{"id":18104,"date":"2022-01-05T15:29:23","date_gmt":"2022-01-05T14:29:23","guid":{"rendered":"https:\/\/www.ikarussecurity.com\/managed-it-ot-security-solutions\/ikarus-mobile-management\/faqs-ikarus-mobile-management\/"},"modified":"2025-03-31T16:21:05","modified_gmt":"2025-03-31T14:21:05","slug":"faqs-ikarus-mobile-management","status":"publish","type":"page","link":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/faqs-ikarus-mobile-management\/","title":{"rendered":"FAQs &#8211; IKARUS mobile.management"},"content":{"rendered":"<div id='av-layout-grid-1'  class='av-layout-grid-container av-junymveb-f80720fa9f73fc71d7e4638d677239db entry-content-wrapper main_color av-flex-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyesco-0ef03aafc3eaad50e4924bb5cbe3585e\">\n.flex_cell.av-junyesco-0ef03aafc3eaad50e4924bb5cbe3585e{\nvertical-align:middle;\nheight:300px;\nmin-height:300px;\nbackground:url(https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/faq.jpg) 0% 0% no-repeat scroll #ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junyesco-0ef03aafc3eaad50e4924bb5cbe3585e{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyesco-0ef03aafc3eaad50e4924bb5cbe3585e av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-1  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle av-zero-padding avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a\">\n.flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\nvertical-align:top;\nheight:300px;\nmin-height:300px;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\npadding:60px 30px 60px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a av-gridrow-cell av_one_half no_margin  avia-builder-el-2  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ky1n01v7-313b3709e947c65f41acf22db80e2d64\">\n#top .av-special-heading.av-ky1n01v7-313b3709e947c65f41acf22db80e2d64{\npadding-bottom:25px;\ncolor:#ffffff;\nfont-size:34px;\n}\nbody .av-special-heading.av-ky1n01v7-313b3709e947c65f41acf22db80e2d64 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-ky1n01v7-313b3709e947c65f41acf22db80e2d64 .av-special-heading-tag{\nfont-size:34px;\n}\n.av-special-heading.av-ky1n01v7-313b3709e947c65f41acf22db80e2d64 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-ky1n01v7-313b3709e947c65f41acf22db80e2d64 .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-ky1n01v7-313b3709e947c65f41acf22db80e2d64 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-ky1n01v7-313b3709e947c65f41acf22db80e2d64 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-ky1n01v7-313b3709e947c65f41acf22db80e2d64 av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-3  avia-builder-el-no-sibling  av-inherit-size av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >FAQs &#8211; IKARUS mobile.management<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-2'  class='av-layout-grid-container av-junyy33y-ebc4019e7b6877f5936d4d5958e59ead entry-content-wrapper main_color av-flex-cells  avia-builder-el-4  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyw8vu-4853268eebab2336dfbb5674b206345b\">\n.flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\nvertical-align:top;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyw8vu-4853268eebab2336dfbb5674b206345b av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-5  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junywu9f-a644aaa809a28abe3ff70b1e0944f1bf\">\n.flex_cell.av-junywu9f-a644aaa809a28abe3ff70b1e0944f1bf{\nvertical-align:top;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junywu9f-a644aaa809a28abe3ff70b1e0944f1bf{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junywu9f-a644aaa809a28abe3ff70b1e0944f1bf av-gridrow-cell av_one_half no_margin  avia-builder-el-6  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<\/div>\n<div id='av-layout-grid-3'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-7  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n<div class='flex_cell av-q2i8yj-d8b0319cfaae95b9c865418c60435802 av-gridrow-cell av_one_full no_margin  avia-builder-el-8  avia-builder-el-no-sibling '  ><div class='flex_cell_inner'><div  class='avia-icon-list-container av-jzwfmaj4-c874b2f57a5322837469736efe573e2e  avia-builder-el-9  avia-builder-el-no-sibling '><ul class='avia-icon-list avia_animate_when_almost_visible avia-icon-list-left av-iconlist-big av-jzwfmaj4-c874b2f57a5322837469736efe573e2e avia-iconlist-animate'>\n<li><div class='iconlist_icon av-av_iconlist_item-143e4ce3a6c310cc3b9f774322f2905c avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: What is IKARUS mobile.management?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >What is IKARUS mobile.management?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p><strong>IKARUS mobile.management<\/strong> is a full MDM \/ EMM solution obtained from the Austrian cloud or used on-premise in the customer\u2019s infrastructure.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-av_iconlist_item-8268f3ecfbed9e8a3c2e6d022fbbfe70 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: Which companies should or could use the IKARUS mobile.management system?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >Which companies should or could use the IKARUS mobile.management system?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>The system is fully scalable, hence can be used in companies of all sizes. It provides an entire tenancy and extensive management and administration concept. As a result, any interested company can use the system and configure it individually.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-lu9p7b88-dcfcf62e8fe6f6493e32f13e660cb95c avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: Which platforms are supported?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >Which platforms are supported?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p><strong>IKARUS mobile.management<\/strong> supports the following mobile operating systems:<\/p>\n<ul>\n<li>Apple iOS from version 8 (recommended 11.3)<\/li>\n<li>macOS from version 10.7<\/li>\n<li>Android from version 8 (recommended higher); only devices with Google Play services<\/li>\n<\/ul>\n<p>In addition, all common management interfaces are implemented completely. This includes next to Android Enterprise, Samsung Knox and Apple also the Enrollment programs like Apple Device Enrollment Program and Volume Purchase Program as well as Android Zero-Touch Enrollment and Samsung Knox Mobile Enrollment.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-av_iconlist_item-7b2303c4d246bf0aa335f1398ec01967 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: Which features and functions does IKARUS mobile.management provide?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >Which features and functions does IKARUS mobile.management provide?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><ul>\n<li>Security: Device restrictions, device lock<\/li>\n<li>Access: Email, Wi-Fi and VPN accounts<\/li>\n<li>Application management: Rollout and updates, remote configuration, applications lists (blacklist, whitelist, etc.)<\/li>\n<li>Et al.<\/li>\n<\/ul>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-av_iconlist_item-10761c90e135a9f255854664895188fa avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: Where are the IKARUS cloud servers located?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >Where are the IKARUS cloud servers located?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>Data are only processed on Excoscale servers in Vienna \/ Austria. The Austrian and EU data protection laws apply in their entirety.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-av_iconlist_item-8ce209e2f157381dbd4a57c328f21537 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: Which kind of subscriptions can be used with the IKARUS cloud solution?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >Which kind of subscriptions can be used with the IKARUS cloud solution?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>The invoice is done on a user base. Each user may use up to three devices. By default, there are subscriptions for 1,2,3 and 5 years available. Details for other options, e.g. device-based invoice, can be requested.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-av_iconlist_item-40f6821f20138fdedbf7ea8c8e6a31b6 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: How many devices can be managed with IKARUS mobile.management?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >How many devices can be managed with IKARUS mobile.management?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>As the system is flexibly and not limited, any number of devices can be managed.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-av_iconlist_item-37eb3b48faedd8bf2c2c555ee9ee09ba avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: Is the IKARUS cloud solution or the hosting centre certified by industrial standards?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >Is the IKARUS cloud solution or the hosting centre certified by industrial standards?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>Yes, the hosting centre Inerxion is certified by ISO27001 and BS25999.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-av_iconlist_item-a12f1220651888fd3914429d98f06b39 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: Is there a separation of private and corporate data available in IKARUS mobile.management?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >Is there a separation of private and corporate data available in IKARUS mobile.management?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><p>Yes, a separation of data is available and can be achieved by operating system-based functions or via secure container application (SecurePIM).<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-lu9p544n-735b9f5fe8115f521f6c3bd5778b9604 avia-font-entypo-fontello avia-iconfont avia-font-entypo-fontello'><span class='av-icon-char' data-av_icon='\ue81c' data-av_iconfont='entypo-fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: Which additional features are supported?\"><h4 class='av_iconlist_title iconlist_title  '  itemprop=\"headline\" >Which additional features are supported?<\/h4><\/header><div class='iconlist_content '  itemprop=\"text\" ><ul>\n<li>Email container (SecurePIM), in which the data is specially protected by strong encryption<\/li>\n<li>IKARUS VPN &#8211; a per-app VPN solution based on openVPN.<\/li>\n<li>Check Point Harmony Mobile &#8211; a mobile threat detection client for Android and iOS; offers protection against malware, phishing and other attacks<\/li>\n<\/ul>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<\/ul><\/div>\n<\/div><\/div><\/div><div id='av-layout-grid-4'  class='av-layout-grid-container av-3uw0y3-8a6fbbc83af3de59d9476fc65d542127 entry-content-wrapper main_color av-flex-cells  avia-builder-el-10  el_after_av_layout_row  avia-builder-el-last  grid-row-not-first  container_wrap fullsize'  >\n<div class='flex_cell av-28g47f-fdf21df6a448102433a3d72aa95bda50 av-gridrow-cell av_one_full no_margin  avia-builder-el-11  avia-builder-el-no-sibling '  ><div class='flex_cell_inner'><div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:&quot;5&quot;,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-slider-active avia-content-slider1 avia-content-slider-even  avia-builder-el-12  avia-builder-el-no-sibling  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-44708 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/cyber-threats-in-europe\/' data-rel='slide-1' class='slide-image' title='Cyber Threats in Europe'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/ENISA-Threat-Landscape-Report-2025--260x185.png\" class=\"wp-image-44704 avia-img-lazy-loading-not-44704 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"ENISA Threat Landscape Report 2025\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Cyber Threats in Europe\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/cyber-threats-in-europe\/' title='Cyber Threats in Europe'>Cyber Threats in Europe<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-10T10:49:24+01:00\" >10. March 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/ENISA-Threat-Landscape-Report-2025-.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>424<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-01-05T15:29:23+01:00\" >2026-03-10 10:49:24<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-10 11:06:01<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Cyber Threats in Europe<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44622 slide-entry-overview slide-loop-2 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-company-name-and-new-office-address-as-of-march-1-2026\/' data-rel='slide-1' class='slide-image' title='New Company Name and New Office Address as of March 1, 2026'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"84\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350-260x84.png\" class=\"wp-image-44613 avia-img-lazy-loading-not-44613 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"IKARUS Security\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: New Company Name and New Office Address as of March 1, 2026\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-company-name-and-new-office-address-as-of-march-1-2026\/' title='New Company Name and New Office Address as of March 1, 2026'>New Company Name and New Office Address as of March 1, 2026<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-02T10:06:20+01:00\" >2. March 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>84<\/span>\n\t\t\t\t\t\t<span itemprop='width'>350<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-01-05T15:29:23+01:00\" >2026-03-02 10:06:20<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-02 10:06:29<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>New Company Name and New Office Address as of March 1, 2026<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44362 slide-entry-overview slide-loop-3 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/bsi-certified-edr-agent-for-harfanglab-guard-feat-ikarus\/' data-rel='slide-1' class='slide-image' title='BSI-certified EDR agent for HarfangLab Guard feat. IKARUS'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019-260x185.png\" class=\"wp-image-44368 avia-img-lazy-loading-not-44368 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"BSI-Certification\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: BSI-certified EDR agent for HarfangLab Guard feat. IKARUS\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/bsi-certified-edr-agent-for-harfanglab-guard-feat-ikarus\/' title='BSI-certified EDR agent for HarfangLab Guard feat. IKARUS'>BSI-certified EDR agent for HarfangLab Guard feat. IKARUS<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-02-02T16:12:31+01:00\" >2. February 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>753<\/span>\n\t\t\t\t\t\t<span itemprop='width'>752<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-01-05T15:29:23+01:00\" >2026-02-02 16:12:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-02-02 16:18:51<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>BSI-certified EDR agent for HarfangLab Guard feat. IKARUS<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44284 slide-entry-overview slide-loop-4 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/austrian-universities-move-toward-european-endpoint-security-with-data-sovereignty\/' data-rel='slide-1' class='slide-image' title='Austrian Universities Move Toward European Endpoint Security with Data Sovereignty'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-260x185.jpg\" class=\"wp-image-35536 avia-img-lazy-loading-not-35536 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"HarfangLab Guard\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-260x185.jpg 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-300x214.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400.jpg 400w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Austrian Universities Move Toward European Endpoint Security with Data Sovereignty\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/austrian-universities-move-toward-european-endpoint-security-with-data-sovereignty\/' title='Austrian Universities Move Toward European Endpoint Security with Data Sovereignty'>Austrian Universities Move Toward European Endpoint Security with Data Sovereignty<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-01-27T11:45:07+01:00\" >27. January 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>285<\/span>\n\t\t\t\t\t\t<span itemprop='width'>400<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-01-05T15:29:23+01:00\" >2026-01-27 11:45:07<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-01-27 11:47:47<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Austrian Universities Move Toward European Endpoint Security with Data Sovereignty<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-44159 slide-entry-overview slide-loop-5 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/attack-surface-management-asm\/' data-rel='slide-1' class='slide-image' title='Attack Surface Management (ASM)'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600-260x185.jpg\" class=\"wp-image-44156 avia-img-lazy-loading-not-44156 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Attack Surface Management (ASM)\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600-260x185.jpg 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600-600x430.jpg 600w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Attack Surface Management (ASM)\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/attack-surface-management-asm\/' title='Attack Surface Management (ASM)'>Attack Surface Management (ASM)<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-12-09T11:49:31+01:00\" >9. December 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>467<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-01-05T15:29:23+01:00\" >2025-12-09 11:49:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-12-09 11:49:32<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Attack Surface Management (ASM)<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44134 slide-entry-overview slide-loop-6 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/digital-sovereignty-in-practice-ikarus-and-harfanglab-as-a-success-story-for-european-cybersecurity\/' data-rel='slide-1' class='slide-image' title='Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-260x185.jpg\" class=\"wp-image-44018 avia-img-lazy-loading-not-44018 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"IKARUS CEO Joe Pichlmayr and Gr\u00e9goire Germain\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/digital-sovereignty-in-practice-ikarus-and-harfanglab-as-a-success-story-for-european-cybersecurity\/' title='Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity'>Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-12-03T11:57:52+01:00\" >3. December 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1281<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1920<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-01-05T15:29:23+01:00\" >2025-12-03 11:57:52<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-12-03 11:57:53<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-43945 slide-entry-overview slide-loop-7 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ikarus-named-emea-mssp-of-the-year-2025-by-nozomi-networks\/' data-rel='slide-1' class='slide-image' title='IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-260x185.png\" class=\"wp-image-43850 avia-img-lazy-loading-not-43850 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"NOZOMI EMEA MSSP Award 2025\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-260x185.png 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-300x212.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web.png 595w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ikarus-named-emea-mssp-of-the-year-2025-by-nozomi-networks\/' title='IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks'>IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-11-24T12:36:31+01:00\" >24. November 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>420<\/span>\n\t\t\t\t\t\t<span itemprop='width'>595<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-01-05T15:29:23+01:00\" >2025-11-24 12:36:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-11-24 12:36:31<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-43752 slide-entry-overview slide-loop-8 slide-parity-even  post-entry-last  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ascon-new-nist-standard-for-lightweight-iot-cryptography\/' data-rel='slide-1' class='slide-image' title='ASCON: New NIST Standard for Lightweight IoT Cryptography'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/iot-general-260x185.jpg\" class=\"wp-image-43747 avia-img-lazy-loading-not-43747 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"ASCON: Neuer NIST-Standard f\u00fcr leichtgewichtige IoT-Kryptografie\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: ASCON: New NIST Standard for Lightweight IoT Cryptography\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ascon-new-nist-standard-for-lightweight-iot-cryptography\/' title='ASCON: New NIST Standard for Lightweight IoT Cryptography'>ASCON: New NIST Standard for Lightweight IoT Cryptography<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-11-07T11:46:41+01:00\" >7. November 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/iot-general.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>260<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-01-05T15:29:23+01:00\" >2025-11-07 11:46:41<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-11-07 11:46:53<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>ASCON: New NIST Standard for Lightweight IoT Cryptography<\/span><\/span><\/span><\/article><\/div><\/div><div class='avia-slideshow-arrows avia-slideshow-controls' ><a href='#prev' class='prev-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='left-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Previous\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-9' aria-describedby='av-svg-desc-9' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-9'>Previous<\/title>\n<desc id='av-svg-desc-9'>Previous<\/desc>\n<path d=\"M14.464 27.84q0.832 0.832 0 1.536-0.832 0.832-1.536 0l-12.544-12.608q-0.768-0.768 0-1.6l12.544-12.608q0.704-0.832 1.536 0 0.832 0.704 0 1.536l-11.456 11.904z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Previous<\/span><\/a><a href='#next' class='next-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Next\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-10' aria-describedby='av-svg-desc-10' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-10'>Next<\/title>\n<desc id='av-svg-desc-10'>Next<\/desc>\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Next<\/span><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":4443,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"tags":[],"class_list":["post-18104","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>FAQs - IKARUS mobile.management - IKARUS Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/faqs-ikarus-mobile-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FAQs - IKARUS mobile.management - IKARUS Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/faqs-ikarus-mobile-management\/\" \/>\n<meta property=\"og:site_name\" content=\"IKARUS Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ikarusantivirussoftware\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-31T14:21:05+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/faqs-ikarus-mobile-management\/\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/faqs-ikarus-mobile-management\/\",\"name\":\"FAQs - IKARUS mobile.management - IKARUS Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#website\"},\"datePublished\":\"2022-01-05T14:29:23+00:00\",\"dateModified\":\"2025-03-31T14:21:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/faqs-ikarus-mobile-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/faqs-ikarus-mobile-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/faqs-ikarus-mobile-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ikarussecurity.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security Solutions\",\"item\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IKARUS mobile.management\",\"item\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"FAQs &#8211; IKARUS mobile.management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#website\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/\",\"name\":\"IKARUS Security\",\"description\":\"Sovereign Cybersecurity\",\"publisher\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#organization\",\"name\":\"IKARUS Security Software\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png\",\"contentUrl\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png\",\"width\":1805,\"height\":448,\"caption\":\"IKARUS Security Software\"},\"image\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ikarusantivirussoftware\",\"https:\/\/x.com\/ikarusantivirus\",\"https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh\",\"https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh\",\"https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FAQs - IKARUS mobile.management - IKARUS Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/faqs-ikarus-mobile-management\/","og_locale":"en_US","og_type":"article","og_title":"FAQs - IKARUS mobile.management - IKARUS Security","og_url":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/faqs-ikarus-mobile-management\/","og_site_name":"IKARUS Security","article_publisher":"https:\/\/www.facebook.com\/ikarusantivirussoftware","article_modified_time":"2025-03-31T14:21:05+00:00","twitter_card":"summary_large_image","twitter_site":"@ikarusantivirus","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/faqs-ikarus-mobile-management\/","url":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/faqs-ikarus-mobile-management\/","name":"FAQs - IKARUS mobile.management - IKARUS Security","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#website"},"datePublished":"2022-01-05T14:29:23+00:00","dateModified":"2025-03-31T14:21:05+00:00","breadcrumb":{"@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/faqs-ikarus-mobile-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/faqs-ikarus-mobile-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/faqs-ikarus-mobile-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ikarussecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"IT Security Solutions","item":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/"},{"@type":"ListItem","position":3,"name":"IKARUS mobile.management","item":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/"},{"@type":"ListItem","position":4,"name":"FAQs &#8211; IKARUS mobile.management"}]},{"@type":"WebSite","@id":"https:\/\/www.ikarussecurity.com\/en\/#website","url":"https:\/\/www.ikarussecurity.com\/en\/","name":"IKARUS Security","description":"Sovereign Cybersecurity","publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikarussecurity.com\/en\/#organization","name":"IKARUS Security Software","url":"https:\/\/www.ikarussecurity.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","width":1805,"height":448,"caption":"IKARUS Security Software"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ikarusantivirussoftware","https:\/\/x.com\/ikarusantivirus","https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh","https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh","https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw"]}]}},"_links":{"self":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/18104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/comments?post=18104"}],"version-history":[{"count":13,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/18104\/revisions"}],"predecessor-version":[{"id":40568,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/18104\/revisions\/40568"}],"up":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/4443"}],"wp:attachment":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media?parent=18104"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/tags?post=18104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}