{"id":20328,"date":"2022-03-22T14:32:00","date_gmt":"2022-03-22T13:32:00","guid":{"rendered":"https:\/\/www.ikarussecurity.com\/managed-it-ot-security-solutions\/secutain\/"},"modified":"2024-12-04T18:23:56","modified_gmt":"2024-12-04T17:23:56","slug":"secutain","status":"publish","type":"page","link":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/secutain\/","title":{"rendered":"Secutain"},"content":{"rendered":"<div id='av-layout-grid-1'  class='av-layout-grid-container av-junymveb-810ad1ce854c84e404d415892b37fc36 entry-content-wrapper main_color av-flex-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyesco-81b823939ad3e0b5d205076d6dd723ee\">\n.flex_cell.av-junyesco-81b823939ad3e0b5d205076d6dd723ee{\nvertical-align:middle;\nheight:400px;\nmin-height:400px;\nbackground:url(https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/laptop.jpg) 0% 0% no-repeat scroll #ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junyesco-81b823939ad3e0b5d205076d6dd723ee{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyesco-81b823939ad3e0b5d205076d6dd723ee av-gridrow-cell av_one_half no_margin  avia-builder-el-1  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle av-zero-padding avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a\">\n.flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\nvertical-align:top;\nheight:400px;\nmin-height:400px;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\npadding:60px 30px 60px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a av-gridrow-cell av_one_half no_margin  avia-builder-el-2  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4a5q6h5-0794f13637ccd1da175170d03751147e\">\n#top .av-special-heading.av-m4a5q6h5-0794f13637ccd1da175170d03751147e{\npadding-bottom:25px;\ncolor:#ffffff;\nfont-size:34px;\n}\nbody .av-special-heading.av-m4a5q6h5-0794f13637ccd1da175170d03751147e .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-m4a5q6h5-0794f13637ccd1da175170d03751147e .av-special-heading-tag{\nfont-size:34px;\n}\n.av-special-heading.av-m4a5q6h5-0794f13637ccd1da175170d03751147e .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-m4a5q6h5-0794f13637ccd1da175170d03751147e .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-m4a5q6h5-0794f13637ccd1da175170d03751147e .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-m4a5q6h5-0794f13637ccd1da175170d03751147e .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-m4a5q6h5-0794f13637ccd1da175170d03751147e av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-3  el_before_av_textblock  avia-builder-el-first  av-inherit-size av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Security awareness for employees<\/h1><div class='av_custom_color av-subheading av-subheading_below'><p>SECUTAIN Awareness Campaigns, Awareness Packages, Consulting &#038; Training<\/p>\n<\/div><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jyzx0kqa-b4ef2d44328a9201ae595ce2fb152be6\">\n#top .av_textblock_section.av-jyzx0kqa-b4ef2d44328a9201ae595ce2fb152be6 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-jyzx0kqa-b4ef2d44328a9201ae595ce2fb152be6 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><div class=\"avia-testimonial-meta-mini\">\n<p>One of the biggest risk factors for cyber security is the &#8220;human vulnerability&#8221;. Skillful social engineering can lead your employees to share sensitive information or infiltrate malware into the corporate network unnoticed and with the best of intentions.<\/p>\n<p>Technological security precautions and trained users go hand in hand to achieve the most effective defence strategy.<\/p>\n<\/div>\n<\/div><\/section><\/p>\n<\/div><\/div><\/div><div id='av-layout-grid-2'  class='av-layout-grid-container av-junyy33y-ebc4019e7b6877f5936d4d5958e59ead entry-content-wrapper main_color av-flex-cells  avia-builder-el-5  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyw8vu-4853268eebab2336dfbb5674b206345b\">\n.flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\nvertical-align:top;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyw8vu-4853268eebab2336dfbb5674b206345b av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-6  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6\">\n.flex_cell.av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6{\nvertical-align:top;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6 av-gridrow-cell av_one_half no_margin  avia-builder-el-7  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div><\/div><div id='av-layout-grid-3'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-8  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9\">\n.flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-5eefe9fc3bd9d1e6d75a6c9e356023f9 av-gridrow-cell av_one_half no_margin  avia-builder-el-9  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><p><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Targeted phishing emails in the name of the CEO, infected PDF documents disguised as legitimate invoices, USB sticks found by chance or given as gifts, carelessly used private devices, an unexpected alleged service technician\u2013not all possible entry points for cyber-attacks can be secured purely by technology. The best possible security goes hand in hand with attentive, trained users.<\/p>\n<p>With home offices, mobile working, data protection requirements and an increasing threat situation in the area of cybercrime, the demand for professional and sustainable ways to reduce cyber risks through the &#8220;human factor&#8221; is growing.<\/p>\n<h3>Involve employees in security measures<\/h3>\n<p>SECUTAIN has expertise in IT security, organisational development and compliance. All measures aim to make a sustainable contribution to information security in your company through knowledge and awareness.<\/p>\n<p>Depending on your needs, we offer individually designed awareness campaigns, effective awareness packages, target-oriented awareness consultations or topic-specific training courses in the desired format.<\/p>\n<p>Whether acute need for action, development of a security concept or implementation of a security audit\u2013we will be happy to advise you and design a customised package for sustainable cyber security awareness.<\/p>\n<\/div><\/section><br \/>\n<div  class='avia-button-wrap av-kmvscs4u-4bbefb484f5089ff8dfa14c355899d42-wrap avia-button-left  avia-builder-el-11  el_after_av_textblock  avia-builder-el-last '><a href='mailto:sales@ikarus.at?subject=SECUTAIN-Awareness%20-%20Offer%20request%20from%20www.ikarussecurity.com'  class='avia-button av-kmvscs4u-4bbefb484f5089ff8dfa14c355899d42 av-link-btn avia-icon_select-no avia-size-medium avia-position-left avia-color-theme-color'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Inquire now\"><span class='avia_iconbox_title' >Inquire now<\/span><\/a><\/div><\/p>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-44368r-1586ac695d047b93c53d7c2d2ae4611d\">\n.flex_cell.av-44368r-1586ac695d047b93c53d7c2d2ae4611d{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-44368r-1586ac695d047b93c53d7c2d2ae4611d{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-44368r-1586ac695d047b93c53d7c2d2ae4611d av-gridrow-cell av_one_half no_margin  avia-builder-el-12  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><p><section  class='av_textblock_section av-jzv187j8-ab9cb8e981a5707f02d80ed704ac5048 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/209910457?h=1e5498e09c&#038;title=0&#038;byline=0&#038;portrait=0\" width=\"640\" height=\"360\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l09tnukr-f04d565cc5c25618d84fe7951ce68a55\">\n.avia-image-container.av-l09tnukr-f04d565cc5c25618d84fe7951ce68a55 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-l09tnukr-f04d565cc5c25618d84fe7951ce68a55 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-l09tnukr-f04d565cc5c25618d84fe7951ce68a55 av-styling- avia-align-left  avia-builder-el-14  el_after_av_textblock  el_before_av_textblock '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img fetchpriority=\"high\" class='wp-image-19969 avia-img-lazy-loading-not-19969 avia_image ' src='https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/secutain-web.png' alt='SECUTAIN' title='secutain-web'  height=\"100\" width=\"195\"  itemprop=\"thumbnailUrl\"  \/><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-junwc5b3-69b992a35c9cc2396d4ff1e5ad174f2e '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><em>SECUTAIN is the one-stop provider for information security awareness. Tailor-made awareness measures let your employees become more attentive and act more securely.<\/em><\/p>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div><\/p>\n<div id='av-layout-grid-4'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-16  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-40d124bf51e00fb6b81190effb73a35c\">\n.flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-40d124bf51e00fb6b81190effb73a35c av-gridrow-cell av_one_half no_margin  avia-builder-el-17  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Your advantages<\/h3>\n<ul>\n<li>Focus on meaningful action instead of pure rules and regulations<\/li>\n<li>Expertise in IT security, training, communication and conception<\/li>\n<li>Time- and resource-saving methods<\/li>\n<li>Involvement of all management levels<\/li>\n<li>Practice-oriented and sustainable<\/li>\n<\/ul>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-44368r-8fb799a7200e07d324f3f9acc96c5efb\">\n.flex_cell.av-44368r-8fb799a7200e07d324f3f9acc96c5efb{\nvertical-align:middle;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-44368r-8fb799a7200e07d324f3f9acc96c5efb{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-44368r-8fb799a7200e07d324f3f9acc96c5efb av-gridrow-cell av_one_half no_margin  avia-builder-el-19  el_after_av_cell_one_half  avia-builder-el-last  content-align-middle'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Professional advice and conception<\/h3>\n<p>Whether acute need for action, development of a security concept or implementation of a security audit &#8211; we will be happy to advise you and design a customised package for sustainable cybersecurity awareness.<\/p>\n<p><span>Contact us now at +43 1 58995-500 or <\/span><a href=\"mailto:sales@ikarus.at\">sales@ikarus.at<\/a>!<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-5'  class='av-layout-grid-container av-3o0jy-22d2b349e396dde39f93eb0bdfbd86d7 entry-content-wrapper main_color av-flex-cells  avia-builder-el-21  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n<div class='flex_cell av-38ngu-15563877880274382584e3b963dc9b9e av-gridrow-cell av_one_full no_margin  avia-builder-el-22  avia-builder-el-no-sibling '  ><div class='flex_cell_inner'><section  class='av_textblock_section av-junwc5b3-69b992a35c9cc2396d4ff1e5ad174f2e '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Address your information risks by\u2026<\/h3>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-6'  class='av-layout-grid-container av-fx4c3y-c781a046f1aa972055059746df8fa59c entry-content-wrapper main_color av-flex-cells  avia-builder-el-24  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-e8s9ny-a38ec8262b09a95be69e4e4d887ba244\">\n.flex_cell.av-e8s9ny-a38ec8262b09a95be69e4e4d887ba244{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-e8s9ny-a38ec8262b09a95be69e4e4d887ba244{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-e8s9ny-a38ec8262b09a95be69e4e4d887ba244 av-gridrow-cell av_one_fourth no_margin  avia-builder-el-25  el_before_av_cell_one_fourth  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jyy9oqtm-ac7bf848bb36f2aecc184d6d94b6bd6b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>AWARENESS CAMPAIGNS<\/h3>\n<p><strong>Individual &#038; comprehensive<\/strong><\/p>\n<p>You want to position awareness as a strategically relevant topic but you lack a concept? We create a campaign tailored exactly to your needs.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-e8s9ny-66fa93de6ad003e3495f167f584d405c\">\n.flex_cell.av-e8s9ny-66fa93de6ad003e3495f167f584d405c{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-e8s9ny-66fa93de6ad003e3495f167f584d405c{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-e8s9ny-66fa93de6ad003e3495f167f584d405c av-gridrow-cell av_one_fourth no_margin  avia-builder-el-27  el_after_av_cell_one_fourth  el_before_av_cell_one_fourth  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jyy9oqtm-ac7bf848bb36f2aecc184d6d94b6bd6b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>AWARENESS PACKAGES<\/h3>\n<p><strong>Fast &#038; effective<\/strong><\/p>\n<p>Are you looking for quick and effective solutions to improve your information security? Simply put together suitable measures at a fixed price.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-e8s9ny-a38ec8262b09a95be69e4e4d887ba244\">\n.flex_cell.av-e8s9ny-a38ec8262b09a95be69e4e4d887ba244{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-e8s9ny-a38ec8262b09a95be69e4e4d887ba244{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-e8s9ny-a38ec8262b09a95be69e4e4d887ba244 av-gridrow-cell av_one_fourth no_margin  avia-builder-el-29  el_after_av_cell_one_fourth  el_before_av_cell_one_fourth  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jyy9oqtm-ac7bf848bb36f2aecc184d6d94b6bd6b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>CONSULTING<\/h3>\n<p><strong>Competent &#038; personal<\/strong><\/p>\n<p>You see concrete information security risks and want to know how to counter them? Our experienced experts know what to do.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-e8s9ny-66fa93de6ad003e3495f167f584d405c\">\n.flex_cell.av-e8s9ny-66fa93de6ad003e3495f167f584d405c{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-e8s9ny-66fa93de6ad003e3495f167f584d405c{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-e8s9ny-66fa93de6ad003e3495f167f584d405c av-gridrow-cell av_one_fourth no_margin  avia-builder-el-31  el_after_av_cell_one_fourth  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jyy9oqtm-ac7bf848bb36f2aecc184d6d94b6bd6b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>TRAINING<\/h3>\n<p><strong>Proven &#038; versatile<\/strong><\/p>\n<p>Are you looking for a specific training course or do you want to establish an online academy for information security, for example? Find out more about our training courses.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-7'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-33  el_after_av_layout_row  avia-builder-el-last  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-40d124bf51e00fb6b81190effb73a35c\">\n.flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-40d124bf51e00fb6b81190effb73a35c av-gridrow-cell av_one_full no_margin  avia-builder-el-34  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-ed66f7d666732d20a5d4c8a551f0ff8a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p>In cooperation with SECUTAIN, an brand of etomer GmbH.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":4310,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"tags":[],"class_list":["post-20328","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secutain - IKARUS Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/secutain\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secutain - IKARUS Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/secutain\/\" \/>\n<meta property=\"og:site_name\" content=\"IKARUS Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ikarusantivirussoftware\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-04T17:23:56+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/secutain\/\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/secutain\/\",\"name\":\"Secutain - IKARUS Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#website\"},\"datePublished\":\"2022-03-22T13:32:00+00:00\",\"dateModified\":\"2024-12-04T17:23:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/secutain\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/secutain\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/secutain\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ikarussecurity.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security Solutions\",\"item\":\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Secutain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#website\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/\",\"name\":\"IKARUS Security\",\"description\":\"Sovereign Cybersecurity\",\"publisher\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#organization\",\"name\":\"IKARUS Security Software\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png\",\"contentUrl\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png\",\"width\":1805,\"height\":448,\"caption\":\"IKARUS Security Software\"},\"image\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ikarusantivirussoftware\",\"https:\/\/x.com\/ikarusantivirus\",\"https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh\",\"https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh\",\"https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secutain - IKARUS Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/secutain\/","og_locale":"en_US","og_type":"article","og_title":"Secutain - IKARUS Security","og_url":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/secutain\/","og_site_name":"IKARUS Security","article_publisher":"https:\/\/www.facebook.com\/ikarusantivirussoftware","article_modified_time":"2024-12-04T17:23:56+00:00","twitter_card":"summary_large_image","twitter_site":"@ikarusantivirus","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/secutain\/","url":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/secutain\/","name":"Secutain - IKARUS Security","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#website"},"datePublished":"2022-03-22T13:32:00+00:00","dateModified":"2024-12-04T17:23:56+00:00","breadcrumb":{"@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/secutain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/secutain\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/secutain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ikarussecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"IT Security Solutions","item":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/"},{"@type":"ListItem","position":3,"name":"Secutain"}]},{"@type":"WebSite","@id":"https:\/\/www.ikarussecurity.com\/en\/#website","url":"https:\/\/www.ikarussecurity.com\/en\/","name":"IKARUS Security","description":"Sovereign Cybersecurity","publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikarussecurity.com\/en\/#organization","name":"IKARUS Security Software","url":"https:\/\/www.ikarussecurity.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","width":1805,"height":448,"caption":"IKARUS Security Software"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ikarusantivirussoftware","https:\/\/x.com\/ikarusantivirus","https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh","https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh","https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw"]}]}},"_links":{"self":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/20328","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/comments?post=20328"}],"version-history":[{"count":10,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/20328\/revisions"}],"predecessor-version":[{"id":37669,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/20328\/revisions\/37669"}],"up":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/4310"}],"wp:attachment":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media?parent=20328"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/tags?post=20328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}