{"id":12535,"date":"2023-05-16T19:17:33","date_gmt":"2023-05-16T19:17:33","guid":{"rendered":"https:\/\/www.sonatus.com\/sicherheitsdienste\/"},"modified":"2024-05-15T22:29:39","modified_gmt":"2024-05-15T22:29:39","slug":"sicherheitsdienste","status":"publish","type":"page","link":"https:\/\/www.sonatus.com\/de\/sonatus-foundation\/sicherheitsdienste\/","title":{"rendered":"Sicherheitsdienste"},"content":{"rendered":"<section class=\"wpb-content-wrapper\">[vc_row full_width=&#8221;stretch_row&#8221; typography_style=&#8221;white&#8221; el_class=&#8221;vc-hero vc-hero&#8211;graphic-overlay vc-hero&#8211;services&#8221; css=&#8221;.vc_custom_1685551448203{background-color: #001F60 !important;}&#8221;][vc_column el_class=&#8221;vc-hero__heading-col&#8221; css=&#8221;.vc_custom_1685122146217{margin-bottom: 0px !important;}&#8221;]<h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-text-2xl wpex-font-normal vc_custom_1685555567009 label\"><span class=\"vcex-heading-inner wpex-inline-block\">Sicherheitsdienste von Sonatus Foundation<\/span><\/h2><style>.vcex-heading.vcex_69e4d6b992cfa{width:840px;}<\/style><h1 class=\"vcex-heading vcex-heading-plain vcex-module wpex-text-2xl wpex-font-normal wpex-max-w-100 wpex-mr-auto vc-hero__heading vcex_69e4d6b992cfa\"><span class=\"vcex-heading-inner wpex-inline-block\">Sch\u00fctzen Sie Fahrzeugnetzwerke<br \/>\nund Hosts<\/span><\/h1>[\/vc_column][vc_column el_class=&#8221;vc-hero__content-col&#8221; offset=&#8221;vc_col-md-4&#8243;][vc_column_text align=&#8221;left&#8221; el_class=&#8221;vc-hero__content text-lg&#8221; width=&#8221;320px&#8221; css=&#8221;.vc_custom_1685391311557{margin-bottom: 30px !important;}&#8221;]<span style=\"font-weight: 400;\">Erkennen und verhindern Sie Bedrohungen f\u00fcr<br \/>\nfahrzeuginterne Netzwerke und Host-ECUs mit hochgradig konfigurierbaren \u00dcberwachungsrichtlinien. <\/span>[\/vc_column_text][\/vc_column][vc_column el_class=&#8221;vc-hero__media-col&#8221; offset=&#8221;vc_col-md-8&#8243; css=&#8221;.vc_custom_1685122222732{margin-bottom: 0px !important;}&#8221;][vc_row_inner el_class=&#8221;vc-hero__media-wrap&#8221; css=&#8221;.vc_custom_1684960189422{padding-top: 0px !important;padding-bottom: 0px !important;}&#8221;][vc_column_inner css=&#8221;.vc_custom_1684960195627{margin-bottom: 0px !important;}&#8221;]<figure class=\"vcex-image vcex-module vc-hero__overlay\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img loading=\"lazy\" decoding=\"async\" width=\"1139\" height=\"527\" src=\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/services-security.svg\" class=\"vcex-image-img wpex-align-middle skip-lazy\" alt=\"\" \/><\/div><\/figure><figure class=\"vcex-image vcex-module vc-hero__media\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img loading=\"lazy\" decoding=\"async\" width=\"1139\" height=\"527\" src=\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/services-car-wireframe-render.png\" class=\"vcex-image-img wpex-align-middle skip-lazy\" alt=\"\" srcset=\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/services-car-wireframe-render.png 1139w, https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/services-car-wireframe-render-300x139.png 300w, https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/services-car-wireframe-render-1024x474.png 1024w, https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/services-car-wireframe-render-768x355.png 768w\" sizes=\"auto, (max-width: 1139px) 100vw, 1139px\" \/><\/div><\/figure>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;vc-content-expand u-padding-top&#8211;xl&#8221;][vc_column width=&#8221;5\/6&#8243;]<div class=\"vcex-module vcex-icon-box vcex-icon-box-one wpex-flex vcex-icon-box-wo-icon wpex-text-left vc_custom_1685640756854 vc-content-expand__image-heading\"><div class=\"vcex-icon-box-text wpex-flex-grow\"><h2 class=\"vcex-icon-box-heading wpex-heading wpex-text-md wpex-mb-10\">UIDPS<\/h2><\/div><\/div>[vc_column_text css=&#8221;.vc_custom_1685653194890{margin-bottom: 20px !important;}&#8221;]<span style=\"font-weight: 400;\">Das \u201eUnified Intrusion Detection and Prevention System\u201d (UIDPS) l\u00e4uft sowohl \u00fcber CAN- als auch Ethernet-Netzwerke innerhalb eines Fahrzeugs und sorgt f\u00fcr eine umfassende Abdeckung und robuste Sicherheit. <\/span>[\/vc_column_text]<div class=\"vcex-toggle vcex-module vc-content-expand__content\" data-animate=\"true\" data-duration=\"300\"><div class=\"vcex-toggle__heading\"><a href=\"#details-ansehen\" class=\"vcex-toggle__trigger wpex-flex wpex-items-center wpex-transition-colors wpex-flex-row-reverse\" aria-expanded=\"false\" aria-controls=\"details-ansehen\"><div class=\"vcex-toggle__icon wpex-ml-10\" aria-hidden=\"true\"><div class=\"vcex-toggle__icon-open wpex-flex wpex-flex-col wpex-items-center\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1.5em\" viewBox=\"0 0 24 24\" width=\"1.5em\" fill=\"currentColor\"><path d=\"M0 0h24v24H0V0z\" fill=\"none\"\/><path d=\"M24 24H0V0h24v24z\" fill=\"none\" opacity=\".87\"\/><path d=\"M16.59 8.59L12 13.17 7.41 8.59 6 10l6 6 6-6-1.41-1.41z\"\/><\/svg><\/div><div class=\"vcex-toggle__icon-close wpex-flex wpex-flex-col wpex-items-center\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1.5em\" viewBox=\"0 0 24 24\" width=\"1.5em\" fill=\"currentColor\" class=\"vcex-toggle__icon-close\"><path d=\"M0 0h24v24H0V0z\" fill=\"none\"\/><path d=\"M12 8l-6 6 1.41 1.41L12 10.83l4.59 4.58L18 14l-6-6z\"\/><\/svg><\/div><\/div><div class=\"vcex-toggle__title wpex-mr-auto\">Details ansehen<\/div><\/a><\/div><div id=\"details-ansehen\" class=\"vcex-toggle__content wpex-last-mb-0 wpex-my-10 wpex-clr\">\n<h3>Vorteile<\/h3>\n<ul class=\"orange-dots\">\n<li>\u00c4u\u00dferst anpassungsf\u00e4hig an neue und entstehende Bedrohungen<\/li>\n<li>Erg\u00e4nzt sich mit Cloud-Sicherheitsl\u00f6sungen von Drittanbietern<\/li>\n<li>Hilft, sicherheitsbezogene R\u00fcckrufe zu reduzieren<\/li>\n<li>Abstimmbar je nach Systemlast und Sicherheitsfaktoren<\/li>\n<li>ECU-Offload zur Verringerung der Auswirkungen der \u00dcberwachung auf die Leistung<\/li>\n<\/ul>\n<h3>Wichtige technische Merkmale<\/h3>\n<ul class=\"orange-checks\">\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Multi-Netzwerk (CAN, Ethernet, Mobilfunk, WLAN usw.) und Multi-Protokoll<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Integriert mit Ethernet-Switch-Hardware<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Konfigurierbare Erkennungs- und Pr\u00e4ventions\u00fcberwachung basierend auf der Systemlast<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Umfassende Inspektionsfunktionen, einschlie\u00dflich Deep Packet Inspection, verifiziert von Drittanbietern. Folgendes wird unterst\u00fctzt:<\/span>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Unbekannter Datenverkehr und unbekannte Verbindungen <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Protokollverst\u00f6\u00dfe und Protokollfehler<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Denial-of-Service-Angriffe (DoS) <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ratenverst\u00f6\u00dfe <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Port-Scan-Angriffe <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Diagnoseangriffe<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">ECU-Entfernung<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Dynamisch konfigurierbar <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Echtzeit-Anwendung von Richtlinien zur Erkennung und Risikominimierung <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Entspricht der UN-Regelung Nr. 155 f\u00fcr Cybersicherheit<\/span><\/li>\n<\/ul>\n<\/div><\/div>[\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1696621286268{padding-top: 0px !important;}&#8221; el_class=&#8221;vc-content-expand&#8221; el_id=&#8221;ecu_monitoring&#8221;][vc_column width=&#8221;5\/6&#8243;]<div class=\"vcex-module vcex-icon-box vcex-icon-box-one wpex-flex vcex-icon-box-wo-icon wpex-text-left vc_custom_1685640770893 vc-content-expand__image-heading\"><div class=\"vcex-icon-box-text wpex-flex-grow\"><h2 class=\"vcex-icon-box-heading wpex-heading wpex-text-md wpex-mb-10\">\u00dcberwachungsagent f\u00fcr Steuerger\u00e4te<\/h2><\/div><\/div>[vc_column_text css=&#8221;.vc_custom_1684778154813{margin-bottom: 20px !important;}&#8221;]<span style=\"font-weight: 400;\">Mit dem \u00dcberwachungsagent f\u00fcr Steuerger\u00e4te k\u00f6nnen OEMs in Bezug auf die Infrastruktur und die Betriebssysteme die n\u00f6tige Transparenz erhalten, sowohl f\u00fcr Zwecke der Sicherheits- als auch Leistungs\u00fcberwachung. Er kann f\u00fcr die Suche nach anomalem Verhalten konfiguriert werden, das auf Malware oder andere Anwendungsprobleme hinweisen k\u00f6nnte, und die Beobachtungen an die Cloud melden. <\/span>[\/vc_column_text]<div class=\"vcex-toggle vcex-module vc-content-expand__content\" data-animate=\"true\" data-duration=\"300\"><div class=\"vcex-toggle__heading\"><a href=\"#details-ansehen\" class=\"vcex-toggle__trigger wpex-flex wpex-items-center wpex-transition-colors wpex-flex-row-reverse\" aria-expanded=\"false\" aria-controls=\"details-ansehen\"><div class=\"vcex-toggle__icon wpex-ml-10\" aria-hidden=\"true\"><div class=\"vcex-toggle__icon-open wpex-flex wpex-flex-col wpex-items-center\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1.5em\" viewBox=\"0 0 24 24\" width=\"1.5em\" fill=\"currentColor\"><path d=\"M0 0h24v24H0V0z\" fill=\"none\"\/><path d=\"M24 24H0V0h24v24z\" fill=\"none\" opacity=\".87\"\/><path d=\"M16.59 8.59L12 13.17 7.41 8.59 6 10l6 6 6-6-1.41-1.41z\"\/><\/svg><\/div><div class=\"vcex-toggle__icon-close wpex-flex wpex-flex-col wpex-items-center\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" height=\"1.5em\" viewBox=\"0 0 24 24\" width=\"1.5em\" fill=\"currentColor\" class=\"vcex-toggle__icon-close\"><path d=\"M0 0h24v24H0V0z\" fill=\"none\"\/><path d=\"M12 8l-6 6 1.41 1.41L12 10.83l4.59 4.58L18 14l-6-6z\"\/><\/svg><\/div><\/div><div class=\"vcex-toggle__title wpex-mr-auto\">Details ansehen<\/div><\/a><\/div><div id=\"details-ansehen\" class=\"vcex-toggle__content wpex-last-mb-0 wpex-my-10 wpex-clr\">\n<h3>Wichtige technische Merkmale<\/h3>\n<ul class=\"orange-checks\">\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">SQL-Schnittstelle zur detaillierten \u00dcberwachung und Anomalie-Erkennung <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Abfragen auf der Grundlage der Grenzen und Zeitpl\u00e4ne der ECU-Aktivit\u00e4ten <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Sichtbarkeit von OS-\/Kernel-Ereignissen<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">\u00dcberwachung der Dateiintegrit\u00e4t<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Unterst\u00fctzung f\u00fcr differenzielle und Snapshot-Abfragen <\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ereignismeldung an die Cloud<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Integrierter Schutz zur Begrenzung des Ressourcenverbrauchs<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Vollst\u00e4ndig konfigurierbar<\/span><\/li>\n<\/ul>\n<\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1682970964784{background-color: #eceded !important;}&#8221;][vc_column]<h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-text-2xl wpex-font-normal vc_custom_1683822930353\"><span class=\"vcex-heading-inner wpex-inline-block\">Zugeh\u00f6rige Ressourcen<\/span><\/h2><style>.vcex_69e4d6b999274 .wpex-posts-card-carousel{--wpex-carousel-gap:15px;}.vcex_69e4d6b999274 .wpex-posts-card-carousel{--wpex-carousel-columns:1;}.vcex_69e4d6b999274 .wpex-posts-card-carousel.wpex-carousel:not(.owl-loaded) > *:not(:nth-child(1n+2)) {display: flex !important;}@media only screen and (min-width: 480px) {.vcex_69e4d6b999274 .wpex-posts-card-carousel{--wpex-carousel-columns:1;}.vcex_69e4d6b999274 .wpex-posts-card-carousel.wpex-carousel:not(.owl-loaded) > *:not(:nth-child(1n+2)) {display: flex !important;}}@media only screen and (min-width: 768px) {.vcex_69e4d6b999274 .wpex-posts-card-carousel{--wpex-carousel-columns:1;}.vcex_69e4d6b999274 .wpex-posts-card-carousel.wpex-carousel:not(.owl-loaded) > *:not(:nth-child(1n+2)) {display: flex !important;}}@media only screen and (min-width: 960px) {.vcex_69e4d6b999274 .wpex-posts-card-carousel{--wpex-carousel-columns:1;}.vcex_69e4d6b999274 .wpex-posts-card-carousel.wpex-carousel:not(.owl-loaded) > *:not(:nth-child(1n+2)) {display: flex !important;}}<\/style><div class=\"wpex-post-cards wpex-post-cards-general-card carousel-overflow carousel-3-col vcex_69e4d6b999274 wpex-relative\"><div class=\"wpex-post-cards-inner\"><div class=\"wpex-post-cards-loop wpex-posts-card-carousel wpex-carousel owl-carousel wpex-carousel--render-onload wpex-carousel--flex wpex-carousel--no-margins arrwstyle-default\" data-wpex-carousel='{&quot;nav&quot;:&quot;false&quot;,&quot;loop&quot;:&quot;false&quot;,&quot;items&quot;:1,&quot;slideBy&quot;:1,&quot;responsive&quot;:{&quot;0&quot;:{&quot;items&quot;:1},&quot;480&quot;:{&quot;items&quot;:1},&quot;768&quot;:{&quot;items&quot;:1},&quot;960&quot;:{&quot;items&quot;:1}}}'><div class=\"wpex-post-cards-entry post-515 type-press_release wpex-carousel-slide\"><div class=\"wpex-card wpex-card-general-card\">\n\n    <div class=\"c-card c-card--general\">\n        <div class=\"c-card__inner\">\n\n                            <div class=\"c-card__media\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"380\" height=\"250\" src=\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/01\/HLK-CCU-380x250.jpg\" class=\"attachment-press-release-card size-press-release-card wp-post-image\" alt=\"\" \/>                <\/div>\n            \n            <div class=\"c-card__content\">\n                <div class=\"label c-card__type\">Press Releases<\/div>\n\n                <h4 class=\"c-card__title\">\n                    <a href=\"https:\/\/www.sonatus.com\/de\/company\/press-release\/hl-klemove-and-sonatus-announce-collaboration-to-enable-next-generation-ee-architecture\/\"\n                                               target=\"_self\">\n                        HL Klemove and Sonatus announce collaboration to enable next-generation E\/E architecture for software-defined vehicle applications<\/a>\n                <\/h4>\n\n                                    <div class=\"c-card__excerpt\">Joint reference design to accelerate development of gateway and software-defined vehicle applications Hardware solution from electronics leader HL Klemove based&hellip;<\/div>\n                \n                <div class=\"c-card__cta-wrap\">\n                                        <a href=\"https:\/\/www.sonatus.com\/de\/company\/press-release\/hl-klemove-and-sonatus-announce-collaboration-to-enable-next-generation-ee-architecture\/\"\n                       target=\"_self\"\n                       class=\"c-card__cta vcex-button theme-button c-text-button\">\n                        <span class=\"theme-button-inner\">Die Ank\u00fcndigung lesen<\/span>\n                    <\/a>\n\n                <\/div>\n\n            <\/div>\n\n        <\/div>\n    <\/div>\n\n\n<\/div><\/div><div class=\"wpex-post-cards-entry post-390 type-post wpex-carousel-slide cat-61 cat-62 post_tag-9 translation_priority-84 author-25\"><div class=\"wpex-card wpex-card-general-card\">\n\n    <div class=\"c-card c-card--general\">\n        <div class=\"c-card__inner\">\n\n                            <div class=\"c-card__media\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"380\" height=\"250\" src=\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/03\/AdobeStock_566300457-380x250.jpeg\" class=\"attachment-press-release-card size-press-release-card wp-post-image\" alt=\"\" \/>                <\/div>\n            \n            <div class=\"c-card__content\">\n                <div class=\"label c-card__type\">Aus unserem Blog<\/div>\n\n                <h4 class=\"c-card__title\">\n                    <a href=\"https:\/\/www.sonatus.com\/de\/blog\/data-is-the-new-everything\/\"\n                                               target=\"_self\">\n                        Data is the new\u2026everything<\/a>\n                <\/h4>\n\n                                    <div class=\"c-card__excerpt\">There&#8217;s a common saying these days that &#8220;data is the new oil.\u201d While the sentiment is correct that data is&hellip;<\/div>\n                \n                <div class=\"c-card__cta-wrap\">\n                                        <a href=\"https:\/\/www.sonatus.com\/de\/blog\/data-is-the-new-everything\/\"\n                       target=\"_self\"\n                       class=\"c-card__cta vcex-button theme-button c-text-button\">\n                        <span class=\"theme-button-inner\">Den Beitrag lesen<\/span>\n                    <\/a>\n\n                <\/div>\n\n            <\/div>\n\n        <\/div>\n    <\/div>\n\n\n<\/div><\/div><div class=\"wpex-post-cards-entry post-389 type-post wpex-carousel-slide cat-62 cat-63 post_tag-9 post_tag-13 translation_priority-84 author-26\"><div class=\"wpex-card wpex-card-general-card\">\n\n    <div class=\"c-card c-card--general\">\n        <div class=\"c-card__inner\">\n\n                            <div class=\"c-card__media\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"380\" height=\"250\" src=\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/2023_03_AutomotiveEthernet_1834-380x250.jpg\" class=\"attachment-press-release-card size-press-release-card wp-post-image\" alt=\"Automotive Ethernet Congress 2023 exhibitors\" \/>                <\/div>\n            \n            <div class=\"c-card__content\">\n                <div class=\"label c-card__type\">Aus unserem Blog<\/div>\n\n                <h4 class=\"c-card__title\">\n                    <a href=\"https:\/\/www.sonatus.com\/de\/blog\/three-lessons-from-the-2023-automotive-ethernet-congress\/\"\n                                               target=\"_self\">\n                        Three lessons from the 2023 Automotive Ethernet Congress<\/a>\n                <\/h4>\n\n                                    <div class=\"c-card__excerpt\">The importance of network technology in the automotive industry Sonatus attended the Automotive Ethernet Congress in late March in Munich,&hellip;<\/div>\n                \n                <div class=\"c-card__cta-wrap\">\n                                        <a href=\"https:\/\/www.sonatus.com\/de\/blog\/three-lessons-from-the-2023-automotive-ethernet-congress\/\"\n                       target=\"_self\"\n                       class=\"c-card__cta vcex-button theme-button c-text-button\">\n                        <span class=\"theme-button-inner\">Den Beitrag lesen<\/span>\n                    <\/a>\n\n                <\/div>\n\n            <\/div>\n\n        <\/div>\n    <\/div>\n\n\n<\/div><\/div><\/div><\/div><\/div>[\/vc_column][\/vc_row]\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; typography_style=&#8221;white&#8221; el_class=&#8221;vc-hero vc-hero&#8211;graphic-overlay vc-hero&#8211;services&#8221; css=&#8221;.vc_custom_1685551448203{background-color: #001F60 !important;}&#8221;][vc_column el_class=&#8221;vc-hero__heading-col&#8221; css=&#8221;.vc_custom_1685122146217{margin-bottom: 0px !important;}&#8221;][\/vc_column][vc_column el_class=&#8221;vc-hero__content-col&#8221; offset=&#8221;vc_col-md-4&#8243;][vc_column_text align=&#8221;left&#8221; el_class=&#8221;vc-hero__content text-lg&#8221; width=&#8221;320px&#8221; css=&#8221;.vc_custom_1685391311557{margin-bottom:&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":12773,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"class_list":["post-12535","page","type-page","status-publish","hentry","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sonatus Foundation \u2013 Cybersicherheitsdienste | Sonatus<\/title>\n<meta name=\"description\" content=\"Erkennen und verhindern Sie Bedrohungen f\u00fcr fahrzeuginterne Netzwerke und Host-ECUs mit hochgradig konfigurierbaren \u00dcberwachungsrichtlinien mithilfe der Sicherheitsdienste von Sonatus Foundation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sonatus.com\/de\/sonatus-foundation\/sicherheitsdienste\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sicherheitsdienste\" \/>\n<meta property=\"og:description\" content=\"Erkennen und verhindern Sie Bedrohungen f\u00fcr fahrzeuginterne Netzwerke und Host-ECUs mit hochgradig konfigurierbaren \u00dcberwachungsrichtlinien mithilfe der Sicherheitsdienste von Sonatus Foundation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sonatus.com\/de\/sonatus-foundation\/sicherheitsdienste\/\" \/>\n<meta property=\"og:site_name\" content=\"Sonatus\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-15T22:29:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/Sonatus-BlogCard.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sonatus.com\/de\/sonatus-foundation\/sicherheitsdienste\/\",\"url\":\"https:\/\/www.sonatus.com\/de\/sonatus-foundation\/sicherheitsdienste\/\",\"name\":\"Sonatus Foundation \u2013 Cybersicherheitsdienste | Sonatus\",\"isPartOf\":{\"@id\":\"https:\/\/www.sonatus.com\/de\/#website\"},\"datePublished\":\"2023-05-16T19:17:33+00:00\",\"dateModified\":\"2024-05-15T22:29:39+00:00\",\"description\":\"Erkennen und verhindern Sie Bedrohungen f\u00fcr fahrzeuginterne Netzwerke und Host-ECUs mit hochgradig konfigurierbaren \u00dcberwachungsrichtlinien mithilfe der Sicherheitsdienste von Sonatus Foundation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sonatus.com\/de\/sonatus-foundation\/sicherheitsdienste\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sonatus.com\/de\/sonatus-foundation\/sicherheitsdienste\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sonatus.com\/de\/sonatus-foundation\/sicherheitsdienste\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sonatus.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sonatus Foundation\",\"item\":\"https:\/\/www.sonatus.com\/de\/sonatus-foundation\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Sicherheitsdienste\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sonatus.com\/de\/#website\",\"url\":\"https:\/\/www.sonatus.com\/de\/\",\"name\":\"Sonatus\",\"description\":\"Accelerating Vehicle Software Innovation\",\"publisher\":{\"@id\":\"https:\/\/www.sonatus.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sonatus.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sonatus.com\/de\/#organization\",\"name\":\"Sonatus\",\"url\":\"https:\/\/www.sonatus.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.sonatus.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/sonatus-logo.svg\",\"contentUrl\":\"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/sonatus-logo.svg\",\"width\":202,\"height\":32,\"caption\":\"Sonatus\"},\"image\":{\"@id\":\"https:\/\/www.sonatus.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/sonatus\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Sonatus Foundation \u2013 Cybersicherheitsdienste | Sonatus","description":"Erkennen und verhindern Sie Bedrohungen f\u00fcr fahrzeuginterne Netzwerke und Host-ECUs mit hochgradig konfigurierbaren \u00dcberwachungsrichtlinien mithilfe der Sicherheitsdienste von Sonatus Foundation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sonatus.com\/de\/sonatus-foundation\/sicherheitsdienste\/","og_locale":"de_DE","og_type":"article","og_title":"Sicherheitsdienste","og_description":"Erkennen und verhindern Sie Bedrohungen f\u00fcr fahrzeuginterne Netzwerke und Host-ECUs mit hochgradig konfigurierbaren \u00dcberwachungsrichtlinien mithilfe der Sicherheitsdienste von Sonatus Foundation.","og_url":"https:\/\/www.sonatus.com\/de\/sonatus-foundation\/sicherheitsdienste\/","og_site_name":"Sonatus","article_modified_time":"2024-05-15T22:29:39+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/Sonatus-BlogCard.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.sonatus.com\/de\/sonatus-foundation\/sicherheitsdienste\/","url":"https:\/\/www.sonatus.com\/de\/sonatus-foundation\/sicherheitsdienste\/","name":"Sonatus Foundation \u2013 Cybersicherheitsdienste | Sonatus","isPartOf":{"@id":"https:\/\/www.sonatus.com\/de\/#website"},"datePublished":"2023-05-16T19:17:33+00:00","dateModified":"2024-05-15T22:29:39+00:00","description":"Erkennen und verhindern Sie Bedrohungen f\u00fcr fahrzeuginterne Netzwerke und Host-ECUs mit hochgradig konfigurierbaren \u00dcberwachungsrichtlinien mithilfe der Sicherheitsdienste von Sonatus Foundation.","breadcrumb":{"@id":"https:\/\/www.sonatus.com\/de\/sonatus-foundation\/sicherheitsdienste\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sonatus.com\/de\/sonatus-foundation\/sicherheitsdienste\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.sonatus.com\/de\/sonatus-foundation\/sicherheitsdienste\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sonatus.com\/de\/"},{"@type":"ListItem","position":2,"name":"Sonatus Foundation","item":"https:\/\/www.sonatus.com\/de\/sonatus-foundation\/"},{"@type":"ListItem","position":3,"name":"Sicherheitsdienste"}]},{"@type":"WebSite","@id":"https:\/\/www.sonatus.com\/de\/#website","url":"https:\/\/www.sonatus.com\/de\/","name":"Sonatus","description":"Accelerating Vehicle Software Innovation","publisher":{"@id":"https:\/\/www.sonatus.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sonatus.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.sonatus.com\/de\/#organization","name":"Sonatus","url":"https:\/\/www.sonatus.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.sonatus.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/sonatus-logo.svg","contentUrl":"https:\/\/www.sonatus.com\/wp-content\/uploads\/2023\/05\/sonatus-logo.svg","width":202,"height":32,"caption":"Sonatus"},"image":{"@id":"https:\/\/www.sonatus.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/sonatus\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.sonatus.com\/de\/wp-json\/wp\/v2\/pages\/12535","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sonatus.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sonatus.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sonatus.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sonatus.com\/de\/wp-json\/wp\/v2\/comments?post=12535"}],"version-history":[{"count":3,"href":"https:\/\/www.sonatus.com\/de\/wp-json\/wp\/v2\/pages\/12535\/revisions"}],"predecessor-version":[{"id":12863,"href":"https:\/\/www.sonatus.com\/de\/wp-json\/wp\/v2\/pages\/12535\/revisions\/12863"}],"up":[{"embeddable":true,"href":"https:\/\/www.sonatus.com\/de\/wp-json\/wp\/v2\/pages\/12773"}],"wp:attachment":[{"href":"https:\/\/www.sonatus.com\/de\/wp-json\/wp\/v2\/media?parent=12535"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}