{"id":2335,"date":"2026-01-05T14:44:40","date_gmt":"2026-01-05T13:44:40","guid":{"rendered":"https:\/\/www.bitformer.net\/?page_id=2335"},"modified":"2026-05-05T09:25:28","modified_gmt":"2026-05-05T07:25:28","slug":"cloud-computing","status":"publish","type":"page","link":"https:\/\/www.bitformer.net\/en\/cloud-computing\/","title":{"rendered":"Cloud computing"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2335\" class=\"elementor elementor-2335\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7264766 e-flex e-con-boxed e-con e-parent\" data-id=\"7264766\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/blue-tech-bg.mov&quot;,&quot;background_video_start&quot;:0}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-background-video-container elementor-hidden-mobile\">\n\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t<\/div><div class=\"elementor-element elementor-element-4b70b60 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"4b70b60\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a89e4f elementor-align-left elementor-widget elementor-widget-raven-breadcrumbs\" data-id=\"5a89e4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"raven-breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"raven-breadcrumbs raven-breadcrumbs-default\"><div class=\"breadcrumb\">\t\t\t\t\t\t\t\t<div class=\"breadcrumb-item active\" aria-current=\"page\"><span>Home<\/span><\/div>\n\n\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a0952f elementor-widget elementor-widget-heading\" data-id=\"3a0952f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cloud computing<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe4b46a elementor-widget elementor-widget-heading\" data-id=\"fe4b46a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Simple scalability of your IT<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc6152c e-con-full e-flex e-con e-child\" data-id=\"fc6152c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8622888 main-layout-vertical raven-nav-alignment-start pointer-none submenu-anim-fade raven-dropdown-stretch raven-nav-menu-align-flex-start raven-nav-menu-align-center elementor-widget elementor-widget-raven-advanced-nav-menu\" data-id=\"8622888\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;submenu_indicator&quot;:{&quot;value&quot;:&quot;fas fa-angle-down&quot;,&quot;library&quot;:&quot;fa-solid&quot;},&quot;full_width&quot;:&quot;stretch&quot;,&quot;mobile_layout&quot;:&quot;dropdown&quot;,&quot;close_menu_on_scroll&quot;:&quot;yes&quot;}\" data-widget_type=\"raven-advanced-nav-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<!-- Main Menu -->\n\t\t<nav data-layout=\"vertical\" class=\"raven-adnav-menu-main raven-adnav-menu-vertical\">\n\t\t\t\t\t<ul id=\"menu-8622888\" class=\"raven-adnav-menu\">\n\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"#objektsicherheit\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tObject security\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"#ausfallsicherheit\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tResilience\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"#backupstrategie\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tBackup strategy\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"#digitaleangriffe\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tProtection against digital attacks\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/nav>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6c35c34 e-con-full e-flex e-con e-parent\" data-id=\"6c35c34\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b4fb856 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"b4fb856\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-071d918 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"071d918\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Your data. Anytime. Anywhere. Securely available.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a35e0fa elementor-widget elementor-widget-text-editor\" data-id=\"a35e0fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">Cloud computing is long beyond a technological trend \u2013 it is a central building block of modern business strategies. In a dynamic and increasingly digital business world, the cloud enables IT resources to be provided flexibly, scalably and on demand. Companies benefit from greater agility and faster innovation cycles.\u00a0<\/p><p class=\"p1\">By using cloud solutions, applications, data, and systems can be accessed regardless of location or time. At the same time, investment costs for in-house infrastructure are reduced, while maintenance and operation are increasingly handled by specialised providers.\u00a0<\/p><p class=\"p1\">We support you in optimally leveraging the potential of cloud computing \u2013 from developing a suitable cloud strategy and secure migration to operating and continuously optimising your cloud environment. This way, you create a future-proof IT foundation that grows with your requirements.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e7821b0 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"e7821b0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17ab4f3 elementor-widget elementor-widget-image\" data-id=\"17ab4f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"572\" src=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/server-room-data-center-futuristic-cyberpunk-style-1024x572.png\" class=\"attachment-large size-large wp-image-5414\" alt=\"\" srcset=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/server-room-data-center-futuristic-cyberpunk-style-1024x572.png 1024w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/server-room-data-center-futuristic-cyberpunk-style-300x167.png 300w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/server-room-data-center-futuristic-cyberpunk-style-768x429.png 768w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/server-room-data-center-futuristic-cyberpunk-style-1536x857.png 1536w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/server-room-data-center-futuristic-cyberpunk-style-2048x1143.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3a156a5 e-flex e-con-boxed e-con e-parent\" data-id=\"3a156a5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-232e81a elementor-widget elementor-widget-text-editor\" data-id=\"232e81a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">Your IT should be as flexible as your business.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2bfc507 e-flex e-con-boxed e-con e-parent\" data-id=\"2bfc507\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a25eda0 elementor-widget elementor-widget-text-editor\" data-id=\"a25eda0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The various components of a security strategy that companies must consider \u2013 regardless of whether they store data locally or work with a cloud solution.<\/p><p>In addition to the aspects mentioned here, rights management (access control) and a data protection concept are also essential components of a comprehensive security concept. However, as these are conceptual issues where the location of the software and data makes no significant difference, rights management and data protection are not discussed in the following comparison.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-167ed21 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"167ed21\" data-element_type=\"container\" data-e-type=\"container\" id=\"objektsicherheit\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-62b649e elementor-widget elementor-widget-menu-anchor\" data-id=\"62b649e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"objektsicherheit\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-77356a0 e-con-full e-flex e-con e-child\" data-id=\"77356a0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4a1f7c elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"e4a1f7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1. Object security \/ Physical protection<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c9e1d6 e-con-full e-flex e-con e-child\" data-id=\"4c9e1d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9098bbf elementor-widget elementor-widget-text-editor\" data-id=\"9098bbf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Protecting one's own IT infrastructure also includes physical site security \u2013 whether against theft, vandalism, or sabotage.<\/p><p>If an attacker gains access to the server room, and therefore gets behind the firewall, it becomes significantly easier to carry out attacks on a company's IT infrastructure, such as deploying malware or intercepting network traffic.<\/p><p>Modern cloud data centres boast a first-class security concept for their server rooms, encompassing access control and intrusion detection. Measures such as mechanical protection, video surveillance, the \"four-eyes\" principle, 24\/7 security personnel, and strict controls at critical access points are exemplarily implemented in large data centres.<\/p><p>Additionally, they ensure:<\/p><ul><li>Permanent monitoring of the room temperature in the server rooms<\/li><li>Protection of all hardware components from overvoltage<\/li><li>Protection against technical damage such as fire, water damage, CO2 etc.<\/li><\/ul><p>The probability of data centres falling victim to burglary and corporate data being lost in this way is extremely low.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-701842b e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"701842b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a2ca87 elementor-widget elementor-widget-menu-anchor\" data-id=\"0a2ca87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"ausfallsicherheit\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c4b8e51 e-con-full e-flex e-con e-child\" data-id=\"c4b8e51\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb67a37 elementor-widget elementor-widget-text-editor\" data-id=\"cb67a37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Events such as power outages, network failures, hardware defects or fires can affect a company at any time and should not be underestimated. Security therefore also means being prepared for such scenarios. What happens if a company's ERP system fails on a Monday morning \u2013 for example, after a power outage or hardware defect? The webshop is offline, production is at a standstill, and every hour of downtime increases both the financial and image damage.<\/p><p>If a scenario such as a hardware or power failure does not affect ongoing operations, it is referred to as a highly available, fault-tolerant system.<\/p><p><strong>Resilience and High Availability in the Cloud<\/strong><\/p><p>High availability means that all components, as well as the entire IT infrastructure, must be present at least twice. This includes:<\/p><ul><li>Redundant hardware that is spatially separated<\/li><li>Two separate power lines on different routes<\/li><li>Two independent network connections<\/li><\/ul><p>Modern data centres are designed to fulfil this principle of highly available IT infrastructure. Here are some of the most important measures:<\/p><ul><li>All necessary redundancies are standard.<\/li><li>24\/7 administrators for emergency interventions.<\/li><li>Division into different fire compartments to ensure high availability even in the event of a fire.<\/li><li>Geo-redundancy, providing IT infrastructure at two different, distant locations.<\/li><\/ul><p>For most businesses, high availability via the cloud is significantly easier and more cost-effective to achieve. The necessary expertise for design and operation is considerable, and implementing geo-redundancy is definitely too complex and expensive.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ba592e e-con-full e-flex e-con e-child\" data-id=\"7ba592e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5c4b6d elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"b5c4b6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2. Resilience and High Availability<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a13db34 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"a13db34\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9ed84a1 elementor-widget elementor-widget-menu-anchor\" data-id=\"9ed84a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"backupstrategie\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3ef7d57 e-con-full e-flex e-con e-child\" data-id=\"3ef7d57\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e5d9e87 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"e5d9e87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3. Backup Strategy and Disaster Recovery<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a36988 e-con-full e-flex e-con e-child\" data-id=\"5a36988\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-526b5fa elementor-widget elementor-widget-text-editor\" data-id=\"526b5fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">If data is corrupted in the production system \u2013 for example, by malware, faulty updates, or hardware issues \u2013 an IT infrastructure with mirrored architecture alone is not sufficient. This is because faulty or manipulated data is often automatically replicated in such systems as well. This is precisely where a well-thought-out backup strategy becomes crucial.<\/p><p class=\"p1\">In an emergency, IT must be able to quickly access a clean backup and restore systems \u2013 ideally within 24 to 48 hours.\u00a0<\/p><p class=\"p1\">The actual time taken for recovery depends heavily on the extent of the damage. In addition to restoring data, it may be necessary to replace defective hardware \u2013 which costs time if suitable spare parts are not available. Companies that rely on quick response times often invest in maintenance contracts with guaranteed spare part provision.<\/p><p class=\"p1\">The fact is: a full recovery within two days is demanding. This requires not only the right technology but also clear processes, regular testing, and experienced specialists. Only then can a quick and controlled response be made in an emergency.<\/p><p>\u00a0<\/p><p><strong>Cloud Backup Strategy and Disaster Recovery<\/strong><\/p><p>In cloud data centres, the necessary redundancies and specialised system administrators are in place from the outset. Data is synchronised in real-time and geo-redundantly. Therefore, in the event of a failure, it is often just a routine procedure to restore a backup from before the critical event.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-84df00e e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"84df00e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f5ec893 elementor-widget elementor-widget-menu-anchor\" data-id=\"f5ec893\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"digitaleangriffe\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0f69614 e-con-full e-flex e-con e-child\" data-id=\"0f69614\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9a28dcf elementor-widget elementor-widget-text-editor\" data-id=\"9a28dcf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Unlike the first three scenarios, which are relatively rare, digital attacks on companies and their IT infrastructure occur several times a day. Effective protection against this threat comprises three main measures:<\/p><ul><li>A secure network and firewall<\/li><li>Regularly closing security vulnerabilities and updating.<\/li><li>Protective measures against social engineering<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3f028a3 e-con-full e-flex e-con e-child\" data-id=\"3f028a3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4eedb31 elementor-widget elementor-widget-raven-advanced-accordion\" data-id=\"4eedb31\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;collapsible&quot;:&quot;false&quot;,&quot;scroll_to_content&quot;:&quot;false&quot;}\" data-widget_type=\"raven-advanced-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div id=\"jupiterx-advanced-accordion-wrapper\" class=\"jupiterx-advanced-accordion-wrapper\">\n\t\t\t\t<div class=\"jupiterx-advanced-accordion-inner-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-first  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">4.1 Firewall<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p>The correct configuration of a firewall is crucial and requires a lot of experience and expertise, especially when company employees also work remotely or from home via VPN. In cloud data centres, network technicians and system administrators are on hand around the clock. This allows a cloud provider to detect and block unusual data streams more quickly. Access via VPN from external networks is handled more restrictively in data centres, or user-specific firewalls are set up and maintained.<\/p><p>Companies that prefer an on-premise solution can achieve this protection with other service providers, but the likelihood of success for a digital attack on the firewall of a cloud data centre is significantly lower.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">4.2 Security updates<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p>It is important to keep your ERP system and IT infrastructure up-to-date for several reasons. Closing security vulnerabilities is a key argument. Companies must be very disciplined and regularly install all updates for all programmes to avoid dangers. In data centres, this happens automatically, which keeps the zero-day vulnerability for cloud applications as low as possible at all times.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-last  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">4.3 Social Engineering<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p>Social engineering attacks aim to identify and exploit employees as a vulnerability. A classic example is \u201etradespeople\u201c who gain temporary access to server rooms. Companies that their <a href=\"https:\/\/www.bitformer.net\/en\/it-security\/sensibilisierung\/\"><span style=\"text-decoration: underline\">Do not continuously raise employee awareness<\/span><\/a>, ..., are particularly susceptible to such attacks. Experiments have shown that a malicious file on a \u201eleft lying around\u201c USB stick can find its way into a company network frighteningly quickly and could cause significant damage. This scenario would be unthinkable in cloud data centres. There, all employees are familiar with the most common social engineering tricks and are regularly trained and made aware.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1525fb elementor-widget elementor-widget-spacer\" data-id=\"c1525fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-075c9ca e-con-full e-flex e-con e-child\" data-id=\"075c9ca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f58d3cf elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"f58d3cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4. Protection against digital attacks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31fa982 elementor-widget elementor-widget-spacer\" data-id=\"31fa982\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0597e0f elementor-widget elementor-widget-image\" data-id=\"0597e0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"340\" height=\"340\" src=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2025\/11\/ISO27001_zertifizierung.png\" class=\"attachment-large size-large wp-image-4447\" alt=\"\" srcset=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2025\/11\/ISO27001_zertifizierung.png 340w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2025\/11\/ISO27001_zertifizierung-300x300.png 300w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2025\/11\/ISO27001_zertifizierung-150x150.png 150w\" sizes=\"(max-width: 340px) 100vw, 340px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b8dd76 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"7b8dd76\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6bac0075 e-con-full e-flex e-con e-child\" data-id=\"6bac0075\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-61df2cba e-con-full e-flex e-con e-child\" data-id=\"61df2cba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7aea3746 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"7aea3746\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Ebene_2\" data-name=\"Ebene 2\" viewbox=\"0 0 450.74 479.34\"><g id=\"Layer_1\" data-name=\"Layer 1\"><path d=\"M71.38,336.58c-39.42,0-71.38,31.96-71.38,71.38s31.96,71.38,71.38,71.38,71.38-31.96,71.38-71.38-31.96-71.38-71.38-71.38ZM225.37,82.76c33.86,0,64.56,12.62,86.83,33.03,22.42,20.54,36.29,48.94,36.29,80.33,0,70.02-44,53.99-44,125.3,0,11.14-6.26,20.88-15.52,26.48v13.6c0,11.34-8.14,21.12-19.08,23.23v8c0,13.09-10.42,24.14-23.47,24.14h-42.09c-13.06,0-23.47-11.05-23.47-24.14v-8c-10.94-2.11-19.08-11.89-19.08-23.23v-13.6c-9.26-5.6-15.52-15.35-15.52-26.48,0-71.3-44-55.28-44-125.3,0-31.38,13.87-59.79,36.29-80.33,22.27-20.41,52.97-33.03,86.83-33.03h0ZM231.75,45.76c0,3.52-2.86,6.38-6.38,6.38s-6.38-2.86-6.38-6.38V6.38c0-3.52,2.86-6.38,6.38-6.38s6.38,2.86,6.38,6.38v39.38ZM356.59,276.56c-3.04-1.76-4.08-5.65-2.32-8.7,1.76-3.04,5.65-4.08,8.7-2.32l34.11,19.69c3.04,1.76,4.08,5.65,2.32,8.7-1.76,3.04-5.65,4.08-8.7,2.32l-34.11-19.69ZM380.93,208.66c-3.52,0-6.38-2.86-6.38-6.38s2.86-6.38,6.38-6.38h39.38c3.52,0,6.38,2.86,6.38,6.38s-2.86,6.38-6.38,6.38h-39.38ZM363.43,129.7c-3.04,1.75-6.92.7-8.67-2.34s-.7-6.92,2.34-8.67l34.11-19.69c3.04-1.75,6.92-.7,8.67,2.34,1.75,3.04.7,6.92-2.34,8.67l-34.11,19.69h0ZM308.83,70.07c-1.75,3.04-5.63,4.09-8.67,2.34s-4.09-5.63-2.34-8.67l19.69-34.11c1.75-3.04,5.63-4.09,8.67-2.34s4.09,5.63,2.34,8.67l-19.69,34.11ZM420.81,366.51c-22.89-22.89-60.01-22.89-82.9,0s-22.89,60.01,0,82.9,60.01,22.89,82.9,0c22.89-22.89,22.89-60.01,0-82.9ZM379.36,336.58c-39.42,0-71.38,31.96-71.38,71.38s31.96,71.38,71.38,71.38,71.38-31.96,71.38-71.38-31.96-71.38-71.38-71.38h0ZM352.54,413.92c-2.77-2.17-3.25-6.18-1.07-8.95,2.17-2.77,6.18-3.25,8.95-1.07l13.91,10.94,23.1-26.69c2.3-2.66,6.32-2.95,8.97-.65s2.95,6.32.65,8.97l-26.84,31.01c-2.24,2.75-6.14,3.36-8.99,1.12l-18.67-14.68h0ZM92.69,422.77c2.49,2.49,2.49,6.53,0,9.02-2.49,2.49-6.53,2.49-9.02,0l-14.81-14.81-14.82,14.82c-2.49,2.49-6.53,2.49-9.02,0s-2.49-6.53,0-9.02l14.82-14.82-14.82-14.82c-2.49-2.49-2.49-6.53,0-9.02,2.49-2.49,6.53-2.49,9.02,0l14.82,14.82,14.81-14.81c2.49-2.49,6.53-2.49,9.02,0,2.49,2.49,2.49,6.53,0,9.02l-14.81,14.81,14.81,14.81ZM231.75,385.14v18.96h14.66c6.05,0,10.71-5.26,10.71-11.38v-7.58h-25.38ZM231.75,352.96v19.42h33.74c5.94,0,10.72-4.9,10.72-10.89v-8.96c-1.81.28-3.67.43-5.57.43h-38.89ZM231.75,95.68v244.52h38.89c11.07,0,21.09-7.92,21.09-18.79,0-76.66,44-61.29,44-125.3,0-27.7-12.27-52.79-32.1-70.96-18.58-17.03-43.82-28.02-71.88-29.47h0Z\" fill=\"#f90\" fill-rule=\"evenodd\"><\/path><\/g><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3dec91d5 elementor-widget elementor-widget-heading\" data-id=\"3dec91d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dba5313 elementor-widget elementor-widget-text-editor\" data-id=\"dba5313\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Based on the four core security aspects, it's clear that security in cloud data centres is exceptionally high. Cloud data centres not only protect their own data, but also that of many companies. This way, all customers benefit from the significant investments in security technology and the necessary redundancies.<\/p><p>Although cloud data centres do not offer 100%percent protection against digital attacks, they significantly reduce the attack surface and can almost completely eliminate the risks shown. To achieve a similarly high security standard, companies would have to expend enormous effort. Therefore, cloud solutions are currently among the safest options available.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b535a1 e-flex e-con-boxed e-con e-parent\" data-id=\"6b535a1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f3f91e elementor-widget elementor-widget-spacer\" data-id=\"8f3f91e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-10117027 e-flex e-con-boxed e-con e-parent\" data-id=\"10117027\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-22537d31 e-con-full e-flex e-con e-child\" data-id=\"22537d31\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-78a671ca elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"78a671ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">YOUR CONTACT PERSON<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52e0ab47 elementor-widget elementor-widget-text-editor\" data-id=\"52e0ab47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Connect with our expert.<br \/>Non-binding, uncomplicated, but always with<br \/>added value for you.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ec0147b e-con-full e-flex e-con e-child\" data-id=\"ec0147b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d75e816 elementor-widget elementor-widget-heading\" data-id=\"7d75e816\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">MAX GIESSLER<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2559c675 elementor-widget elementor-widget-text-editor\" data-id=\"2559c675\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Managing Director of bitformer GmbH<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27b30dbb e-transform elementor-widget elementor-widget-image\" data-id=\"27b30dbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_scale_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0.7,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"821\" height=\"1024\" src=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/maxgiessler1-821x1024.png\" class=\"attachment-large size-large wp-image-7437\" alt=\"\" srcset=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/maxgiessler1-821x1024.png 821w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/maxgiessler1-241x300.png 241w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/maxgiessler1-768x958.png 768w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/maxgiessler1-10x12.png 10w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/maxgiessler1.png 1080w\" sizes=\"(max-width: 821px) 100vw, 821px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5fae0e48 e-con-full e-flex e-con e-child\" data-id=\"5fae0e48\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c1e7a28 elementor-widget elementor-widget-shortcode\" data-id=\"4c1e7a28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-2470 forminator-design--material  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-2470\" data-uid=\"69fc4bebc5af4\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-2470\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-2470 forminator-design--material  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"2470\"\n\t\t\t\t data-color-option=\"theme\" data-design=\"material\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69fc4bebc5af4\" action=\"\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div class=\"forminator-row\"><div id=\"name-3\" class=\"forminator-field-name forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-name-3_69fc4bebc5af4\" id=\"forminator-field-name-3_69fc4bebc5af4-label\" class=\"forminator-label\">Your company <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-3\" value=\"\" placeholder=\"\" id=\"forminator-field-name-3_69fc4bebc5af4\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69fc4bebc5af4\" id=\"forminator-field-name-1_69fc4bebc5af4-label\" class=\"forminator-label\">Your name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"\" id=\"forminator-field-name-1_69fc4bebc5af4\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69fc4bebc5af4\" id=\"forminator-field-email-1_69fc4bebc5af4-label\" class=\"forminator-label\">Email address <span class=\"forminator-required\">*<\/span><\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"\" id=\"forminator-field-email-1_69fc4bebc5af4\" class=\"forminator-input forminator-email--field\" data-required=\"true\" aria-required=\"true\" autocomplete=\"email\" \/><\/div><\/div><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69fc4bebc5af4\" id=\"forminator-field-phone-1_69fc4bebc5af4-label\" class=\"forminator-label\">Phone number<\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"\" id=\"forminator-field-phone-1_69fc4bebc5af4\" class=\"forminator-input forminator-field--phone\" data-required=\"\" aria-required=\"false\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"text-1\" class=\"forminator-field-text forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-text-1_69fc4bebc5af4\" id=\"forminator-field-text-1_69fc4bebc5af4-label\" class=\"forminator-label\">Subject<\/label><input type=\"text\" name=\"text-1\" value=\"\" placeholder=\"\" id=\"forminator-field-text-1_69fc4bebc5af4\" class=\"forminator-input forminator-name--field\" data-required=\"\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69fc4bebc5af4\" id=\"forminator-field-textarea-1_69fc4bebc5af4-label\" class=\"forminator-label\">Message<\/label><textarea name=\"textarea-1\" placeholder=\"\" id=\"forminator-field-textarea-1_69fc4bebc5af4\" class=\"forminator-textarea\" rows=\"6\" style=\"--forminator-textarea-min-height:140px;\" ><\/textarea><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"consent-1\" class=\"forminator-field-consent forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-consent-1_69fc4bebc5af4\" id=\"forminator-field-consent-1_69fc4bebc5af4-label\" class=\"forminator-label\">Consent <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-checkbox__wrapper\"><label id=\"forminator-field-consent-1_69fc4bebc5af4__label\" class=\"forminator-checkbox forminator-consent\"><input type=\"checkbox\" name=\"consent-1\" id=\"forminator-field-consent-1_69fc4bebc5af4\" value=\"checked\" aria-labelledby=\"forminator-field-consent-1_69fc4bebc5af4-label\" aria-describedby=\"forminator-field-consent-1_69fc4bebc5af4__description\" data-required=\"true\" aria-required=\"true\" \/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><\/label><div id=\"forminator-field-consent-1_69fc4bebc5af4__description\" class=\"forminator-checkbox__label forminator-consent__label\"><p>I have the information on <a href=\"\/en\/datenschutz\/\">Data protection<\/a> Read and agree to the processing and storage of my data in the context of case processing.<\/p><\/div><\/div><\/div><\/div><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><div class=\"forminator-row forminator-row-last\"><div class=\"forminator-col\"><div class=\"forminator-field\"><button class=\"forminator-button forminator-button-submit\"><span>Send<\/span><span aria-hidden=\"true\"><\/span><\/button><\/div><\/div><\/div><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"9c75c93b76\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/pages\/2335\" \/><input type=\"hidden\" name=\"form_id\" value=\"2470\"><input type=\"hidden\" name=\"page_id\" value=\"2335\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/www.bitformer.net\/en\/cloud-computing\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><label for=\"input_8\" class=\"forminator-hidden\" aria-hidden=\"true\">Please do not fill in this field. <input id=\"input_8\" type=\"text\" name=\"input_8\" value=\"\" autocomplete=\"off\"><\/label><input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Home Cloud Computing Einfache Skalierbarkeit Ihrer IT Objektsicherheit Ausfallsicherheit Backup-Strategie Schutz vor digitalen Angriffen Ihre Daten. Jederzeit. \u00dcberall. Sicher verf\u00fcgbar. Cloud-Computing ist l\u00e4ngst mehr als ein technologischer Trend \u2013 es ist ein zentraler Baustein moderner Unternehmensstrategien. In einer dynamischen und zunehmend digitalen Gesch\u00e4ftswelt erm\u00f6glicht die Cloud, IT-Ressourcen flexibel, skalierbar und bedarfsgerecht bereitzustellen. Unternehmen profitieren von [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2335","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages\/2335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/comments?post=2335"}],"version-history":[{"count":11,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages\/2335\/revisions"}],"predecessor-version":[{"id":9300,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages\/2335\/revisions\/9300"}],"wp:attachment":[{"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/media?parent=2335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}