{"id":493,"date":"2025-08-19T06:54:50","date_gmt":"2025-08-19T06:54:50","guid":{"rendered":"https:\/\/im-cybersec.com\/home\/"},"modified":"2026-03-27T12:09:29","modified_gmt":"2026-03-27T12:09:29","slug":"home","status":"publish","type":"page","link":"https:\/\/im-cybersec.com\/nl\/","title":{"rendered":"HOME"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-de13c167 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-6501118c\"><h2 class=\"uagb-heading-text\">E\u00e9n partner, totale controle<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-60b997e4 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/IM-CyberSec-4-scaled.png\" alt=\"\" width=\"500\" height=\"125\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\">  360\u00b0 endpoint- en beveiligingsbeheer <\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-259ae339\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-2d1c8330 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/im-cybersec.com\/nl\/solutions\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">onze oplossingen<\/div><\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-f64615b0 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/im-cybersec.com\/nl\/contact\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">Neem contact met ons op<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uag-blocks-common-selector uagb-block-b582cb62 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-ab0fc0c8\">\n<div class=\"wp-block-uagb-info-box uagb-block-ea91e5d1 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title-prefix\">Van Software Factory GmbH naar <br>IM CyberSec<\/h4><h2 class=\"uagb-ifb-title\"><strong>Wij hebben een missie<\/strong><\/h2><\/div><p class=\"uagb-ifb-desc\">In de loop der tijd verbreedde onze focus zich van UEM naar een breder palet aan security\u2011oplossingen. Daarom rebrandden we naar IM CyberSec \u2013 <br><br>Na verloop van tijd breidde onze focus zich uit van unified endpoint management naar een breder scala aan cyberbeveiligingsoplossingen. Om deze evolutie te weerspiegelen, hebben we onze naam gewijzigd in IM CyberSec - kort voor <em>Imagine Cyber Security<\/em> \u2013 als symbool van onze toewijding om IT\u2011omgevingen veilig, beheersbaar en betrouwbaar te maken.<br>&nbsp;<br>Cyberdreigingen nemen sterk toe: sinds 2023 stegen aanvallen wereldwijd met meer dan 85\u202f%; cybercriminaliteit geldt als \u2018derde economie\u2019. Veel IT\u2011teams staan onder druk om compliance, risico\u2019s en operatie in balans te houden. <br>&nbsp;<br>Onze missie: organisaties adviseren, versterken en begeleiden naar een veerkrachtige, controleerbare en pragmatische security\u2011architectuur \u2013 met de beste oplossingen in de markt.<\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><a href=\"https:\/\/im-cybersec.com\/nl\/contact\/\" class=\"uagb-infobox-cta-link wp-block-button__link\" target=\"_self\" rel=\"noopener noreferrer\" onclick=\"return true;\"><span class=\"uagb-inline-editing\">AFSPRAAK INPLANNEN<\/span><\/a><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-layout-flex uagb-block-35e4709c\">\n<div class=\"wp-block-uagb-container uagb-layout-grid uagb-block-6b387464\">\n<div class=\"wp-block-uagb-container uagb-block-6b913dbc\">\n<div class=\"wp-block-uagb-info-box uagb-block-91c21077 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/1-2-300x300.png\" alt=\"\" width=\"70\" height=\"70\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Langdurige partnerships<\/h3><\/div><p class=\"uagb-ifb-desc\">Onze bewezen expertise en constante resultaten zorgen voor jarenlange klantloyaliteit.<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-a1376088\">\n<div class=\"wp-block-uagb-info-box uagb-block-5d4fb00e uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/2-2-300x300.png\" alt=\"\" width=\"70\" height=\"70\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Complexe IT\u2011oplossingen<\/h3><\/div><p class=\"uagb-ifb-desc\">We werken alleen met toptechnologie voor betrouwbare en robuuste beveiligingsoplossingen.<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-f5bea168\">\n<div class=\"wp-block-uagb-info-box uagb-block-4c106ff8 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/3-2-300x300.png\" alt=\"\" width=\"70\" height=\"70\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Managed services<\/h3><\/div><p class=\"uagb-ifb-desc\">End\u2011to\u2011end beheer en support zodat u zich kunt focussen op uw kernactiviteiten.<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-467bfe88\">\n<div class=\"wp-block-uagb-info-box uagb-block-2c78f170 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/Nenaslovljeni-dizajn-23-300x300.png\" alt=\"\" width=\"70\" height=\"70\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Internationaal team<\/h3><\/div><p class=\"uagb-ifb-desc\">We spreken zes talen en ondersteunen klanten in heel Europa \u2013 voor vlotte communicatie en samenwerking.<\/p><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-923ec922 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-8fe14de4 alignwide uagb-is-root-container\">\n<div class=\"wp-block-uagb-container uagb-block-a9df32cb\">\n<div class=\"wp-block-uagb-info-box uagb-block-95bb51ac uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h2 class=\"uagb-ifb-title\">Al meer dan 20 jaar bouwen wij aan onverslaanbare beveiliging<\/h2><\/div><p class=\"uagb-ifb-desc\">Ons team combineert support, engineering, systeembeheer, training &amp; consulting, software\u2011ontwikkeling en projectmanagement \u2013 van mkb tot multinational.&nbsp;<br><br>Wij kennen beide kanten: de strategische blik van CISO\/CIO en de operationele realiteit van IT\u2011teams. Onze waarde: realistisch, ervaren, actiegericht.&nbsp;<br><br>Wat ons onderscheidt&nbsp;<br>- Engineers met &gt;20 jaar IT\u2011 en security\u2011ervaring&nbsp;&nbsp;<br>- Leverancierskennis &amp; best\u2011practices (o.a. Microsoft, Action1, KnowBe4, Quest)&nbsp;<br>- Europese focus, werktalen: DE\/EN\/FR\/NL&nbsp;<br>- End\u2011to\u2011end consultancy en implementatie<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-290b1d46\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-33642a4f\"><h2 class=\"uagb-heading-text\">Onze 4-stappenaanpak<\/h2><p class=\"uagb-desc-text\">Een echt effectief plan is nooit standaard. Het moet aansluiten op uw situatie. Dit proces is niet optioneel \u2013 het is de basis voor echte bescherming en groei.<\/p><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list uagb-block-2c5def50\"><div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-6cc6b37f\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M80 192V144C80 64.47 144.5 0 224 0C303.5 0 368 64.47 368 144V192H384C419.3 192 448 220.7 448 256V448C448 483.3 419.3 512 384 512H64C28.65 512 0 483.3 0 448V256C0 220.7 28.65 192 64 192H80zM144 192H304V144C304 99.82 268.2 64 224 64C179.8 64 144 99.82 144 144V192z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Assess: snelle check &amp; prioritering (risico\u2019s, quick wins, roadmap)\u00a0<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-b2b23553\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 576 512\"><path d=\"M528 0h-480C21.5 0 0 21.5 0 48v320C0 394.5 21.5 416 48 416h192L224 464H152C138.8 464 128 474.8 128 488S138.8 512 152 512h272c13.25 0 24-10.75 24-24s-10.75-24-24-24H352L336 416h192c26.5 0 48-21.5 48-48v-320C576 21.5 554.5 0 528 0zM512 288H64V64h448V288z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Plan: acties, verantwoordelijkheden, mijlpalen, KPI\u2019s\u00a0<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-8f410358\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M0 416C0 398.3 14.33 384 32 384H86.66C99 355.7 127.2 336 160 336C192.8 336 220.1 355.7 233.3 384H480C497.7 384 512 398.3 512 416C512 433.7 497.7 448 480 448H233.3C220.1 476.3 192.8 496 160 496C127.2 496 99 476.3 86.66 448H32C14.33 448 0 433.7 0 416V416zM192 416C192 398.3 177.7 384 160 384C142.3 384 128 398.3 128 416C128 433.7 142.3 448 160 448C177.7 448 192 433.7 192 416zM352 176C384.8 176 412.1 195.7 425.3 224H480C497.7 224 512 238.3 512 256C512 273.7 497.7 288 480 288H425.3C412.1 316.3 384.8 336 352 336C319.2 336 291 316.3 278.7 288H32C14.33 288 0 273.7 0 256C0 238.3 14.33 224 32 224H278.7C291 195.7 319.2 176 352 176zM384 256C384 238.3 369.7 224 352 224C334.3 224 320 238.3 320 256C320 273.7 334.3 288 352 288C369.7 288 384 273.7 384 256zM480 64C497.7 64 512 78.33 512 96C512 113.7 497.7 128 480 128H265.3C252.1 156.3 224.8 176 192 176C159.2 176 131 156.3 118.7 128H32C14.33 128 0 113.7 0 96C0 78.33 14.33 64 32 64H118.7C131 35.75 159.2 16 192 16C224.8 16 252.1 35.75 265.3 64H480zM160 96C160 113.7 174.3 128 192 128C209.7 128 224 113.7 224 96C224 78.33 209.7 64 192 64C174.3 64 160 78.33 160 96z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Implement: technische &amp; organisatorische uitvoering met uw team\u00a0<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-f7bd583c\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M156.6 384.9L125.7 353.1C117.2 345.5 114.2 333.1 117.1 321.8C120.1 312.9 124.1 301.3 129.8 288H24C15.38 288 7.414 283.4 3.146 275.9C-1.123 268.4-1.042 259.2 3.357 251.8L55.83 163.3C68.79 141.4 92.33 127.1 117.8 127.1H200C202.4 124 204.8 120.3 207.2 116.7C289.1-4.07 411.1-8.142 483.9 5.275C495.6 7.414 504.6 16.43 506.7 28.06C520.1 100.9 516.1 222.9 395.3 304.8C391.8 307.2 387.1 309.6 384 311.1V394.2C384 419.7 370.6 443.2 348.7 456.2L260.2 508.6C252.8 513 243.6 513.1 236.1 508.9C228.6 504.6 224 496.6 224 488V380.8C209.9 385.6 197.6 389.7 188.3 392.7C177.1 396.3 164.9 393.2 156.6 384.9V384.9zM384 167.1C406.1 167.1 424 150.1 424 127.1C424 105.9 406.1 87.1 384 87.1C361.9 87.1 344 105.9 344 127.1C344 150.1 361.9 167.1 384 167.1z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Operate &amp; Improve: runbooks, monitoring, reviews, continue optimalisatie\u00a0<\/span><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uag-blocks-common-selector uagb-block-65b6ce60 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-58b26743\">\n<div class=\"wp-block-uagb-info-box uagb-block-4c92b8e9 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title-prefix\">Zorg voor totale controle &amp; security <\/h4><h2 class=\"uagb-ifb-title\"><strong>Zo ondersteunen wij u&nbsp;<\/strong>&nbsp;<\/h2><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-layout-grid uagb-block-5031fb51\">\n<div class=\"wp-block-uagb-info-box uagb-block-f051ebd8 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Endpoint\u2011beheer &amp; hardening<\/strong>&nbsp;<\/h3><\/div><p class=\"uagb-ifb-desc\">Assetinventaris, baselines, hardening, patching (OS &amp; apps), configuratie\u2011compliance, remote remediation, software\u2011uitrol.&nbsp;<\/p><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-e954ed29 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Threat detection &amp; response<\/strong>&nbsp;<\/h3><\/div><p class=\"uagb-ifb-desc\">Vroege detectie van aanvallen, ransomware en malware, met snelle containment en eliminatie van dreigingen.&nbsp;<\/p><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-65efee6f uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Vulnerability &amp; exposure management<\/strong>&nbsp;<\/h3><\/div><p class=\"uagb-ifb-desc\">Scans, prioritering (CVSS\/KEV\/asset\u2011kritiek), remediatieplannen, rapportage voor management en audits.<\/p><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-0174d2fb uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Security awareness &amp; cultuur<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">Programma\u2011ontwerp, phishing\u2011simulaties, rolgerichte trainingen, meetbare volwassenheid \u2013 met rapportage per medewerker.<\/p><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-e85af773 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Datamodellering &amp; Governance<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">Ondersteuning bij het ontwerpen, visualiseren en beheren van complexe datalandschappen. Zorgt voor datakwaliteit, consistentie en compliance, waardoor ge\u00efnformeerde, datagedreven beslissingen binnen uw organisatie mogelijk zijn.<\/p><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-b72d5e65 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Databaseontwikkeling &amp; Optimalisatie<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">Helpt bij het stroomlijnen van databaseontwikkeling, -beheer en -optimalisatie. Automatiseert taken, verhoogt zichtbaarheid van wijzigingen, vermindert fouten en versnelt de levering van hoogwaardige oplossingen.<\/p><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-380a7cb7 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Managed &amp; co\u2011managed security<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">Ondersteuning bij exploitatie van uw security\u2011oplossingen \u2013 van continu monitoring tot samenwerking met uw IT\u2011team. We dichten gaten en benutten middelen maximaal.&nbsp;<\/p><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-77a1b31d uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\">Maatwerkprojecten <strong>Projecten &amp; migraties<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">Windows\/client rollouts, toolimplementaties, platformovergangen, \"day-2-operations\" - grondig gepland en netjes afgeleverd.&nbsp;<\/p><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-d1e82b23 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top wp-block-uagb-info-box--has-margin\"><div class=\"uagb-infobox-margin-wrapper\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Consultancy &amp; Adviesdiensten<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">Op maat gemaakte begeleiding voor IT-infrastructuur, beveiliging en databasebeheer. Van strategie en planning tot implementatie en optimalisatie helpen wij u weloverwogen beslissingen te nemen en uw technologie-investeringen maximaal te benutten.<\/p><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-9204cef4 alignwide uagb-is-root-container\">\n<div class=\"wp-block-uagb-container uagb-block-ccfd53ce\">\n<div class=\"wp-block-uagb-info-box uagb-block-4fd6cc4d uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h2 class=\"uagb-ifb-title\"><strong>Oplossingen &amp; technologie\u2011expertise<\/strong>&nbsp;<\/h2><\/div><p class=\"uagb-ifb-desc\">Leveranciersonafhankelijk en pragmatisch:&nbsp;<br>-&nbsp;<strong>Microsoft 365 Defender \/ Intune \/ Entra<\/strong> (identiteit, endpoint, e-mail)&nbsp;<br><strong>- Action1<\/strong> (remote patching, remediatie, inventaris)&nbsp;<br><strong>- KnowBe4<\/strong> (awareness &amp; phishing)&nbsp;<br><strong>- Quest KACE<\/strong> (UEM, software\u2011uitrol, asset\/licentiebeheer)&nbsp;<\/p><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-aabf285b\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-62a3392b\"><h2 class=\"uagb-heading-text\"><strong>Met wie wij werken<\/strong>&nbsp;<\/h2><p class=\"uagb-desc-text\">- KMO's met groeiende IT-omgevingen&nbsp;<br>- Midmarket\u2011organisaties met compliance\u2011druk en beperkte middelen&nbsp;<br>- Grote ondernemingen &amp; internationale organisaties met verspreide teams&nbsp;<br>Triggers: NIS2\/klantaudits, incidenten, tool\u2011consolidatie, cloud\/modern\u2011work\u2011programma\u2019s.&nbsp;<\/p><\/div>\n\n\n\n<div class=\"wp-block-uagb-info-box uagb-block-a5df4b80 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h2 class=\"uagb-ifb-title\"><strong>Resultaten die ertoe doen <\/strong><\/h2><\/div><p class=\"uagb-ifb-desc\">\u2022 Aanzienlijk minder kritieke kwetsbaarheden &amp; snellere patch\u2011cycli&nbsp;<br>\u2022 Minder alarmruis, duidelijke verantwoordelijkheden&nbsp;<br>\u2022 Betere audit\u2011gereedheid en managementtransparantie&nbsp;<br>\u2022 Ontlast teams via gestroomlijnde processen &amp; automatisering&nbsp;<\/p><\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-e78118af alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-526e0228 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title-prefix\">Wij kiezen voor wereldleiders<\/h4><h2 class=\"uagb-ifb-title\">Onze partners<\/h2><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-bbc71e01\">\n<div class=\"wp-block-uagb-container uagb-block-12ba9d14\">\n<div class=\"wp-block-uagb-info-box uagb-block-040f66a6 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/im-cybersec.com\/nl\/partners\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/12\/14-2-1024x256.png\" alt=\"\" width=\"193\" height=\"48\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><\/div><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-3b5d0fcf\"><h3 class=\"uagb-heading-text\">Unified endpoint management<\/h3><p class=\"uagb-desc-text\">Met &gt;20 jaar ervaring en 10.000+ klanten is KACE een complete UEM\u2011oplossing voor software\u2011uitrol, patching en compliance.<\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-56081f84\">\n<div class=\"wp-block-uagb-info-box uagb-block-21f8d5c3 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/im-cybersec.com\/nl\/partners\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/4-2-1024x256.png\" alt=\"\" width=\"159\" height=\"39\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><\/div><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-e530754f\"><h3 class=\"uagb-heading-text\">Cloud-Native Patching<\/h3><p class=\"uagb-desc-text\">Opgericht in 2016 en al gebruikt door 3.000+ bedrijven: Action1 biedt een krachtige cloud\u2011native oplossing voor realtime patchbeheer, remote monitoring en kwetsbaarhedenscans.<\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-3cc527d1\">\n<div class=\"wp-block-uagb-info-box uagb-block-32ceaca8 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/im-cybersec.com\/nl\/partners\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/3-3-1024x256.png\" alt=\"\" width=\"185\" height=\"46\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><\/div><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-dbccadae\"><h3 class=\"uagb-heading-text\">Security awareness &amp; training<\/h3><p class=\"uagb-desc-text\">Sinds 2010 en bij 65.000+ klanten: KnowBe4 is wereldwijd marktleider in security\u2011awareness\u2011training \u2013 met minder menselijke fouten dankzij trainingen en gesimuleerde phishing.<\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-577c844c\">\n<div class=\"wp-block-uagb-info-box uagb-block-d1e7a584 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/im-cybersec.com\/nl\/partners\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/IM-CyberSec-5-1024x256.png\" alt=\"\" width=\"210\" height=\"52\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><\/div><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-a3dff385\"><h3 class=\"uagb-heading-text\">EDR met 24\/7 SOC-team <\/h3><p class=\"uagb-desc-text\">Continue dreigingsdetectie, 24\/7 expert\u2011monitoring en snelle containment met begeleide remediatie \u2013 proactieve verdediging zonder extra complexiteit.<\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-e7faaf03\">\n<div class=\"wp-block-uagb-info-box uagb-block-92c11443 uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/im-cybersec.com\/nl\/partners\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/12\/13-3-1024x256.png\" alt=\"\" width=\"210\" height=\"52\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><\/div><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-be08fa92\"><h3 class=\"uagb-heading-text\">Enterprise <strong>Datamodellering &amp; Governance<\/strong><\/h3><p class=\"uagb-desc-text\">Erwin helpt sinds 1992 organisaties wereldwijd bij het ontwerpen, visualiseren en beheren van complexe datalandschappen. De tools zorgen voor datakwaliteit, consistentie en compliance, waardoor teams betere datagedreven beslissingen kunnen nemen.<\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-6a5d27f2\">\n<div class=\"wp-block-uagb-info-box uagb-block-a47cfc9b uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/im-cybersec.com\/nl\/partners\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/12\/15-1-1024x256.png\" alt=\"\" width=\"210\" height=\"52\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><\/div><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-be08fa92\"><h3 class=\"uagb-heading-text\"><strong>Databaseontwikkeling &amp; Optimalisatie<\/strong><\/h3><p class=\"uagb-desc-text\">Toad by Quest helpt tienduizenden professionals bij het stroomlijnen van databaseontwikkeling, -beheer en -optimalisatie. Door taken te automatiseren en zichtbaarheid van wijzigingen te vergroten, vermindert het fouten en versnelt het de levering van hoogwaardige oplossingen.<\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-6a5d27f2\">\n<div class=\"wp-block-uagb-info-box uagb-block-99be674f uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/im-cybersec.com\/nl\/partners\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/IM-CyberSec-10-1024x256.png\" alt=\"\" width=\"210\" height=\"52\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><\/div><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-20a89f9a\"><h3 class=\"uagb-heading-text\"><strong><strong><strong><strong>Wachtwoord- en toegangsbeheer<\/strong><\/strong><\/strong><\/strong><\/h3><p class=\"uagb-desc-text\">1Password helpt organisaties bij het veilig beheren en opslaan van wachtwoorden, inloggegevens en gevoelige informatie. Door toegang te centraliseren en veilige samenwerking binnen teams mogelijk te maken, vermindert het risico\u2019s, verhoogt het de productiviteit en zorgt het ervoor dat kritieke gegevens altijd beschermd zijn.<\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-10562319\">\n<div class=\"wp-block-uagb-info-box uagb-block-294a277f uagb-infobox__content-wrap  uagb-infobox_cta-type-all uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><a href=\"https:\/\/im-cybersec.com\/nl\/partners\/\" class=\"uagb-infobox-link-wrap uagb-infbox__link-to-all\" target=\"_self\" aria-label=\"Infobox Link\" rel=\"noopener noreferrer\" onclick=\"return true;\"><\/a><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-image-content\"><img decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/8-1024x256.png\" alt=\"\" width=\"210\" height=\"52\" loading=\"lazy\"\/><\/div><div class=\"uagb-ifb-title-wrap\"><\/div><div class=\"uagb-ifb-button-wrapper wp-block-button\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-2106eb55\"><h3 class=\"uagb-heading-text\"><strong><strong>Intune \/ Entra \/ Defender<\/strong><\/strong><\/h3><p class=\"uagb-desc-text\">Wij versterken uw Microsoft\u2011ecosysteem met topoplossingen, krachtige add\u2011ons en naadloze integraties \u2013 voor meer security, eenvoudiger IT\u2011beheer en betere bedrijfsresultaten.<\/p><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-354486a5 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-32e95885 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h2 class=\"uagb-ifb-title\">Laatste webinars<\/h2><\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-120ec401 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-9986a164\">\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"ast-oembed-container\" style=\"height: 100%;\"><iframe loading=\"lazy\" title=\"Webinar: 5 Experts, 1 Threat - Defending Endpoints Against AI Hacks (IM CyberSec, Huntress, Action1)\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/m03gUN5xTmw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-9420a7d1\">\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"ast-oembed-container\" style=\"height: 100%;\"><iframe loading=\"lazy\" title=\"Quest KACE SMA Update 15.0 \u2013 Live Demo Webinar\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/1E1ofhJyvLE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-2b596982\">\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"ast-oembed-container\" style=\"height: 100%;\"><iframe loading=\"lazy\" title=\"Webinar: Zero Trust - How Secure Are Your Endpoints\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/GXvXftnn1oQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-53fc1195 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-c31f6d93\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-3b734081 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/www.youtube.com\/@IM-CyberSec\" rel=\"follow noopener\" target=\"_blank\" role=\"button\"><div class=\"uagb-button__link\">YOUTUBE-KANAAL BEKIJKEN<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-7693d2dd alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div style=\"height:42px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-febb0d3c alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-d4eb4eb6 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h2 class=\"uagb-ifb-title\">Maak kennis met ons team<\/h2><\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-e75d3911 alignwide uagb-is-root-container\">\n<div class=\"wp-block-uagb-container uagb-block-7ca1331f\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-19d199a3\"><h3 class=\"uagb-heading-text\">Peter D\u00f6rfer<\/h3><p class=\"uagb-desc-text\">CEO, Consultant &amp; Trainer<\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-ee046839\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-3fd8a777\"><h3 class=\"uagb-heading-text\">Ulrich Hustert<\/h3><p class=\"uagb-desc-text\">Managing Partner, VP Sales &amp; Alliances<\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-f5e608da\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-70ea70ef\"><h3 class=\"uagb-heading-text\">Rafa\u00ebl de Vos<\/h3><p class=\"uagb-desc-text\">Chief Technology Officer<\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-a7d4a4e8\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-9828d0ec\"><h3 class=\"uagb-heading-text\"><strong>Anita Sommer<\/strong><\/h3><p class=\"uagb-desc-text\">Commercial Strategy Manager<\/p><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-658cb926 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-619afe28\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-62d26182 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/im-cybersec.com\/nl\/about\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">OVER ONS<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-01a5eb8e alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-b0aef8d0\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-0b9b9d02\"><h2 class=\"uagb-heading-text\">Afspraak inplannen<\/h2><p class=\"uagb-desc-text\">Klaar om te verbeteren? Bouw met ons aan een onverslaanbaar beveiligingssysteem!<\/p><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-4606e551\"><div class=\"wpforms-container wpforms-block wpforms-block-e77dd1ad-d88b-4818-9538-9794dd47770d\" id=\"wpforms-4\"><form id=\"wpforms-form-4\" class=\"wpforms-validate wpforms-form wpforms-ajax-form\" data-formid=\"4\" method=\"post\" enctype=\"multipart\/form-data\" action=\"\/nl\/wp-json\/wp\/v2\/pages\/493\" data-token=\"5ef56b85817a0b85a3d73320e5c94413\" data-token-time=\"1775254213\" data-trp-original-action=\"\/nl\/wp-json\/wp\/v2\/pages\/493\"><noscript class=\"wpforms-error-noscript\">Schakel JavaScript in je browser in om dit formulier in te vullen.<\/noscript><div class=\"wpforms-field-container\"><div id=\"wpforms-4-field_0-container\" class=\"wpforms-field wpforms-field-name\" data-field-id=\"0\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-4-field_0\">Naam <span class=\"wpforms-required-label\">*<\/span><\/label><input type=\"text\" id=\"wpforms-4-field_0\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][0]\" placeholder=\"Voer je naam in\" required><\/div><div id=\"wpforms-4-field_1-container\" class=\"wpforms-field wpforms-field-email\" data-field-id=\"1\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-4-field_1\">E-mail <span class=\"wpforms-required-label\">*<\/span><\/label><input type=\"email\" id=\"wpforms-4-field_1\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][1]\" placeholder=\"Voer uw e-mailadres in\" spellcheck=\"false\" required><\/div><div id=\"wpforms-4-field_3-container\" class=\"wpforms-field wpforms-field-text\" data-field-id=\"3\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-4-field_3\">Enkelvoudige tekst<\/label><input type=\"text\" id=\"wpforms-4-field_3\" class=\"wpforms-field-large\" name=\"wpforms[fields][3]\" placeholder=\"Onderwerp\" ><\/div><div id=\"wpforms-4-field_2-container\" class=\"wpforms-field wpforms-field-textarea\" data-field-id=\"2\"><label class=\"wpforms-field-label wpforms-label-hide\" for=\"wpforms-4-field_2\">Opmerking of bericht <span class=\"wpforms-required-label\">*<\/span><\/label><textarea id=\"wpforms-4-field_2\" class=\"wpforms-field-medium wpforms-field-required\" name=\"wpforms[fields][2]\" placeholder=\"Bericht\" required><\/textarea><\/div><\/div><!-- .wpforms-field-container --><div class=\"wpforms-submit-container\" ><input type=\"hidden\" name=\"wpforms[id]\" value=\"4\"><input type=\"hidden\" name=\"page_title\" value=\"\"><input type=\"hidden\" name=\"page_url\" value=\"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/pages\/493\"><input type=\"hidden\" name=\"url_referer\" value=\"\"><button type=\"submit\" name=\"wpforms[submit]\" id=\"wpforms-submit-4\" class=\"wpforms-submit\" data-alt-text=\"Sending...\" data-submit-text=\"SEND MESSAGE\" aria-live=\"assertive\" value=\"wpforms-submit\">BERICHT VERZENDEN<\/button><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/im-cybersec.com\/wp-content\/plugins\/wpforms-lite\/assets\/images\/submit-spin.svg\" class=\"wpforms-submit-spinner\" style=\"display: none;\" width=\"26\" height=\"26\" alt=\"Aan het laden\"><\/div><input type=\"hidden\" name=\"trp-form-language\" value=\"nl\"\/><\/form><\/div>  <!-- .wpforms-container --><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-a6b1f9db\">\n<div class=\"wp-block-uagb-info-box uagb-block-76ecfaba uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h4 class=\"uagb-ifb-title-prefix\">Meer weten van<\/h4><h2 class=\"uagb-ifb-title\">Veelgestelde vragen<\/h2><\/div><\/div><\/div>\n\n\n<div class=\"wp-block-uagb-faq uagb-faq__outer-wrap uagb-block-45b2aa85 uagb-faq-icon-row-reverse uagb-faq-layout-accordion uagb-faq-expand-first-true uagb-faq-inactive-other-true uagb-faq__wrap uagb-buttons-layout-wrap uagb-faq-equal-height\" data-faqtoggle=\"true\" role=\"tablist\"><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-7051a0e8\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Met wat voor soort bedrijven werk je meestal?<\/span><\/div><div class=\"uagb-faq-content\"><p>We werken met organisaties van elke omvang - van kleine bedrijven tot grote ondernemingen - en helpen hen de cyberbeveiliging, het endpointbeheer en de IT-effici\u00ebntie te verbeteren.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-646e37ab\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Bieden jullie technische ondersteuning na de implementatie?<\/span><\/div><div class=\"uagb-faq-content\"><p>Ja. We leveren niet alleen licenties - we bieden doorlopende technische ondersteuning, training en begeleiding om ervoor te zorgen dat je team onze oplossingen optimaal benut.<\/p><\/div><\/div><div class=\"wp-block-uagb-faq-child uagb-faq-child__outer-wrap uagb-faq-item uagb-block-ba11c45d\" role=\"tab\" tabindex=\"0\"><div class=\"uagb-faq-questions-button uagb-faq-questions\">\t\t\t<span class=\"uagb-icon uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M432 256c0 17.69-14.33 32.01-32 32.01H256v144c0 17.69-14.33 31.99-32 31.99s-32-14.3-32-31.99v-144H48c-17.67 0-32-14.32-32-32.01s14.33-31.99 32-31.99H192v-144c0-17.69 14.33-32.01 32-32.01s32 14.32 32 32.01v144h144C417.7 224 432 238.3 432 256z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"uagb-icon-active uagb-faq-icon-wrap\">\n\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox= \"0 0 448 512\"><path d=\"M400 288h-352c-17.69 0-32-14.32-32-32.01s14.31-31.99 32-31.99h352c17.69 0 32 14.3 32 31.99S417.7 288 400 288z\"><\/path><\/svg>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t<span class=\"uagb-question\">Hoe weet ik welke oplossing geschikt is voor mijn bedrijf?<\/span><\/div><div class=\"uagb-faq-content\"><p>Ons team biedt gratis adviesgesprekken om uw huidige installatie te analyseren, uw doelen te begrijpen en de best passende oplossing aan te bevelen - of het nu gaat om apparaatbeheer, training in beveiligingsbewustzijn of automatisering.<\/p><\/div><\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>One Partner, Total Control Our 4-Step Approach An undefeatable plan can\u2019t be one-size-fits-all. It must be custom-made to reflect the unique needs and challenges of your company. Only then can it deliver guaranteed results and long-term success. That\u2019s why this process is not optional &#8211; it\u2019s mandatory for true protection and growth. Who We Work [&hellip;]<\/p>","protected":false},"author":1,"featured_media":3153,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"plain-container","ast-site-content-layout":"normal-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-493","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>HOME - IM CyberSec<\/title>\n<meta name=\"description\" content=\"One Partner, Total Control. 360\u00b0 Endpoint &amp; Security Management at IM CyberSec. Creating Undefeatable Strategies For Over 20 Years And...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/im-cybersec.com\/nl\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HOME - IM CyberSec\" \/>\n<meta property=\"og:description\" content=\"One Partner, Total Control. 360\u00b0 Endpoint &amp; Security Management at IM CyberSec. Creating Undefeatable Strategies For Over 20 Years And...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/im-cybersec.com\/nl\/\" \/>\n<meta property=\"og:site_name\" content=\"IM CyberSec\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-27T12:09:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/im-cybersec.com\/\",\"url\":\"https:\/\/im-cybersec.com\/\",\"name\":\"HOME - IM CyberSec\",\"isPartOf\":{\"@id\":\"https:\/\/im-cybersec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/im-cybersec.com\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/im-cybersec.com\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\",\"datePublished\":\"2025-08-19T06:54:50+00:00\",\"dateModified\":\"2026-03-27T12:09:29+00:00\",\"description\":\"One Partner, Total Control. 360\u00b0 Endpoint & Security Management at IM CyberSec. Creating Undefeatable Strategies For Over 20 Years And...\",\"breadcrumb\":{\"@id\":\"https:\/\/im-cybersec.com\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/im-cybersec.com\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/im-cybersec.com\/#primaryimage\",\"url\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\",\"contentUrl\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\",\"width\":2560,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/im-cybersec.com\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/im-cybersec.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HOME\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/im-cybersec.com\/#website\",\"url\":\"https:\/\/im-cybersec.com\/\",\"name\":\"IM CyberSec\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/im-cybersec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HOME - IM CyberSec","description":"One Partner, Total Control. 360\u00b0 Endpoint & Security Management at IM CyberSec. Creating Undefeatable Strategies For Over 20 Years And...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/im-cybersec.com\/nl\/","og_locale":"nl_NL","og_type":"article","og_title":"HOME - IM CyberSec","og_description":"One Partner, Total Control. 360\u00b0 Endpoint & Security Management at IM CyberSec. Creating Undefeatable Strategies For Over 20 Years And...","og_url":"https:\/\/im-cybersec.com\/nl\/","og_site_name":"IM CyberSec","article_modified_time":"2026-03-27T12:09:29+00:00","og_image":[{"width":2560,"height":2560,"url":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Geschatte leestijd":"8 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/im-cybersec.com\/","url":"https:\/\/im-cybersec.com\/","name":"HOME - IM CyberSec","isPartOf":{"@id":"https:\/\/im-cybersec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/im-cybersec.com\/#primaryimage"},"image":{"@id":"https:\/\/im-cybersec.com\/#primaryimage"},"thumbnailUrl":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","datePublished":"2025-08-19T06:54:50+00:00","dateModified":"2026-03-27T12:09:29+00:00","description":"One Partner, Total Control. 360\u00b0 Endpoint & Security Management at IM CyberSec. Creating Undefeatable Strategies For Over 20 Years And...","breadcrumb":{"@id":"https:\/\/im-cybersec.com\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/im-cybersec.com\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/im-cybersec.com\/#primaryimage","url":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","contentUrl":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","width":2560,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/im-cybersec.com\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/im-cybersec.com\/"},{"@type":"ListItem","position":2,"name":"HOME"}]},{"@type":"WebSite","@id":"https:\/\/im-cybersec.com\/#website","url":"https:\/\/im-cybersec.com\/","name":"IM CyberSec","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/im-cybersec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"}]}},"uagb_featured_image_src":{"full":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png",2560,2560,false],"thumbnail":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-150x150.png",150,150,true],"medium":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-300x300.png",300,300,true],"medium_large":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-768x768.png",768,768,true],"large":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-1024x1024.png",1024,1024,true],"1536x1536":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-1536x1536.png",1536,1536,true],"2048x2048":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-2048x2048.png",2048,2048,true],"trp-custom-language-flag":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-12x12.png",12,12,true]},"uagb_author_info":{"display_name":"anita.xd@yahoo.com","author_link":"https:\/\/im-cybersec.com\/nl\/author\/anita-xdyahoo-com\/"},"uagb_comment_info":0,"uagb_excerpt":"One Partner, Total Control Our 4-Step Approach An undefeatable plan can\u2019t be one-size-fits-all. It must be custom-made to reflect the unique needs and challenges of your company. Only then can it deliver guaranteed results and long-term success. That\u2019s why this process is not optional &#8211; it\u2019s mandatory for true protection and growth. Who We Work&hellip;","_links":{"self":[{"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/pages\/493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/comments?post=493"}],"version-history":[{"count":244,"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/pages\/493\/revisions"}],"predecessor-version":[{"id":3465,"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/pages\/493\/revisions\/3465"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/media\/3153"}],"wp:attachment":[{"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/media?parent=493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}