.","og_url":"https:\/\/locaterisk.com\/en\/case-study-it-sicherheit-im-kritis-umfeld\/","og_site_name":"LocateRisk","article_modified_time":"2026-03-11T15:22:05+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_Generisch_03-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/case-study-it-sicherheit-im-kritis-umfeld\/","url":"https:\/\/locaterisk.com\/case-study-it-sicherheit-im-kritis-umfeld\/","name":"Case study: IT security in the KRITIS environment - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"datePublished":"2026-03-11T14:13:54+00:00","dateModified":"2026-03-11T15:22:05+00:00","description":"Find out how Pfeifer &amp; Langen IT Solutions eliminates shadow IT and makes KRITIS compliance verifiable through continuous monitoring with LocateRisk.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/case-study-it-sicherheit-im-kritis-umfeld\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/case-study-it-sicherheit-im-kritis-umfeld\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/case-study-it-sicherheit-im-kritis-umfeld\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Case Study: IT-Sicherheit im KRITIS-Umfeld"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/pages\/7708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=7708"}],"version-history":[{"count":58,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/pages\/7708\/revisions"}],"predecessor-version":[{"id":7778,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/pages\/7708\/revisions\/7778"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=7708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}