{"id":2594,"date":"2021-12-09T13:26:05","date_gmt":"2021-12-09T13:26:05","guid":{"rendered":"https:\/\/locaterisk.com\/?page_id=2594"},"modified":"2022-01-06T11:19:44","modified_gmt":"2022-01-06T11:19:44","slug":"case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services","status":"publish","type":"page","link":"https:\/\/locaterisk.com\/fr\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\/","title":{"rendered":"\u00c9tude de cas : l'analyse des vuln\u00e9rabilit\u00e9s ouvre la voie aux services de s\u00e9curit\u00e9 g\u00e9r\u00e9s"},"content":{"rendered":"<h1 class=\"blog-title wp-block-heading\"> \u00c9tude de cas : l'analyse des vuln\u00e9rabilit\u00e9s ouvre la voie aux services de s\u00e9curit\u00e9 g\u00e9r\u00e9s <\/h1>\n\n\n\n<p> Une entreprise de syst\u00e8mes informatiques propose des services de s\u00e9curit\u00e9 g\u00e9r\u00e9s sur mesure et mise sur des faits en temps r\u00e9el gr\u00e2ce \u00e0 des analyses de vuln\u00e9rabilit\u00e9 automatis\u00e9es pour s'adresser \u00e0 ses clients. Cela rend les points critiques pour la s\u00e9curit\u00e9 transparents, le Shadow IT visible et offre des points de d\u00e9part concrets pour parler de la s\u00e9curit\u00e9 informatique.<\/p>\n\n\n<h3 style=\"text-align: left;\">Contexte<\/h3>\n<p>Notre partenaire, un fournisseur leader d'automatisation holistique avec des services de s\u00e9curit\u00e9 g\u00e9r\u00e9s compl\u00e9mentaires, est conscient de la situation pr\u00e9caire des entreprises en mati\u00e8re de s\u00e9curit\u00e9 informatique et souhaite aborder les d\u00e9cideurs de mani\u00e8re cibl\u00e9e. La vente crois\u00e9e de services de cybers\u00e9curit\u00e9 se fait g\u00e9n\u00e9ralement par l'interm\u00e9diaire du gestionnaire de compte dans le cadre de projets d'automatisation en cours. Cela provoque de temps en temps la mauvaise humeur des administrateurs informatiques du client, qui consid\u00e8rent cela comme une ing\u00e9rence dans leur domaine.<\/p>\n<p><span style=\"font-weight: 400;\">En m\u00eame temps, il y a bien s\u00fbr des contacts avec de nouveaux clients de la part de la vente de s\u00e9curit\u00e9. Celles-ci doivent \u00eatre bien pr\u00e9par\u00e9es, ce pour quoi on manque souvent de temps et, en profondeur, de connaissances. Lors d'une phase pilote, l'\u00e9quipe de vente a utilis\u00e9 pour la premi\u00e8re fois les analyses des vuln\u00e9rabilit\u00e9s informatiques de LocateRisk sous forme de tableaux de bord lors des entretiens de vente et a \u00e9t\u00e9 enthousiasm\u00e9e. \"Nous utilisons LocateRisk pour ouvrir des portes. Pour cela, c'est gigantesquement bon\".<\/span><\/p>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"672\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/211018_Illustrationen009-1024x672.png\" alt=\"\" class=\"wp-image-2528\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/211018_Illustrationen009-1024x672.png 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/211018_Illustrationen009-300x197.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/211018_Illustrationen009-768x504.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/211018_Illustrationen009-18x12.png 18w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/211018_Illustrationen009.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Solution<\/h3>\n\n\n\n<p>Un aper\u00e7u de gestion est un r\u00e9sum\u00e9 facile \u00e0 comprendre de l'analyse des vuln\u00e9rabilit\u00e9s informatiques effectu\u00e9e de mani\u00e8re automatis\u00e9e. Les vuln\u00e9rabilit\u00e9s critiques pour la s\u00e9curit\u00e9 sont identifi\u00e9es, class\u00e9es par ordre de priorit\u00e9 et compl\u00e9t\u00e9es par des recommandations d'action \u00e0 l'aide du domaine principal d'une entreprise, dont la surface d'attaque informatique est examin\u00e9e d'un point de vue externe. L'analyse externe pr\u00e9sente l'avantage que, contrairement \u00e0 un pentest, aucune pr\u00e9paration ne doit \u00eatre effectu\u00e9e par le service informatique et qu'elle se d\u00e9roule de mani\u00e8re inaper\u00e7ue. Selon la taille de l'entreprise, un audit dure entre 3 et 48 heures. Le r\u00e9sultat est pr\u00e9sent\u00e9 dans deux rapports sp\u00e9cifiques : le rapport d\u00e9taill\u00e9 interactif pour les responsables informatiques et l'aper\u00e7u de gestion pour les dirigeants. De plus, le Security Score indique le niveau actuel de s\u00e9curit\u00e9 informatique par rapport \u00e0 5505 entreprises de taille comparable.<\/p>\n\n\n\n<p>Pour les commerciaux, le point de vue externe sur la situation de la s\u00e9curit\u00e9 informatique \u00e0 l'\u00e9chelle de l'entreprise s'av\u00e8re \u00eatre une histoire passionnante mais inoffensive pour engager le dialogue avec les prospects et les clients. Comme leurs administrateurs ne sont g\u00e9n\u00e9ralement pas les seuls \u00e0 s'occuper des environnements informatiques accessibles au public, mais qu'il s'agit d'agences ou de fournisseurs de services de s\u00e9curit\u00e9 g\u00e9r\u00e9s, ils ne se sentent pas imm\u00e9diatement attaqu\u00e9s.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/Bildschirmfoto-2021-12-07-um-10.14-1024x672.png\" alt=\"Zusammenfassung der LocateRisk Schwachstellenanalyse in Form eines  Managementberichtes.\" class=\"wp-image-2561\" width=\"855\" height=\"561\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/Bildschirmfoto-2021-12-07-um-10.14-1024x672.png 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/Bildschirmfoto-2021-12-07-um-10.14-300x197.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/Bildschirmfoto-2021-12-07-um-10.14-768x504.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/Bildschirmfoto-2021-12-07-um-10.14-18x12.png 18w, https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/Bildschirmfoto-2021-12-07-um-10.14.png 1500w\" sizes=\"auto, (max-width: 855px) 100vw, 855px\" \/><figcaption>Un regard ext\u00e9rieur sur la s\u00e9curit\u00e9 de l'infrastructure informatique de l'entreprise : le rapport de gestion fournit aux d\u00e9cideurs un aper\u00e7u facilement compr\u00e9hensible de la situation actuelle en mati\u00e8re de s\u00e9curit\u00e9 informatique. Les responsables informatiques y trouveront les d\u00e9tails des analyses de vuln\u00e9rabilit\u00e9 effectu\u00e9es sur la plateforme. <\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">R\u00e9sultat<\/h3>\n\n\n\n<p>Un coll\u00e8gue commercial ne peut plus s'imaginer commencer des entretiens avec de nouveaux clients sans les rapports Locaterisk. Un autre ajoute qu'il faudrait alors tout refaire \u00e0 la main, ce qui prendrait beaucoup trop de temps. Tout compte fait, tout le monde s'accorde \u00e0 dire que les rapports facilitent grandement l'introduction au th\u00e8me de la s\u00e9curit\u00e9 informatique. L'int\u00e9r\u00eat est si grand que la plupart des clients demandent volontiers une offre de conseil pour parler en d\u00e9tail du rapport. Cela permet souvent de d\u00e9couvrir des probl\u00e8mes qui conduisent directement \u00e0 une commande de services g\u00e9r\u00e9s.&nbsp;<\/p>\n\n\n\n<p><strong>Managed Security Services - Les nouvelles affaires se font presque toutes seules<\/strong><\/p>\n\n\n\n<p>Si l'on parvient \u00e0 placer les audits de s\u00e9curit\u00e9 informatique sous forme de surveillance chez les clients, cela s'av\u00e8re payant pour tous. En effet, les analyses r\u00e9currentes aident les entreprises \u00e0 minimiser durablement leur surface d'attaque informatique et assurent en m\u00eame temps \u00e0 l'entreprise de syst\u00e8mes des revenus r\u00e9currents issus du contrat de partenariat LocateRisk. En outre, elles fournissent aux conseillers des informations importantes sur les nouveaux besoins des clients. Par exemple, des changements dans l'infrastructure informatique externe de l'entreprise qui peuvent n\u00e9cessiter des administrateurs suppl\u00e9mentaires ou un support de projet \u00e9tendu. En fin de compte, la conclusion est la suivante : si l'analyse des vuln\u00e9rabilit\u00e9s informatiques permet d'entrer r\u00e9guli\u00e8rement en contact avec les clients, les nouvelles affaires pour les services de s\u00e9curit\u00e9 g\u00e9r\u00e9s se font presque d'elles-m\u00eames.<\/p>\n\n\n\n<div class=\"wp-block-lr-blog-image-text-article-module blog-image-text-article\"><div class=\"content\"><div class=\"image\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/Bildschirmfoto-2021-12-07-um-10.53.57.png\"\/><\/div><h6><\/h6><\/div><\/div>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Demandez maintenant une D\u00e9mo en direct personelle<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identifiez et r\u00e9duisez vos cyber-risques gr\u00e2ce \u00e0 un aper\u00e7u comparable et compr\u00e9hensible de votre s\u00e9curit\u00e9 informatique. Demandez conseil \u00e0 nos experts et d\u00e9couvrez comment LocateRisk peut vous aider \u00e0 r\u00e9soudre vos cyber-risques.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"Pr\u00e9nom\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"Nom\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Courrier \u00e9lectronique\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"T\u00e9l\u00e9phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p>J'ai fait le <a href=\"https:\/\/locaterisk.com\/fr\/datenschutz\/\" target=\"_blank\" rel=\"noreferrer noopener\">politique de confidentialit\u00e9.<\/a> lu<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\">Fixer un rendez-vous pour une d\u00e9mo en direct<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>En savoir plus, r\u00e9server une d\u00e9mo ou simplement \u00e9changer quelques mots ? Nous nous en r\u00e9jouissons !<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Votre Contact<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">PDG<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Contactez-nous maintenant<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/fr\/\">Accueil<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/about\/\">par rapport \u00e0 nous<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/impressum\/\">mentiones l\u00e9gales<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/datenschutz\/\">Confidentialit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/agb.pdf\">CONDITIONS G\u00c9N\u00c9RALES DE VENTE<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/jobs\/\">Carri\u00e8re<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">s\u00e9curit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Centre de confiance<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Case Study: Schwachstellenanalyse als Wegbereiter f\u00fcr Managed Security Services Ein IT-Systemhaus bietet ma\u00dfgeschneiderte Managed Security Services und setzt bei der Kundenansprache auf Echtzeit-Fakten durch automatisierte Schwachstellenanalysen. Das macht sicherheitskritische Stellen transparent, Schatten-IT sichtbar und bietet konkrete Ansatzpunkte, um \u00fcber IT-Sicherheit zu sprechen. Hintergrund Unser Partner, ein f\u00fchrender Anbieter f\u00fcr holistische Automation mit erg\u00e4nzenden Managed Security [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2594","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Case Study: Schwachstellenanalyse als Wegbereiter f\u00fcr Managed Security Services - LocateRisk<\/title>\n<meta name=\"description\" content=\"Case Study LocateRisk \u00b7 Wie Schwachstellenanalysen die Entscheider in Unternehmen f\u00fcr den Schutz ihrer IT-Systeme sensibilisieren. Eine Erfolgsgeschichte.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/fr\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Case Study: Schwachstellenanalyse als Wegbereiter f\u00fcr Managed Security Services - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Case Study LocateRisk \u00b7 Wie Schwachstellenanalysen die Entscheider in Unternehmen f\u00fcr den Schutz ihrer IT-Systeme sensibilisieren. Eine Erfolgsgeschichte.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/fr\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-06T11:19:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/211018_Illustrationen009-1024x672.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\\\/\",\"name\":\"Case Study: Schwachstellenanalyse als Wegbereiter f\u00fcr Managed Security Services - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/211018_Illustrationen009-1024x672.png\",\"datePublished\":\"2021-12-09T13:26:05+00:00\",\"dateModified\":\"2022-01-06T11:19:44+00:00\",\"description\":\"Case Study LocateRisk \u00b7 Wie Schwachstellenanalysen die Entscheider in Unternehmen f\u00fcr den Schutz ihrer IT-Systeme sensibilisieren. Eine Erfolgsgeschichte.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/211018_Illustrationen009-1024x672.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/211018_Illustrationen009-1024x672.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Study: Schwachstellenanalyse als Wegbereiter f\u00fcr Managed Security Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00c9tude de cas : l'analyse des vuln\u00e9rabilit\u00e9s ouvre la voie aux services de s\u00e9curit\u00e9 g\u00e9r\u00e9s - LocateRisk","description":"Etude de cas LocateRisk - Comment les analyses de vuln\u00e9rabilit\u00e9 sensibilisent les d\u00e9cideurs des entreprises \u00e0 la protection de leurs syst\u00e8mes informatiques. Une histoire \u00e0 succ\u00e8s.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/fr\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\/","og_locale":"fr_FR","og_type":"article","og_title":"Case Study: Schwachstellenanalyse als Wegbereiter f\u00fcr Managed Security Services - LocateRisk","og_description":"Case Study LocateRisk \u00b7 Wie Schwachstellenanalysen die Entscheider in Unternehmen f\u00fcr den Schutz ihrer IT-Systeme sensibilisieren. Eine Erfolgsgeschichte.","og_url":"https:\/\/locaterisk.com\/fr\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\/","og_site_name":"LocateRisk","article_modified_time":"2022-01-06T11:19:44+00:00","og_image":[{"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/211018_Illustrationen009-1024x672.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\/","url":"https:\/\/locaterisk.com\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\/","name":"\u00c9tude de cas : l'analyse des vuln\u00e9rabilit\u00e9s ouvre la voie aux services de s\u00e9curit\u00e9 g\u00e9r\u00e9s - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/211018_Illustrationen009-1024x672.png","datePublished":"2021-12-09T13:26:05+00:00","dateModified":"2022-01-06T11:19:44+00:00","description":"Etude de cas LocateRisk - Comment les analyses de vuln\u00e9rabilit\u00e9 sensibilisent les d\u00e9cideurs des entreprises \u00e0 la protection de leurs syst\u00e8mes informatiques. Une histoire \u00e0 succ\u00e8s.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/211018_Illustrationen009-1024x672.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2021\/12\/211018_Illustrationen009-1024x672.png"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/case-study-schwachstellenanalyse-als-wegbereiter-fuer-it-security-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Case Study: Schwachstellenanalyse als Wegbereiter f\u00fcr Managed Security Services"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Mesurer et comparer la s\u00e9curit\u00e9 informatique","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/pages\/2594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/comments?post=2594"}],"version-history":[{"count":12,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/pages\/2594\/revisions"}],"predecessor-version":[{"id":7805,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/pages\/2594\/revisions\/7805"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media?parent=2594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}