{"id":7708,"date":"2026-03-11T14:13:54","date_gmt":"2026-03-11T14:13:54","guid":{"rendered":"https:\/\/locaterisk.com\/?page_id=7708"},"modified":"2026-03-11T15:22:05","modified_gmt":"2026-03-11T15:22:05","slug":"case-study-it-sicherheit-im-kritis-umfeld","status":"publish","type":"page","link":"https:\/\/locaterisk.com\/fr\/case-study-it-sicherheit-im-kritis-umfeld\/","title":{"rendered":"\u00c9tude de cas : la s\u00e9curit\u00e9 informatique dans l'environnement KRITIS"},"content":{"rendered":"<h1 class=\"wp-block-heading blog-title\" id=\"case-study-mit-it-monitoring-in-richtung-sichere-stadt\">Comment Pfeifer &amp; Langen IT-Solutions KG \u00e9limine le Shadow IT et rend la conformit\u00e9 KRITIS d\u00e9montrable<br><\/h1>\n\n\n\n<p><strong>En tant que prestataire de services informatiques interne de Pfeifer &amp; Langen Industrie- und Handels-KG, un fabricant leader dans l'industrie agroalimentaire, l'\u00e9quipe est notamment confront\u00e9e au d\u00e9fi de garantir la conformit\u00e9 des syst\u00e8mes d\u00e9centralis\u00e9s. Avec LocateRisk, l'entreprise identifie et \u00e9value en permanence sa surface d'attaque externe. Cela aide \u00e0 la d\u00e9fense quotidienne ainsi qu'aux audits.<\/strong><\/p>\n\n\n<p><span style=\"font-weight: 400;\">L'interconnexion de l'IT et de l'OT ainsi que les infrastructures croissantes augmentent la complexit\u00e9 de l'environnement IT. Parall\u00e8lement, les introductions de syst\u00e8mes d\u00e9centralis\u00e9s et les connexions de prestataires de services rendent la transparence totale de l'empreinte num\u00e9rique de plus en plus exigeante. C'est pr\u00e9cis\u00e9ment le d\u00e9fi auquel a \u00e9t\u00e9 confront\u00e9 J\u00f6rg Marczinek, responsable de la gouvernance informatique chez Pfeifer &amp; Langen IT-Solutions KG.\u00a0<\/span><span style=\"font-weight: 400;\">\u201eGr\u00e2ce \u00e0 la mise en r\u00e9seau et \u00e0 l'agrandissement, nous avons beaucoup plus de prestataires de services externes \u00e0 coordonner\u201c, explique J\u00f6rg Marczinek. <\/span><span style=\"font-weight: 400;\">Les d\u00e9partements sp\u00e9cialis\u00e9s font appel \u00e0 des agences, enregistrent des domaines ou mettent en place des serveurs pour rester agiles. <\/span><span style=\"font-weight: 400;\">Or, ces syst\u00e8mes ne sont pas toujours r\u00e9pertori\u00e9s dans la gestion informatique centrale. \u201eIl y a d\u00e9j\u00e0 quelque part un serveur qui n'est pas s\u00e9curis\u00e9, mais sur lequel nous n'avons aucune souverainet\u00e9\u201c, explique J\u00f6rg Marczinek pour d\u00e9crire le d\u00e9fi. <\/span><\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"losung\"><strong><strong>Des contr\u00f4les sporadiques \u00e0 une vue d'ensemble continue<\/strong><\/strong><\/h3>\n\n\n\n<p>Avant l'utilisation de LocateRisk, il n'existait pas de vue d'ensemble structur\u00e9e de la surface d'attaque informatique externe. Des commandes sporadiques aupr\u00e8s de fournisseurs de services informatiques ne fournissaient que des instantan\u00e9s. L'id\u00e9e de faire appel \u00e0 LocateRisk est venue lors d'un \u00e9v\u00e9nement informatique \u00e0 D\u00fcsseldorf, lorsque la jeune start-up s'est pr\u00e9sent\u00e9e de mani\u00e8re professionnelle et comp\u00e9tente.&nbsp;<\/p>\n\n\n\n<p>L'objectif premier \u00e9tait la transparence. \u201eIl s'agissait d'\u00e9tablir une syst\u00e9matique et d'obtenir une vue d'ensemble des serveurs et des domaines vuln\u00e9rables aux attaques et de mettre en \u00e9vidence les failles de s\u00e9curit\u00e9\u201c, explique J\u00f6rg Marczinek. Les premi\u00e8res analyses ont permis de mettre en lumi\u00e8re des syst\u00e8mes qui, bien que nomm\u00e9ment attribu\u00e9s \u00e0 l'entreprise, n'\u00e9taient pas sous son contr\u00f4le direct ; une \u00e9tape importante pour la clarification des responsabilit\u00e9s et le nettoyage des actifs.<\/p>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-c9707d13a510fb7d65d30d7cb7878ca8\" style=\"color:#36ddcf\"><strong>\u201eNous pouvons pr\u00e9senter le rapport aux contr\u00f4leurs et aux auditeurs et prouver que nous effectuons des analyses de risques r\u00e9guli\u00e8res pour l'infrastructure informatique externe\u201c.\u201c<\/strong> <span style=\"display:inline-flex; align-items:center;\"><span style=\"display:inline-block;\"><span style=\"display:inline-flex; align-items:center;\"><span style=\"display:inline-block;\">\u2014 &nbsp;<\/span><\/span>J\u00f6rg Marczinek, responsable de la gouvernance informatique chez Pfeifer &amp; Langen IT-Solutions KG<\/span><\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"ergebnis\"><strong><strong><strong>Soutien en mati\u00e8re d'audits et de questions d'assurance<\/strong><\/strong><\/strong><\/h3>\n\n\n\n<p>Aujourd'hui, l'analyse trimestrielle fait partie int\u00e9grante de la s\u00e9curit\u00e9 informatique. La solution s'av\u00e8re particuli\u00e8rement utile pour la communication avec les contr\u00f4leurs et les auditeurs. \u201eNous pouvons pr\u00e9senter le rapport aux contr\u00f4leurs et aux auditeurs et prouver que nous effectuons des analyses de risques r\u00e9guli\u00e8res pour l'infrastructure informatique externe\u201c, explique J\u00f6rg Marczinek. Cela cr\u00e9e un climat de confiance et acc\u00e9l\u00e8re le traitement des demandes. Certes, les scans ne remplacent pas la documentation interne compl\u00e8te, mais ils fournissent les points de donn\u00e9es n\u00e9cessaires pour \u00e9tayer objectivement l'\u00e9tat actuel de la s\u00e9curit\u00e9.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong><strong>Les risques de conformit\u00e9 en ligne de mire : NIS-2 et RGPD<\/strong><\/strong><\/strong><\/h3>\n\n\n\n<p>Outre l'inventaire technique, l'\u00e9quipe utilise le <a href=\"https:\/\/locaterisk.com\/fr\/landing\/cybersecurity-compliance-mapping\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cartographie de la conformit\u00e9<\/a> de LocateRisk. Cette fonction permet de visualiser dans quelle mesure les serveurs et les domaines se trouvant dans la port\u00e9e sont bien positionn\u00e9s par rapport aux normes telles que le RGPD et NIS-2. \u201eJe suis responsable des th\u00e8mes r\u00e9glementaires, il est donc utile d'obtenir directement des indications sur les points faibles sans devoir effectuer des recherches manuelles\u201c, explique J\u00f6rg Marczinek. M\u00eame si les visualisations dressent parfois un tableau optimiste, elles aident \u00e0 se concentrer sur les domaines o\u00f9 il est r\u00e9ellement n\u00e9cessaire d'agir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>Conclusion : <strong>Des processus automatis\u00e9s en r\u00e9ponse \u00e0 l'expansion des infrastructures informatiques&nbsp;<\/strong><\/strong><\/strong><\/h3>\n\n\n\n<p>Pour Pfeifer &amp; Langen IT-Solutions KG, le passage d'audits sporadiques \u00e0 un suivi continu a fait ses preuves. L'avantage central r\u00e9side dans la validation de sa propre perception par une perspective ext\u00e9rieure objective. \u201ePour nous, l'identification et l'\u00e9valuation continues de notre pr\u00e9sence num\u00e9rique externe sont imp\u00e9ratives pour combler l'\u00e9cart entre l'informatique document\u00e9e et l'exposition r\u00e9elle sur le r\u00e9seau\u201c, r\u00e9sume J\u00f6rg Marczinek. Les prochaines \u00e9tapes sont d\u00e9j\u00e0 d\u00e9finies : Les r\u00e9sultats seront \u00e0 l'avenir int\u00e9gr\u00e9s de mani\u00e8re plus automatis\u00e9e dans la gestion des incidents afin de rationaliser davantage les processus et de r\u00e9duire les temps de r\u00e9action.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading has-white-color has-text-color has-link-color wp-elements-fac916facea006225b08bac8f3423364\"><strong>Les avantages pour Pfeifer &amp; Langen IT-Solutions KG<\/strong><\/h3>\n\n\n\n<div style=\"max-width: 843px; margin: 0 auto; color: #ffffff;\">\n<ul style=\"list-style-type: disc; font-size: 20px; line-height: 1.67; padding-left: 18px; margin: 16px 0 25px 0; text-align: left;\">\n<li style=\"margin-bottom: 8px; padding-left: 5px; word-wrap: break-word;\"><strong>Cr\u00e9er de la visibilit\u00e9 :<\/strong> Aper\u00e7u des surfaces d'attaque externes et des failles de s\u00e9curit\u00e9 informatique.<\/li>\n<li style=\"margin-bottom: 8px; padding-left: 5px; word-wrap: break-word;\"><strong>Support d'audit :<\/strong> Preuves objectives dans le cadre d'examens.<\/li>\n<li style=\"margin-bottom: 8px; padding-left: 5px; word-wrap: break-word;\"><strong>Cartographie de la conformit\u00e9 :<\/strong> Visualisation de l'\u00e9tat de la s\u00e9curit\u00e9 informatique externe par rapport aux lois existantes.<\/li>\n<li style=\"margin-bottom: 8px; padding-left: 5px; word-wrap: break-word;\"><strong>structure :<\/strong> Mise en place d'un processus de contr\u00f4le continu et automatis\u00e9.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Demandez maintenant une D\u00e9mo en direct personelle<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identifiez et r\u00e9duisez vos cyber-risques gr\u00e2ce \u00e0 un aper\u00e7u comparable et compr\u00e9hensible de votre s\u00e9curit\u00e9 informatique. Demandez conseil \u00e0 nos experts et d\u00e9couvrez comment LocateRisk peut vous aider \u00e0 r\u00e9soudre vos cyber-risques.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"case-study-it-sicherheit-im-kritis-umfeld\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"Pr\u00e9nom\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"Nom\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Courrier \u00e9lectronique\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"T\u00e9l\u00e9phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p>J'ai fait le <a href=\"https:\/\/locaterisk.com\/fr\/datenschutz\/\" target=\"_blank\" rel=\"noreferrer noopener\">politique de confidentialit\u00e9.<\/a> lu<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\">Fixer un rendez-vous pour une d\u00e9mo en direct<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>En savoir plus, r\u00e9server une d\u00e9mo ou simplement \u00e9changer quelques mots ? Nous nous en r\u00e9jouissons !<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Votre Contact<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">PDG<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Contactez-nous maintenant<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/fr\/\">Accueil<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/about\/\">par rapport \u00e0 nous<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/impressum\/\">mentiones l\u00e9gales<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/datenschutz\/\">Confidentialit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/agb.pdf\">CONDITIONS G\u00c9N\u00c9RALES DE VENTE<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/jobs\/\">Carri\u00e8re<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">s\u00e9curit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Centre de confiance<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Wie Pfeifer &amp; Langen IT-Solutions KG Schatten-IT eliminiert und KRITIS-Compliance nachweisbar macht Als interner IT-Dienstleister der Pfeifer &amp; Langen Industrie- und Handels-KG, einem f\u00fchrenden Hersteller der Nahrungs- und Genussmittelindustrie, steht das Team unter anderem vor der Herausforderung, die Compliance dezentraler Systeme zu gew\u00e4hrleisten. Mit LocateRisk identifiziert und bewertet das Unternehmen seine externe Angriffsfl\u00e4che kontinuierlich. Das [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7708","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Case Study: IT-Sicherheit im KRITIS-Umfeld - LocateRisk<\/title>\n<meta name=\"description\" content=\"Erfahren Sie, wie Pfeifer &amp; Langen IT-Solutions Schatten-IT eliminiert und KRITIS-Compliance durch kontinuierliches Monitoring mit LocateRisk nachweisbar macht.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/fr\/case-study-it-sicherheit-im-kritis-umfeld\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Case Study: IT-Sicherheit im KRITIS-Umfeld - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Erfahren Sie, wie Pfeifer &amp; Langen IT-Solutions Schatten-IT eliminiert und KRITIS-Compliance durch kontinuierliches Monitoring mit LocateRisk nachweisbar macht.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/fr\/case-study-it-sicherheit-im-kritis-umfeld\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-11T15:22:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_Generisch_03-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/case-study-it-sicherheit-im-kritis-umfeld\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/case-study-it-sicherheit-im-kritis-umfeld\\\/\",\"name\":\"Case Study: IT-Sicherheit im KRITIS-Umfeld - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"datePublished\":\"2026-03-11T14:13:54+00:00\",\"dateModified\":\"2026-03-11T15:22:05+00:00\",\"description\":\"Erfahren Sie, wie Pfeifer & Langen IT-Solutions Schatten-IT eliminiert und KRITIS-Compliance durch kontinuierliches Monitoring mit LocateRisk nachweisbar macht.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/case-study-it-sicherheit-im-kritis-umfeld\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/case-study-it-sicherheit-im-kritis-umfeld\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/case-study-it-sicherheit-im-kritis-umfeld\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Study: IT-Sicherheit im KRITIS-Umfeld\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Case Study: IT-Sicherheit im KRITIS-Umfeld - LocateRisk","description":"Erfahren Sie, wie Pfeifer & Langen IT-Solutions Schatten-IT eliminiert und KRITIS-Compliance durch kontinuierliches Monitoring mit LocateRisk nachweisbar macht.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/fr\/case-study-it-sicherheit-im-kritis-umfeld\/","og_locale":"fr_FR","og_type":"article","og_title":"Case Study: IT-Sicherheit im KRITIS-Umfeld - LocateRisk","og_description":"Erfahren Sie, wie Pfeifer & Langen IT-Solutions Schatten-IT eliminiert und KRITIS-Compliance durch kontinuierliches Monitoring mit LocateRisk nachweisbar macht.","og_url":"https:\/\/locaterisk.com\/fr\/case-study-it-sicherheit-im-kritis-umfeld\/","og_site_name":"LocateRisk","article_modified_time":"2026-03-11T15:22:05+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_Generisch_03-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/case-study-it-sicherheit-im-kritis-umfeld\/","url":"https:\/\/locaterisk.com\/case-study-it-sicherheit-im-kritis-umfeld\/","name":"Case Study: IT-Sicherheit im KRITIS-Umfeld - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"datePublished":"2026-03-11T14:13:54+00:00","dateModified":"2026-03-11T15:22:05+00:00","description":"Erfahren Sie, wie Pfeifer & Langen IT-Solutions Schatten-IT eliminiert und KRITIS-Compliance durch kontinuierliches Monitoring mit LocateRisk nachweisbar macht.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/case-study-it-sicherheit-im-kritis-umfeld\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/case-study-it-sicherheit-im-kritis-umfeld\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/case-study-it-sicherheit-im-kritis-umfeld\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Case Study: IT-Sicherheit im KRITIS-Umfeld"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Mesurer et comparer la s\u00e9curit\u00e9 informatique","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/pages\/7708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/comments?post=7708"}],"version-history":[{"count":58,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/pages\/7708\/revisions"}],"predecessor-version":[{"id":7778,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/pages\/7708\/revisions\/7778"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media?parent=7708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}