{"id":488,"date":"2022-10-14T18:58:27","date_gmt":"2022-10-14T18:58:27","guid":{"rendered":"https:\/\/testing123.mobi\/tenerity\/?page_id=488"},"modified":"2023-07-26T12:18:35","modified_gmt":"2023-07-26T12:18:35","slug":"cyber-und-identitatsschutz","status":"publish","type":"page","link":"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/","title":{"rendered":"Cyber- und Identit\u00e4tsschutz"},"content":{"rendered":"<section class=\"l-section wpb_row us_custom_9ac547ff height_medium color_alternate with_img with_shape\"><div class=\"l-section-img\" role=\"img\" aria-label=\"Cyber and ID Protection\" data-img-width=\"2314\" data-img-height=\"1296\" style=\"background-image: url(https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2023\/05\/Cyber-and-ID-protection-banner.jpg);\"><\/div><div class=\"l-section-overlay\" style=\"background:rgba(30,30,30,0.25)\"><\/div><div class=\"l-section-shape type_tilt pos_bottom hor_flip\" style=\"height:10vh;\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 8\" preserveAspectRatio=\"none\" width=\"100%\" height=\"100%\">\r\n\t<path fill=\"currentColor\" d=\"M64 7.9 L64 10 L0 10 L0 0 Z\"\/>\r\n<\/svg><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column us_custom_4b9db530 us_animate_this\"><div class=\"wpb_wrapper\"><h1>Cyber- und Identit\u00e4tsschutz<\/h1>\n<\/div><\/div><div class=\"wpb_text_column us_custom_de366d1c text___intro us_animate_this\"><div class=\"wpb_wrapper\"><p>Teneritys Cyber- und Identit\u00e4tsschutzl\u00f6sungen machen es Ihren Kunden leicht, ihre pers\u00f6nlichen Daten zu verwalten und zu sch\u00fctzen, um ein sicheres Onlineerlebnis zu gew\u00e4hrleisten.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_6f9d098d height_auto type_sticky\" id=\"program___tab-bar\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_bottom type_default stacking_default\"><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column smallprint\"><div class=\"wpb_wrapper\"><p>L\u00f6sungen &gt; Identit\u00e4tsschutz<\/p>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3>Cyber- und Identit\u00e4tsschutz<\/h3>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-8 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><nav class=\"w-menu sub-nav layout_hor style_links us_menu_1\" style=\"--main-gap:4px;--main-ver-indent:0.8em;--main-hor-indent:0.8em;--main-color:inherit;\"><ul id=\"menu-program-cyber\" class=\"menu\"><li id=\"menu-item-700\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-700\"><a href=\"#program___overview\">\u00dcbersicht<\/a><\/li><li id=\"menu-item-704\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-704\"><a href=\"#program___outcomes\">Ziele<\/a><\/li><li id=\"menu-item-701\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-701\"><a href=\"#program___modules\">Module<\/a><\/li><li id=\"menu-item-703\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-703\"><a href=\"#program___why\">Warum Cyber- und Identit\u00e4tsschutz?<\/a><\/li><\/ul><style>@media ( max-width:0px ){.us_menu_1 .menu{display:block!important}.us_menu_1 .menu>li{margin:0 0 var(--main-gap,4px)!important}}<\/style><\/nav><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_auto type_sticky\" id=\"program___tab-bar-shadow\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_bottom type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\" id=\"program___overview\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2>\u00dcbersicht<\/h2>\n<p><strong>Unser ganzheitlicher Cyber- und Identit\u00e4tsschutz f\u00fcr Privat- und Gesch\u00e4ftskunden erm\u00f6glicht es Ihnen, Vertrauen aufzubauen und Kundenbindung zu steigern.<\/strong><\/p>\n<p>Identit\u00e4tsschutz ist wichtiger denn je. Datenschutzverletzungen und Cyberangriffe nehmen zu \u2013 2021 wurden \u00fcber 22 Mrd. Datens\u00e4tze gestohlen und\/oder missbraucht. Sicherheitsexperten prognostizieren, dass diese Zahl j\u00e4hrlich um 5% bis 10% steigen wird.*<\/p>\n<p>In einer zunehmend riskanten Cyberlandschaft k\u00f6nnen Unternehmen besorgten Kunden helfen, sich vor Online-Bedrohungen zu sch\u00fctzen.<\/p>\n<p>Teneritys Cyber- und Identit\u00e4tsschutzl\u00f6sungen machen es Ihren Kunden leicht, ihre pers\u00f6nlichen Daten zu verwalten und zu sch\u00fctzen, um ein sicheres Onlineerlebnis zu gew\u00e4hrleisten.<\/p>\n<p>&nbsp;<\/p>\n<h6>*<a href=\"http:\/\/securitymagazine.com\/articles\/97046-over-22-billion-records-exposed-in-2021\" target=\"_blank\" rel=\"noopener\">securitymagazine.com\/articles\/97046-over-22-billion-records-exposed-in-2021<\/a><\/h6>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_50bd9943 us_animate_this align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"804\" height=\"482\" src=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/CyberSME_homepage.png\" class=\"attachment-large size-large\" alt=\"CyberSME Homepage\" loading=\"lazy\" srcset=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/CyberSME_homepage.png 804w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/CyberSME_homepage-300x180.png 300w\" sizes=\"auto, (max-width: 804px) 100vw, 804px\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_auto with_shape\"><div class=\"l-section-shape type_tilt pos_bottom hor_flip\" style=\"height:10vh;color:var(--color-content-bg-alt)\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 8\" preserveAspectRatio=\"none\" width=\"100%\" height=\"100%\">\r\n\t<path fill=\"currentColor\" d=\"M64 7.9 L64 10 L0 10 L0 0 Z\"\/>\r\n<\/svg><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_c70c97eb height_medium\" id=\"program___outcomes\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\">Unternehmensziele erreichen<\/h2>\n<\/div><\/div><div class=\"wpb_text_column us_custom_457f9c5f text___intro\"><div class=\"wpb_wrapper\"><p style=\"font-weight: 400; text-align: center;\"><em>Unsere Cyber- und Identit\u00e4tsschutzl\u00f6sungen bieten einen echten Mehrwert f\u00fcr Ihre Kunden und zahlen auf Ihre Unternehmensziele ein:<\/em><\/p>\n<\/div><\/div><div class=\"w-tabs layout_hor style_trendy switch_click has_scrolling\" style=\"--sections-title-size:1em\" data-accordion-at-width=\"768\"><div class=\"w-tabs-list items_5 align_center\"><div class=\"w-tabs-list-h\"><button class=\"w-tabs-item active\" aria-controls=\"content-lcdf\" aria-expanded=\"false\"><span class=\"w-tabs-item-title\">Kundenbindung<\/span><\/button><button class=\"w-tabs-item\" aria-controls=\"content-odb1\" aria-expanded=\"false\"><span class=\"w-tabs-item-title\">Aktivierung<\/span><\/button><button class=\"w-tabs-item\" aria-controls=\"content-ce5c\" aria-expanded=\"false\"><span class=\"w-tabs-item-title\">Ertr\u00e4ge<\/span><\/button><button class=\"w-tabs-item\" aria-controls=\"content-eeea\" aria-expanded=\"false\"><span class=\"w-tabs-item-title\">Differenzierung<\/span><\/button><button class=\"w-tabs-item\" aria-controls=\"content-lf76\" aria-expanded=\"false\"><span class=\"w-tabs-item-title\">Reputation<\/span><\/button><\/div><\/div><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section active\" id=\"lcdf\"><button class=\"w-tabs-section-header active\" aria-controls=\"content-lcdf\" aria-expanded=\"true\"><div class=\"w-tabs-section-title\">Kundenbindung<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-lcdf\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3>Kundenbindung<\/h3>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Digitale Sicherheitsleistungen, die Ihren Kunden helfen, ihre Daten und ihre Identit\u00e4t zu sch\u00fctzen, zahlen in hohem Ma\u00dfe auf die Attraktivit\u00e4t Ihres Kernproduktes ein und helfen bei der Steigerung von Kundenbindung und der Reduzierung von K\u00fcndigungsquoten.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"odb1\"><button class=\"w-tabs-section-header\" aria-controls=\"content-odb1\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">Aktivierung<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-odb1\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3>Kundenaktivierung und Zusatzverk\u00e4ufe<\/h3>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>F\u00fcr Unternehmen mit niedriger Interaktionsfrequenz und wenigen Kontaktanl\u00e4ssen bieten Cyber- und Identit\u00e4tsschutzprodukte zus\u00e4tzliche M\u00f6glichkeiten, bei den Kunden im Ged\u00e4chtnis zu bleiben und einen kontinuierlichen Kundennutzen zu bieten. Dadurch lassen sich Kundeninteraktionen, Cross- und Up-Selling erh\u00f6hen.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"ce5c\"><button class=\"w-tabs-section-header\" aria-controls=\"content-ce5c\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">Ertr\u00e4ge<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-ce5c\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3>Ertr\u00e4ge steigern und Kundenwert erh\u00f6hen<\/h3>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Als Zukaufoptionen bieten Cyber- und Identit\u00e4tsschutzprodukte zus\u00e4tzliche Ertragsquellen. Sie k\u00f6nnen dar\u00fcber hinaus Abwanderungen reduzieren und den Kundenwert nachhaltig erh\u00f6hen.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"eeea\"><button class=\"w-tabs-section-header\" aria-controls=\"content-eeea\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">Differenzierung<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-eeea\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3>Differenzierung schaffen<\/h3>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Die Integration von Cyber- und Identit\u00e4tsschutzleistungen hat einen positiven Einfluss auf die Attraktivit\u00e4t Ihres Kernproduktes und erh\u00f6ht die Wettbewerbsdifferenzierung.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"lf76\"><button class=\"w-tabs-section-header\" aria-controls=\"content-lf76\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">Reputation<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-lf76\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3>Markenwahrnehmung verbessern und Vertrauen aufbauen<\/h3>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Durch den ganzheitlichen und dauerhaften Schutz Ihrer Kunden zahlen Cyber- und Identit\u00e4tsschutzprodukte auf die Markenwerte \u201eVertrauen\u201c und \u201eSicherheit\u201c ein.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_c70c97eb height_auto with_shape\"><div class=\"l-section-shape type_tilt pos_bottom hor_flip\" style=\"height:10vh;color:#ffffff\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 8\" preserveAspectRatio=\"none\" width=\"100%\" height=\"100%\">\r\n\t<path fill=\"currentColor\" d=\"M64 7.9 L64 10 L0 10 L0 0 Z\"\/>\r\n<\/svg><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_medium\" id=\"program___modules\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\">Module<\/h2>\n<\/div><\/div><div class=\"wpb_text_column text___intro\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">Unsere Cyber- und Identit\u00e4tsschutzleistungen lassen sich flexibel konfigurieren, um Ihre Anforderungen \u2013 und die Ihrer Kunden \u2013 zu erf\u00fcllen.<\/p>\n<\/div><\/div><div class=\"g-cols wpb_row text___smaller via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_439390a6 align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___customer-portal-1024x1024.png\" class=\"attachment-large size-large\" alt=\"Customer Portal\" loading=\"lazy\" srcset=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___customer-portal-1024x1024.png 1024w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___customer-portal-300x300.png 300w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___customer-portal-150x150.png 150w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___customer-portal.png 1080w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: center;\">Kundenportal<\/h3>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">Mithilfe des nutzerfreundlichen Dashboards kann Ihr Kunde seine Daten verwalten. Er hat Zugriff auf Risikoeinsch\u00e4tzungen, Warnmeldungen, Handlungsempfehlungen und Sicherheitstipps.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_439390a6 align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___surface-web-scanning-1024x1024.png\" class=\"attachment-large size-large\" alt=\"Surface Web Scanning\" loading=\"lazy\" srcset=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___surface-web-scanning-1024x1024.png 1024w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___surface-web-scanning-300x300.png 300w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___surface-web-scanning-150x150.png 150w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___surface-web-scanning.png 1080w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: center;\">Public &amp; Dark Web Scanning<\/h3>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">Der Online-Monitor durchsucht kontinuierlich das Public &amp; Dark Web nach unberechtigt ver\u00f6ffentlichten, vielleicht gehackten pers\u00f6nlichen Daten des Kunden. Mit Hilfe des Online-Monitors beh\u00e4lt der Kunde den \u00dcberblick \u00fcber seine digitalen Spuren im Internet.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_439390a6 align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___web-clean-up-1024x1024.png\" class=\"attachment-large size-large\" alt=\"Web Clean Up\" loading=\"lazy\" srcset=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___web-clean-up-1024x1024.png 1024w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___web-clean-up-300x300.png 300w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___web-clean-up-150x150.png 150w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___web-clean-up.png 1080w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: center;\">Online Cleaner<\/h3>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">Hilfe bei der Sperrung und L\u00f6schung pers\u00f6nlicher Daten im Internet, die zu Unrecht oder unbeabsichtigt durch Dritte ver\u00f6ffentlicht wurden.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"g-cols wpb_row text___smaller via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_439390a6 align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___detection-and-real-time-alerting-1024x1024.png\" class=\"attachment-large size-large\" alt=\"Detection and real-time alerting\" loading=\"lazy\" srcset=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___detection-and-real-time-alerting-1024x1024.png 1024w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___detection-and-real-time-alerting-300x300.png 300w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___detection-and-real-time-alerting-150x150.png 150w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___detection-and-real-time-alerting.png 1080w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: center;\">Warnmeldungen<\/h3>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">Sollten die Daten des Kunden im Public oder Dark Web gefunden werden, erh\u00e4lt er automatische Warnmeldungen per E-Mail und\/oder SMS in Echtzeit.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_439390a6 align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___education-center-chatbot-1024x1024.png\" class=\"attachment-large size-large\" alt=\"Education Center &amp; Chatbot\" loading=\"lazy\" srcset=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___education-center-chatbot-1024x1024.png 1024w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___education-center-chatbot-300x300.png 300w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___education-center-chatbot-150x150.png 150w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___education-center-chatbot.png 1080w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: center;\">Online Hilfe &amp; Chatbot<\/h3>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">Zur Pr\u00e4vention bietet die Online-Hilfe Ihrem Kunden leicht verst\u00e4ndliche Inhalte, um sein (Sicherheits-) Verst\u00e4ndnis und Verhalten zu verbessern. Er hat rund um die Uhr Zugriff auf Chatbot, FAQs, Artikel und Videos.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_439390a6 align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___mobile-vpn-1024x1024.png\" class=\"attachment-large size-large\" alt=\"Mobile VPN\" loading=\"lazy\" srcset=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___mobile-vpn-1024x1024.png 1024w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___mobile-vpn-300x300.png 300w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___mobile-vpn-150x150.png 150w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___mobile-vpn.png 1080w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: center;\">MobileVPN<\/h3>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">MobileVPN stellt eine sichere Verbindung her, Ihr Kunde surft anonym und bewahrt seine Privatsph\u00e4re. Gesendete Daten sind verschl\u00fcsselt und sicher \u2013 egal, ob beim Online-Banking, -Shopping, Videostreaming oder in sozialen Netzwerken.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"g-cols wpb_row text___smaller via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-2 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_439390a6 align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___device-vulnerability-1024x1024.png\" class=\"attachment-large size-large\" alt=\"Device Vulnerability\" loading=\"lazy\" srcset=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___device-vulnerability-1024x1024.png 1024w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___device-vulnerability-300x300.png 300w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___device-vulnerability-150x150.png 150w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___device-vulnerability.png 1080w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: center;\">Device Vulnerability<\/h3>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">Computer, Laptops und Smartphones enthalten hochsensible Daten, was sie zu einem Hauptziel f\u00fcr Cyberkriminelle macht. Wir helfen Ihren Kunden, Schwachstellen aufzudecken und sich zu sch\u00fctzen.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_439390a6 align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___id-helpline-1024x1024.png\" class=\"attachment-large size-large\" alt=\"ID Helpline\" loading=\"lazy\" srcset=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___id-helpline-1024x1024.png 1024w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___id-helpline-300x300.png 300w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___id-helpline-150x150.png 150w, https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2022\/11\/icon___cyber___id-helpline.png 1080w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: center;\">ID<br \/>\nHelpline<\/h3>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">Pers\u00f6nlicher Support, professionelle Beratung und pragmatische Hilfestellungen durch unser Expertenteam \u2013 rund um die Uhr, telefonisch oder per E-Mail<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-2 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_4fb9e5a3 height_auto with_shape\"><div class=\"l-section-shape type_triangle pos_bottom\" style=\"height:10vh;color:var(--color-content-secondary)\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 8\" preserveAspectRatio=\"none\" width=\"100%\" height=\"100%\">\r\n\t<path fill=\"currentColor\" d=\"M64 8 L0 8 L0 0 L32 7.9 L64 0 Z\"\/>\r\n<\/svg><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row last-row height_medium color_alternate\" id=\"program___why\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container content\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column us_custom_efc17075\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\">Warum Cyber- und Identit\u00e4tsschutz?<\/h2>\n<\/div><\/div><div class=\"g-cols wpb_row why-tenerity via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container has-bottom-margin\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3>Ganzheitliche End-to-End L\u00f6sung<\/h3>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Unser ganzheitliches Cyber- und Identit\u00e4tsschutzangebot ist in 11 Sprachen verf\u00fcgbar und beinhaltet umfangreiche Prevention, Detection und Resolution Module.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container has-bottom-margin\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3>Handlungsempfehlungen in Echtzeit<\/h3>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Wir analysieren Daten mithilfe maschinellen Lernens, sodass Ihr Kunde Informationen und Handlungsempfehlungen in Echtzeit erh\u00e4lt.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"g-cols wpb_row why-tenerity via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container has-bottom-margin\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3>Flexible White-Label-L\u00f6sung<\/h3>\n<\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Unsere Cyber- und Identit\u00e4tsschutzprodukte k\u00f6nnen flexibel an Ihre Marke angepasst werden und bereits innerhalb von 4 Wochen einsatzbereit sein.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container has-bottom-margin\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"Cyber- und Identit\u00e4tsschutz Teneritys Cyber- und Identit\u00e4tsschutzl\u00f6sungen machen es Ihren Kunden leicht, ihre pers\u00f6nlichen Daten zu verwalten und zu sch\u00fctzen, um ein sicheres Onlineerlebnis zu gew\u00e4hrleisten. L\u00f6sungen &gt; Identit\u00e4tsschutz Cyber- und Identit\u00e4tsschutz \u00dcbersichtZieleModuleWarum Cyber- und Identit\u00e4tsschutz?\u00dcbersicht Unser ganzheitlicher Cyber- und Identit\u00e4tsschutz f\u00fcr Privat- und Gesch\u00e4ftskunden erm\u00f6glicht es Ihnen, Vertrauen aufzubauen und Kundenbindung zu steigern. Identit\u00e4tsschutz...","protected":false},"author":1,"featured_media":1218,"parent":139,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-488","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber- und Identit\u00e4tsschutz - Tenerity DE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber- und Identit\u00e4tsschutz - Tenerity DE\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/\" \/>\n<meta property=\"og:site_name\" content=\"Tenerity DE\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-26T12:18:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2023\/05\/Cyber-and-ID-protection-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2314\" \/>\n\t<meta property=\"og:image:height\" content=\"1296\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/\",\"url\":\"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/\",\"name\":\"Cyber- und Identit\u00e4tsschutz - Tenerity DE\",\"isPartOf\":{\"@id\":\"https:\/\/www.tenerity.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2023\/05\/Cyber-and-ID-protection-banner.jpg\",\"datePublished\":\"2022-10-14T18:58:27+00:00\",\"dateModified\":\"2023-07-26T12:18:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/#primaryimage\",\"url\":\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2023\/05\/Cyber-and-ID-protection-banner.jpg\",\"contentUrl\":\"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2023\/05\/Cyber-and-ID-protection-banner.jpg\",\"width\":2314,\"height\":1296,\"caption\":\"Cyber and ID Protection\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tenerity.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u00f6sungen\",\"item\":\"https:\/\/www.tenerity.com\/de\/losungen\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber- und Identit\u00e4tsschutz\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tenerity.com\/de\/#website\",\"url\":\"https:\/\/www.tenerity.com\/de\/\",\"name\":\"Tenerity\",\"description\":\"Intelligent engagement and loyalty for modern brands\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tenerity.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber- und Identit\u00e4tsschutz - Tenerity DE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/","og_locale":"de_DE","og_type":"article","og_title":"Cyber- und Identit\u00e4tsschutz - Tenerity DE","og_url":"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/","og_site_name":"Tenerity DE","article_modified_time":"2023-07-26T12:18:35+00:00","og_image":[{"width":2314,"height":1296,"url":"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2023\/05\/Cyber-and-ID-protection-banner.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"5 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/","url":"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/","name":"Cyber- und Identit\u00e4tsschutz - Tenerity DE","isPartOf":{"@id":"https:\/\/www.tenerity.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/#primaryimage"},"image":{"@id":"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2023\/05\/Cyber-and-ID-protection-banner.jpg","datePublished":"2022-10-14T18:58:27+00:00","dateModified":"2023-07-26T12:18:35+00:00","breadcrumb":{"@id":"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/#primaryimage","url":"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2023\/05\/Cyber-and-ID-protection-banner.jpg","contentUrl":"https:\/\/www.tenerity.com\/de\/wp-content\/uploads\/sites\/22\/2023\/05\/Cyber-and-ID-protection-banner.jpg","width":2314,"height":1296,"caption":"Cyber and ID Protection"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tenerity.com\/de\/losungen\/cyber-und-identitatsschutz\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tenerity.com\/de\/"},{"@type":"ListItem","position":2,"name":"L\u00f6sungen","item":"https:\/\/www.tenerity.com\/de\/losungen\/"},{"@type":"ListItem","position":3,"name":"Cyber- und Identit\u00e4tsschutz"}]},{"@type":"WebSite","@id":"https:\/\/www.tenerity.com\/de\/#website","url":"https:\/\/www.tenerity.com\/de\/","name":"Tenerity","description":"Intelligent engagement and loyalty for modern brands","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tenerity.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"}]}},"_links":{"self":[{"href":"https:\/\/www.tenerity.com\/de\/wp-json\/wp\/v2\/pages\/488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tenerity.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tenerity.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tenerity.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tenerity.com\/de\/wp-json\/wp\/v2\/comments?post=488"}],"version-history":[{"count":0,"href":"https:\/\/www.tenerity.com\/de\/wp-json\/wp\/v2\/pages\/488\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.tenerity.com\/de\/wp-json\/wp\/v2\/pages\/139"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tenerity.com\/de\/wp-json\/wp\/v2\/media\/1218"}],"wp:attachment":[{"href":"https:\/\/www.tenerity.com\/de\/wp-json\/wp\/v2\/media?parent=488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}