{"id":115347,"date":"2021-03-10T12:43:29","date_gmt":"2021-03-10T17:43:29","guid":{"rendered":"https:\/\/www.een.com\/cybersecurity-ressourcen\/"},"modified":"2021-03-11T09:13:11","modified_gmt":"2021-03-11T14:13:11","slug":"cybersecurity-ressourcen","status":"publish","type":"page","link":"https:\/\/www.een.com\/de\/cybersecurity-ressourcen\/","title":{"rendered":"Eagle Eye Networks Cybersecurity-Ressourcen"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"115347\" class=\"elementor elementor-115347 elementor-115180\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-206122fa elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"206122fa\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-202a6d8f\" data-id=\"202a6d8f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-386191e1 elementor-widget elementor-widget-heading\" data-id=\"386191e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Ressourcen zur Cybersicherheit\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30d0c6f3 elementor-widget elementor-widget-text-editor\" data-id=\"30d0c6f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6005711 elementor-widget elementor-widget-text-editor\" data-id=\"6005711\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-text-editor elementor-clearfix\">\n<p dir=\"ltr\">Cybersecurity liegt in der DNA von Eagle Eye Networks. Seit unserer Gr\u00fcndung hat Eagle Eye Networks erhebliche Ressourcen in den Aufbau und die Aufrechterhaltung eines sehr hohen Niveaus an Cybersicherheit gesteckt. Im Folgenden finden Sie Ressourcen, die Sie bei der Implementierung unserer sicheren Cloud-Video\u00fcberwachungsl\u00f6sung unterst\u00fctzen.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5c1c2a09\" data-id=\"5c1c2a09\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1776af84 elementor-widget elementor-widget-image\" data-id=\"1776af84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"846\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/camera-cybersecurity-v2-1024x846.png\" class=\"attachment-large size-large wp-image-115255\" alt=\"security camera cybersecurity\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/camera-cybersecurity-v2-1024x846.png 1024w, https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/camera-cybersecurity-v2-300x248.png 300w, https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/camera-cybersecurity-v2.png 1129w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-58165f60 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"58165f60\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-79a90a1b\" data-id=\"79a90a1b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-39ea622 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"39ea622\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3ac8f51\" data-id=\"3ac8f51\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e43948 elementor-widget elementor-widget-text-editor\" data-id=\"3e43948\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>WHITEPAPER<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed7f296 elementor-widget elementor-widget-text-editor\" data-id=\"ed7f296\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #606e81;\">Cybersicherheit und Cloud-Videoueberwachung<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdcb9f4 elementor-widget elementor-widget-text-editor\" data-id=\"fdcb9f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-size: 16px; font-style: normal; font-weight: 400;\">Die Sicherheit von Video\u00fcberwachungssystemen kann und sollte innerhalb der Branche umfassender behandelt werden, damit die Cybersicherheit nicht als Problem f\u00fcr Installateure oder Kunden \u00fcbrig bleibt, das es zu l\u00f6sen gilt. Erfahren Sie, wie Eagle Eye Networks Sicherheitsbedenken von der Produktforschung \u00fcber die Entwicklung bis hin zum Einsatz entsch\u00e4rft.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9f63fc elementor-widget elementor-widget-button\" data-id=\"c9f63fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/Eagle-Eye-Networks-Cyber-Security-and-Cloud-Video-Surveillance-Whitepaper-20210308.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Jetzt lesen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8672a64\" data-id=\"8672a64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d3711b elementor-widget elementor-widget-text-editor\" data-id=\"4d3711b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>WHITEPAPER<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74a8a17 elementor-widget elementor-widget-text-editor\" data-id=\"74a8a17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #606e81;\">Reduzieren Sie Bedrohungen mit Kamera Cyber Sperrfunktion<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e8036a elementor-widget elementor-widget-text-editor\" data-id=\"6e8036a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Eagle Eye Networks hat 2017 die Funktion Eagle Eye Camera Cyber Lockdown ver\u00f6ffentlicht.<span style=\"color: #000000;\">  Diese Funktion isoliert die Kameras vom Internet und sch\u00fctzt vor dem Eindringen von Hackern oder Abh\u00f6rversuchen.<\/span><\/p>\n<div class=\"yj6qo ajU\"> <\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18ef820 elementor-widget elementor-widget-button\" data-id=\"18ef820\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.een.com\/wp-content\/uploads\/2019\/02\/Eagle-Eye-Networks-Camera-Cyber-Lockdown-White-Paper-20190201.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Jetzt lesen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-51c9a8f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"51c9a8f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-57df9bc\" data-id=\"57df9bc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f48419e elementor-widget elementor-widget-text-editor\" data-id=\"f48419e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>BERICHT<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e9457b elementor-widget elementor-widget-text-editor\" data-id=\"7e9457b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #606e81;\">12 bew\u00e4hrte Vorgehensweisen f\u00fcr \u00dcberwachungskamerasysteme<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91403e3 elementor-widget elementor-widget-text-editor\" data-id=\"91403e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-size: 16px; font-style: normal; font-weight: 400;\">Sicherheitskameras sind zunehmend mit dem Internet verbunden, was zum gro\u00dfen Teil auf die Nachfrage der Kunden nach Videofernzugriff zur\u00fcckzuf\u00fchren ist. Angesichts der zunehmenden Zahl von Cyberangriffen m\u00fcssen Integratoren von physischen Sicherheitssystemen und interne Supportmitarbeiter immer auf dem Laufenden bleiben, was Cybersecurity-Angriffsvektoren angeht, die sich auf die von ihnen verkauften und\/oder unterst\u00fctzten Kamera-Videoverwaltungssysteme auswirken k\u00f6nnen.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb53b82 elementor-widget elementor-widget-button\" data-id=\"fb53b82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/12-Best-Practices-White-Paper-20210308-1.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Jetzt lesen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c98cb39\" data-id=\"c98cb39\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56deb8a elementor-widget elementor-widget-text-editor\" data-id=\"56deb8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>UNTERST\u00dcTZUNGSPORTAL<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-896f062 elementor-widget elementor-widget-text-editor\" data-id=\"896f062\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #606e81;\">Aktivieren des Datenschutzmodus<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eda7506 elementor-widget elementor-widget-text-editor\" data-id=\"eda7506\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\" align-left\"><span style=\"color: #000000;\">Der Zweck des Privatsph\u00e4renmodus ist es, den Zugriff auf Ihre Kamerastreams f\u00fcr alle Administratoren, einschlie\u00dflich Wiederverk\u00e4ufer oder Eagle Eye-Mitarbeiter, die auf Ihr Konto zugreifen k\u00f6nnten, zu sperren. Der Privatsph\u00e4renmodus ist eine beliebte Funktion f\u00fcr Kunden, die administrative Hilfe w\u00fcnschen, aber datenschutzrechtliche Bedenken haben, wer das eigentliche Video sehen kann.<\/span><\/p>\n<div class=\"yj6qo ajU\"> <\/div>\n<\/div>\n<div> <\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5102086 elementor-widget elementor-widget-button\" data-id=\"5102086\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/support.een.com\/portal\/en\/kb\/articles\/enabling-privacy-mode-10-3-2021\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Jetzt lesen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Resources Cybersecurity is in Eagle Eye Networks DNA. From our founding, Eagle Eye Networks devoted significant resources to building and maintaining a very high level of cybersecurity. Below you &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/de\/cybersecurity-ressourcen\/\"> <span class=\"screen-reader-text\">Eagle Eye Networks Cybersecurity-Ressourcen<\/span> Weiterlesen &raquo;<\/a><\/p>\n","protected":false},"author":1633,"featured_media":0,"parent":0,"menu_order":431,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"class_list":["post-115347","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/pages\/115347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/users\/1633"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/comments?post=115347"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/pages\/115347\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/media?parent=115347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}