{"id":495,"date":"2025-08-19T06:54:50","date_gmt":"2025-08-19T06:54:50","guid":{"rendered":"https:\/\/im-cybersec.com\/projects\/"},"modified":"2026-03-27T12:50:13","modified_gmt":"2026-03-27T12:50:13","slug":"partners","status":"publish","type":"page","link":"https:\/\/im-cybersec.com\/de\/partners\/","title":{"rendered":"PARTNERS"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-5451af51 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-image alignleft uagb-block-3d1b7e96 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-left\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/4-3-1024x256.png ,https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/4-3-scaled.png 780w, https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/4-3-scaled.png 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/4-3-1024x256.png\" alt=\"\" class=\"uag-image-2809\" width=\"689\" height=\"172\" title=\"4\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-203326f0 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-1cc8c252 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title-prefix\"><strong>Verl\u00e4ssliche Technologie. <\/strong>&nbsp;<\/h3><h2 class=\"uagb-ifb-title\"><strong>Bew\u00e4hrte Expertise.<\/strong><\/h2><\/div><p class=\"uagb-ifb-desc\">Bei IM CyberSec arbeiten wir mit f\u00fchrenden Cybersecurity-Herstellern zusammen, um robuste, skalierbare und benutzerfreundliche L\u00f6sungen bereitzustellen. Als zertifizierte Partner gehen wir \u00fcber den reinen Wiederverkauf hinaus, wir bieten Beratung, Implementierung und langfristigen Support f\u00fcr jede von uns angebotene L\u00f6sung.&nbsp;<br>&nbsp;<br>Unsere Partnerschaften stellen sicher, dass Sie den h\u00f6chsten Mehrwert erhalten, Zugang zu exklusiven Funktionen bekommen und in jedem Schritt verl\u00e4ssliche Beratung haben.&nbsp;<\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-875c69c3 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-141ab015\">\n<div class=\"wp-block-uagb-info-box uagb-block-fd9bc83b uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/12\/12-1024x256.png\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><span class=\"uagb-ifb-title-prefix\"><strong><strong>Umfassendes Endpoint Lifecycle Management<\/strong><\/strong><\/span><\/div><p class=\"uagb-ifb-desc\">Als <strong>Quest Platin+ Partner<\/strong>z\u00e4hlen wir zu den erfahrensten KACE-Spezialisten in Europa.&nbsp;<br>\u2022 15+ Jahre KACE-Projekterfahrung <br>\u2022 Rollouts in Bildung, \u00f6ffentlicher Verwaltung, Gesundheitswesen und Enterprise <br>\u2022 Implementierung, Training und langfristiger Support <br>\u2022 Lizenzierung, Verl\u00e4ngerungen und technisches Enablement<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-1a68cefc\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-66824f5b wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/im-cybersec.com\/de\/kace-by-quest\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\"><strong><strong>\u2192 Mehr erfahren <\/strong><\/strong><\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-c92615b6\">\n<div class=\"wp-block-uagb-info-box uagb-block-95514b8d uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/4-2-1024x256.png\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><span class=\"uagb-ifb-title-prefix\"><strong><strong><strong>Cloud-natives Patch-Management<\/strong><\/strong><\/strong><\/span><\/div><p class=\"uagb-ifb-desc\">Wir sind zertifizierter <strong>Action1 <\/strong>Gold Partner und bringen modernes Patching und Endpoint-Sicherheit in europ\u00e4ische Organisationen. <br>\u2022 DSGVO-konforme, in Deutschland gehostete L\u00f6sung <br>\u2022 Schnelle Inbetriebnahme und Remote-Support <br>\u2022 Vollst\u00e4ndig gemanagte Patch-Services verf\u00fcgbar <br>\u2022 Ideal f\u00fcr KMU und gro\u00dfe Unternehmen mit hybriden Belegschaften<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-0b1912d0\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-45ee7b59 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/im-cybersec.com\/de\/action1-patching-solution-that-won-the-race\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\"><strong><strong>\u2192 Mehr erfahren <\/strong><\/strong><\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-251ef676 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-0e473f8a\">\n<div class=\"wp-block-uagb-info-box uagb-block-d10e9423 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/3-3-1024x256.png\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><span class=\"uagb-ifb-title-prefix\"><strong><strong>Security Awareness und Phishing-Simulationen<\/strong><\/strong><\/span><\/div><p class=\"uagb-ifb-desc\">Wir helfen Organisationen, mit <strong>KnowBe4<\/strong> einen starken menschlichen Firewall aufzubauen, dem weltweit f\u00fchrenden Anbieter f\u00fcr Security-Awareness-Trainings. <br>\u2022 Offizieller KnowBe4-Partner <br>\u2022 Technisches Setup und Kampagnenmanagement <br>\u2022 Awareness-Strategie zugeschnitten auf Compliance-Vorgaben (ISO 27001, NIS2, DSGVO) <br>\u2022 Mehrsprachige Trainingsprogramme und Berichte<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-089cbc4f\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-4905d36b wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/im-cybersec.com\/de\/knowbe4-security-training-human-firewall\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\"><strong><strong>\u2192 Mehr erfahren <\/strong><\/strong><\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-ff678f34\">\n<div class=\"wp-block-uagb-info-box uagb-block-b800fe83 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/IM-CyberSec-5-1024x256.png\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><span class=\"uagb-ifb-title-prefix\"><strong><strong><strong><strong><strong>EDR + Reporting + 24\/7 SOC Team<\/strong><\/strong><\/strong><\/strong><\/strong><\/span><\/div><p class=\"uagb-ifb-desc\">Diese ganzheitliche EDR-L\u00f6sung bietet fortschrittliche Endpoint Detection and Response mit proaktiver Bedrohungserkennung und schneller Remediation.<br>\u2022 Kontinuierliche Bedrohungserkennung und gemanagte Untersuchung<br>\u2022 Schnelle Eind\u00e4mmung und angeleitete Remediation<br>\u2022 24\/7-\u00dcberwachung durch Expertenteams<br>\u2022 Ideal f\u00fcr KMU, die Sicherheit erh\u00f6hen m\u00f6chten ohne zus\u00e4tzliche Komplexit\u00e4t<br><\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-299a2636\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-dff20f07 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/im-cybersec.com\/de\/huntress-edr-with-24-7-soc-team\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\"><strong><strong>\u2192 Mehr erfahren <\/strong><\/strong><\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-e68756ef alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-e8bceb22\">\n<div class=\"wp-block-uagb-info-box uagb-block-2f28bc8e uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/12\/11-1024x256.png\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><span class=\"uagb-ifb-title-prefix\"><strong><strong><strong>Enterprise-Datenmodellierung &amp; Data Governance<\/strong><\/strong><\/strong><\/span><\/div><p class=\"uagb-ifb-desc\">Als Quest Platinum+ Partner unterst\u00fctzen wir Unternehmen dabei, ihre Daten mit erwin-L\u00f6sungen zu entwerfen, zu steuern und zu optimieren.<br>\u2022 Expertise in erwin Data Modeler, Data Intelligence &amp; Data Governance <br>\u2022 Implementierung, Migration, Schulung &amp; langfristiger Support<br>\u2022 Lizenzierung, Verl\u00e4ngerungen und technisches Enablement <br>\u2022 Unterst\u00fctzung komplexer Datenlandschaften in Enterprise- und regulierten Branchen<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-1f0be6ce\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-f67489b3 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/im-cybersec.com\/de\/erwin-by-quest-the-complete-data-management-platform-for-modern-enterprises\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\"><strong><strong>\u2192 Mehr erfahren <\/strong><\/strong><\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-e5c52262\">\n<div class=\"wp-block-uagb-info-box uagb-block-8afe4f89 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/12\/13-1024x256.png\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><span class=\"uagb-ifb-title-prefix\"><strong><strong><strong><strong><strong><strong>Datenbankentwicklung &amp; -Optimierung<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/span><\/div><p class=\"uagb-ifb-desc\">Als Quest Platinum+ Partner unterst\u00fctzen wir Teams bei der Verwaltung, Entwicklung und Optimierung von Datenbanken mit Toad-L\u00f6sungen.<br>\u2022 Expertise mit Toad f\u00fcr Oracle, SQL Server und plattform\u00fcbergreifende Umgebungen<br>\u2022 Verbesserte Datenbankleistung, Automatisierung &amp; Codequalit\u00e4t<br>\u2022 Lizenzierung, Verl\u00e4ngerungen und technisches Enablement<br>\u2022 Implementierung, Onboarding, Schulungen &amp; langfristiger Support<br><\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-25dbd692\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-d6fdf7e1 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/im-cybersec.com\/de\/toad-by-quest-database-development-and-optimization\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\"><strong><strong>\u2192 Mehr erfahren <\/strong><\/strong><\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-61ca4c72 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-uagb-container uagb-block-5a0233b9\">\n<div class=\"wp-block-uagb-info-box uagb-block-dbb8cb76 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/IM-CyberSec-16-scaled.png\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><span class=\"uagb-ifb-title-prefix\"><strong><strong><strong><strong><strong><strong><strong>Umfassendes Passwort- &amp; Zugriffsmanagement<\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/strong><\/span><\/div><p class=\"uagb-ifb-desc\">Als autorisierter 1Password-Partner unterst\u00fctzen wir Unternehmen dabei, Zugangsdaten sicher und effizient zu verwalten.<br>\u2022 Zentrale Tresore f\u00fcr Passw\u00f6rter, Zugangsdaten und sensible Informationen<br>\u2022 Starke Verschl\u00fcsselung und End-to-End-Sicherheit f\u00fcr alle Konten<br>\u2022 Sichere Freigabe und Team-Zugriffskontrollen \u00fcber Abteilungen hinweg<br>\u2022 Implementierung, Schulung und laufender Support f\u00fcr eine reibungslose Einf\u00fchrung<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-eb81a428\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-662606de wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/im-cybersec.com\/de\/1password-the-ultimate-solution-for-modern-password-management\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\"><strong><strong>\u2192 Mehr erfahren <\/strong><\/strong><\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-e89fe7f0\">\n<div class=\"wp-block-uagb-info-box uagb-block-88d14827 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/2-3-1024x256.png\" alt=\"\" width=\"\" height=\"0\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><span class=\"uagb-ifb-title-prefix\"><strong><strong><strong><strong><strong>Integrationen und strategische Allianzen<\/strong><\/strong><\/strong><\/strong><\/strong><\/span><\/div><p class=\"uagb-ifb-desc\">Zus\u00e4tzlich zu unseren Kernpartnerschaften unterst\u00fctzen wir Integrationen mit: <br>\u2022 Microsoft (Defender, Intune, Azure AD) <br>\u2022 VMware, Hyper-V <br>\u2022 Verschiedene Ticketsysteme und SIEM-Plattformen <br>\u2022 Security-Tools in kundenspezifischen Umgebungen<br>\u2022 Zero Trust Network Access Implementierung<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-12bef9fb\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-06e30f9c wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/im-cybersec.com\/de\/services\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\"><strong><strong>\u2192 Mehr erfahren <\/strong><\/strong><\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-713b6e3f alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div style=\"height:70px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":3156,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"plain-container","ast-site-content-layout":"normal-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-495","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PARTNERS - IM CyberSec<\/title>\n<meta name=\"description\" content=\"Our partnerships ensure you get access to exclusive features, the best deals, and reliable guidance at every step.\u00a0As...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/im-cybersec.com\/de\/partners\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PARTNERS - IM CyberSec\" \/>\n<meta property=\"og:description\" content=\"Our partnerships ensure you get access to exclusive features, the best deals, and reliable guidance at every step.\u00a0As...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/im-cybersec.com\/de\/partners\/\" \/>\n<meta property=\"og:site_name\" content=\"IM CyberSec\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-27T12:50:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/cropped-10-scaled-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/im-cybersec.com\/partners\/\",\"url\":\"https:\/\/im-cybersec.com\/partners\/\",\"name\":\"PARTNERS - IM CyberSec\",\"isPartOf\":{\"@id\":\"https:\/\/im-cybersec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/im-cybersec.com\/partners\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/im-cybersec.com\/partners\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/cropped-10-scaled-1.png\",\"datePublished\":\"2025-08-19T06:54:50+00:00\",\"dateModified\":\"2026-03-27T12:50:13+00:00\",\"description\":\"Our partnerships ensure you get access to exclusive features, the best deals, and reliable guidance at every step.\u00a0As...\",\"breadcrumb\":{\"@id\":\"https:\/\/im-cybersec.com\/partners\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/im-cybersec.com\/partners\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/im-cybersec.com\/partners\/#primaryimage\",\"url\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/cropped-10-scaled-1.png\",\"contentUrl\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/cropped-10-scaled-1.png\",\"width\":512,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/im-cybersec.com\/partners\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/im-cybersec.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PARTNERS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/im-cybersec.com\/#website\",\"url\":\"https:\/\/im-cybersec.com\/\",\"name\":\"IM CyberSec\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/im-cybersec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PARTNERS - IM CyberSec","description":"Our partnerships ensure you get access to exclusive features, the best deals, and reliable guidance at every step.\u00a0As...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/im-cybersec.com\/de\/partners\/","og_locale":"de_DE","og_type":"article","og_title":"PARTNERS - IM CyberSec","og_description":"Our partnerships ensure you get access to exclusive features, the best deals, and reliable guidance at every step.\u00a0As...","og_url":"https:\/\/im-cybersec.com\/de\/partners\/","og_site_name":"IM CyberSec","article_modified_time":"2026-03-27T12:50:13+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/cropped-10-scaled-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/im-cybersec.com\/partners\/","url":"https:\/\/im-cybersec.com\/partners\/","name":"PARTNERS - IM CyberSec","isPartOf":{"@id":"https:\/\/im-cybersec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/im-cybersec.com\/partners\/#primaryimage"},"image":{"@id":"https:\/\/im-cybersec.com\/partners\/#primaryimage"},"thumbnailUrl":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/cropped-10-scaled-1.png","datePublished":"2025-08-19T06:54:50+00:00","dateModified":"2026-03-27T12:50:13+00:00","description":"Our partnerships ensure you get access to exclusive features, the best deals, and reliable guidance at every step.\u00a0As...","breadcrumb":{"@id":"https:\/\/im-cybersec.com\/partners\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/im-cybersec.com\/partners\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/im-cybersec.com\/partners\/#primaryimage","url":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/cropped-10-scaled-1.png","contentUrl":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/cropped-10-scaled-1.png","width":512,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/im-cybersec.com\/partners\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/im-cybersec.com\/"},{"@type":"ListItem","position":2,"name":"PARTNERS"}]},{"@type":"WebSite","@id":"https:\/\/im-cybersec.com\/#website","url":"https:\/\/im-cybersec.com\/","name":"IM CyberSec","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/im-cybersec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"uagb_featured_image_src":{"full":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/cropped-10-scaled-1.png",512,512,false],"thumbnail":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/cropped-10-scaled-1-150x150.png",150,150,true],"medium":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/cropped-10-scaled-1-300x300.png",300,300,true],"medium_large":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/cropped-10-scaled-1.png",512,512,false],"large":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/cropped-10-scaled-1.png",512,512,false],"1536x1536":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/cropped-10-scaled-1.png",512,512,false],"2048x2048":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/cropped-10-scaled-1.png",512,512,false],"trp-custom-language-flag":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/cropped-10-scaled-1-12x12.png",12,12,true]},"uagb_author_info":{"display_name":"anita.xd@yahoo.com","author_link":"https:\/\/im-cybersec.com\/de\/author\/anita-xdyahoo-com\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/pages\/495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/comments?post=495"}],"version-history":[{"count":70,"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/pages\/495\/revisions"}],"predecessor-version":[{"id":3464,"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/pages\/495\/revisions\/3464"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/media\/3156"}],"wp:attachment":[{"href":"https:\/\/im-cybersec.com\/de\/wp-json\/wp\/v2\/media?parent=495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}