{"id":22164,"date":"2020-10-13T09:29:08","date_gmt":"2020-10-13T07:29:08","guid":{"rendered":"https:\/\/xitaso.com\/?page_id=22164"},"modified":"2026-04-07T12:27:04","modified_gmt":"2026-04-07T10:27:04","slug":"ausecus-it-security-through-kritis-defender","status":"publish","type":"page","link":"https:\/\/xitaso.com\/en\/projects\/ausecus-it-security-through-kritis-defender\/","title":{"rendered":"ausecus &#8211; IT security through KRITIS Defender"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; el_class=&#8221;header_level2_container&#8221;][vc_column][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221; css=&#8221;.vc_custom_1719920580594{background-image: url(https:\/\/xitaso.com\/wp-content\/uploads\/ausecus_Header_2-3.jpg?id=17650) !important;}&#8221;][vc_column_inner offset=&#8221;vc_hidden-xs&#8221;][vc_empty_space height=&#8221;500&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_single_image image=&#8221;28657&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221; qode_css_animation=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][vc_raw_html css=&#8221;&#8221;]JTNDZGl2JTIwY2xhc3MlM0QlMjJoZWFkZXJfbGV2ZWwyJTIyJTNFJTBBJTNDZGl2JTIwY2xhc3MlM0QlMjJ0b3BwZXIlMjIlM0VJbnRydXNpb24lMjBEZXRlY3Rpb24lMjBTeXN0ZW0lMjBoZWxwcyUyMHdpdGglMjBpbmNyZWFzaW5nJTIwY3liZXJhdHRhY2tzJTNDJTJGZGl2JTNFJTBBJTNDaDElM0VJVCUyMHNlY3VyaXR5JTIwdGhyb3VnaCUyMEtSSVRJUyUyMERlZmVuZGVyJTNDJTJGaDElM0UlMEElM0MlMkZkaXYlM0UlMEElMEE=[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css=&#8221;.vc_custom_1719920882793{background-color: #e8e0e0 !important;}&#8221; z_index=&#8221;&#8221;][vc_column][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space height=&#8221;60&#8243;][vc_column_text]<\/p>\n<h2>The challenge<\/h2>\n<p>Public utilities or energy suppliers are considered \u201ccritical infrastructures\u201d once they supply a certain number of households. They are a special focus of potential cyberattacks. The IT security act of <a class=\"extern\" href=\"https:\/\/www.bsi.bund.de\/DE\/Home\/home_node.html\" target=\"_blank\" rel=\"noopener noreferrer\">Federal Office for Information Security (BSI)<\/a>\u00a0therefore requires the IT systems employed to be especially secured and that attacks must be reported.[\/vc_column_text][vc_empty_space height=&#8221;30&#8243;][vc_column_text]<\/p>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<h2>ausecus GmbH<\/h2>\n<\/div>\n<\/div>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p><a class=\"extern\" href=\"https:\/\/www.ausecus.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ausecus<\/a> is a consulting company for IT security, penetration testing, consulting and services for the ISMS introduction of ISO 27001 in critical infrastructures.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;10&#8243;][vc_single_image image=&#8221;10574&#8243; img_size=&#8221;full&#8221; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; css=&#8221;.vc_custom_1622810470043{padding-right: 50% !important;}&#8221; qode_css_animation=&#8221;&#8221; link=&#8221;https:\/\/www.ausecus.com\/&#8221;][vc_empty_space height=&#8221;30&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space height=&#8221;30px&#8221;][vc_empty_space height=&#8221;30&#8243; el_class=&#8221;not-on-mobile&#8221;][vc_column_text]<\/p>\n<h2>How we helped<\/h2>\n<p>In 2019, XITASO developed a user interface for end users which allowed an Intrusion Detection System (IDS) to be configured precisely and meant notifications could be swiftly processed. The system can be used to identify suspicious operations at an early stage, which will then be repelled and archived for audits. Particular emphasis was placed on high levels of clarity and intuitive operation from the user\u2019s side.[\/vc_column_text][vc_empty_space height=&#8221;30&#8243;][vc_column_text]<\/p>\n<h2>Technologies<\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;15&#8243;][vc_raw_html]JTNDc3BhbiUyMGNsYXNzJTNEJTIydGVjaG5vbG9naWVuJTIyJTNFU2lnbmFsUiUzQyUyRnNwYW4lM0UlMEElM0NzcGFuJTIwY2xhc3MlM0QlMjJ0ZWNobm9sb2dpZW4lMjIlM0VBbmd1bGFyJTNDJTJGc3BhbiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnRlY2hub2xvZ2llbiUyMiUzRUFTUC5ORVQlMjBDb3JlJTNDJTJGc3BhbiUzRQ==[\/vc_raw_html][vc_empty_space height=&#8221;60&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221;][vc_column][vc_empty_space height=&#8221;30&#8243; el_class=&#8221;not-on-mobile&#8221;][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; el_class=&#8221;two-column-with-heading-on-top&#8221; z_index=&#8221;&#8221;][vc_column][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][vc_column_text]<\/p>\n<h2>KRITIS Defender<\/h2>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]The dashboard shows an overview of events per event level (alarms, critical alerts, info). Diagrams also visualize the top five hosts and the load of the process networks.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]The receipt notes are stored audit-secure for later traceability. In a separate UI, complex rule sets can be generated and then uploaded to the KRITIS Defender.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221;][vc_column][vc_empty_space height=&#8221;50&#8243; el_class=&#8221;not-on-mobile&#8221;][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221;][vc_column][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][vc_single_image image=&#8221;15909&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; qode_css_animation=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221;][vc_column][vc_empty_space height=&#8221;50&#8243; el_class=&#8221;not-on-mobile&#8221;][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221;][vc_column][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][vc_column_text]<\/p>\n<p style=\"text-align: center;\">In the reduced view only the system status (red, yellow, green) is displayed. An animation underlines the urgency.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; el_class=&#8221;three-column-references&#8221;][vc_column][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_empty_space height=&#8221;250&#8243; image_repeat=&#8221;no-repeat&#8221; background_image=&#8221;14309&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_empty_space height=&#8221;250&#8243; image_repeat=&#8221;no-repeat&#8221; background_image=&#8221;14311&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_empty_space height=&#8221;250&#8243; image_repeat=&#8221;no-repeat&#8221; background_image=&#8221;14313&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221;][vc_column][vc_empty_space height=&#8221;100&#8243; el_class=&#8221;not-on-mobile&#8221;][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221;][vc_column][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][vc_single_image image=&#8221;15905&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; qode_css_animation=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221;][vc_column][vc_empty_space height=&#8221;30&#8243;][vc_empty_space height=&#8221;20&#8243; el_class=&#8221;not-on-mobile&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221;][vc_column][vc_empty_space height=&#8221;50&#8243;][vc_column_text]<\/p>\n<h2 style=\"text-align: center;\">Other projects<\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;40&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; el_class=&#8221;three-column-references&#8221;][vc_column][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_raw_html]JTNDYSUyMGhyZWYlM0QlMjIlMkZlbiUyRnByb2plY3RzJTJGdmlzdWZpdC0xMDAwLWRpZ2l0YWwtZmFjZS1hbmQtY2VudGVyaW5nLWRhdGEtYWNxdWlzaXRpb24lMkYlMjIlM0U=[\/vc_raw_html][vc_empty_space height=&#8221;250&#8243; image_repeat=&#8221;no-repeat&#8221; background_image=&#8221;17672&#8243;][vc_column_text]<\/p>\n<div class=\"referenz_kunde\">ZEISS<\/div>\n<h3>Digital face and centering data acquisition<\/h3>\n<p>[\/vc_column_text][vc_raw_html]JTNDJTJGYSUzRQ==[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_raw_html]JTNDYSUyMGhyZWYlM0QlMjIlMkZlbiUyRnByb2plY3RzJTJGa2xpbmlrdW0tcmVjaHRzLWRlci1pc2FyLW1yaS1mbGV4cGxhbiUyRiUyMiUzRQ==[\/vc_raw_html][vc_empty_space height=&#8221;250&#8243; image_repeat=&#8221;no-repeat&#8221; background_image=&#8221;14790&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<div class=\"referenz_kunde\">Klinikum Rechts der Isar (MRI)<\/div>\n<h3>Automated schedule and daily planning<\/h3>\n<p>[\/vc_column_text][vc_raw_html]JTNDJTJGYSUzRQ==[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_raw_html]JTNDYSUyMGhyZWYlM0QlMjIlMkZlbiUyRnByb2plY3RzJTJGd2l0dGVuc3RlaW4tYWZ0ZXItc2FsZXMtcG9ydGFsJTJGJTIyJTNF[\/vc_raw_html][vc_empty_space height=&#8221;250&#8243; image_repeat=&#8221;no-repeat&#8221; background_image=&#8221;17619&#8243;][vc_column_text]<\/p>\n<div class=\"referenz_kunde\">WITTENSTEIN<\/div>\n<h3>After-Sales-Portal for product identification<\/h3>\n<p>[\/vc_column_text][vc_raw_html]JTNDJTJGYSUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221;][vc_column][vc_empty_space height=&#8221;30&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: center;\"><a class=\"mitPfeil\" href=\"\/en\/projects\">View all projects<\/a><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221;][vc_column][vc_empty_space height=&#8221;50&#8243; el_class=&#8221;not-on-mobile&#8221;][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; el_class=&#8221;your-contact-person&#8221; css=&#8221;.vc_custom_1719920895672{background-color: #e8e0e0 !important;}&#8221;][vc_column][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][vc_column_text]<\/p>\n<h2 style=\"text-align: center;\">Are you interested in a project, a service or do you have another question?<\/h2>\n<p>[\/vc_column_text][vc_single_image image=&#8221;90352&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221; qode_css_animation=&#8221;&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p style=\"text-align: center;\"><strong>Dr. Michael Schackert<\/strong><\/p>\n<p style=\"text-align: center;\">Tel. +49 821 885 882 36<br \/>\n<a href=\"mailto:michael.schackert@xitaso.com\">michael.schackert@xitaso.com<\/a><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; el_class=&#8221;header_level2_container&#8221;][vc_column][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221; css=&#8221;.vc_custom_1719920580594{background-image: url(https:\/\/xitaso.com\/wp-content\/uploads\/ausecus_Header_2-3.jpg?id=17650) !important;}&#8221;][vc_column_inner offset=&#8221;vc_hidden-xs&#8221;][vc_empty_space height=&#8221;500&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_single_image image=&#8221;28657&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221; qode_css_animation=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][vc_raw_html css=&#8221;&#8221;]JTNDZGl2JTIwY2xhc3MlM0QlMjJoZWFkZXJfbGV2ZWwyJTIyJTNFJTBBJTNDZGl2JTIwY2xhc3MlM0QlMjJ0b3BwZXIlMjIlM0VJbnRydXNpb24lMjBEZXRlY3Rpb24lMjBTeXN0ZW0lMjBoZWxwcyUyMHdpdGglMjBpbmNyZWFzaW5nJTIwY3liZXJhdHRhY2tzJTNDJTJGZGl2JTNFJTBBJTNDaDElM0VJVCUyMHNlY3VyaXR5JTIwdGhyb3VnaCUyMEtSSVRJUyUyMERlZmVuZGVyJTNDJTJGaDElM0UlMEElM0MlMkZkaXYlM0UlMEElMEE=[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css=&#8221;.vc_custom_1719920882793{background-color: #e8e0e0 !important;}&#8221;&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":22122,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full_width.php","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-22164","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ausecus - IT security through KRITIS Defender &#060; XITASO<\/title>\n<meta name=\"description\" content=\"&quot;Critical infrastructures&quot; are the focus of cyberattacks. KRITIS Defender increases IT security through efficient monitoring.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xitaso.com\/en\/projects\/ausecus-it-security-through-kritis-defender\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ausecus - IT security through KRITIS Defender &#060; XITASO\" \/>\n<meta property=\"og:description\" content=\"&quot;Critical infrastructures&quot; are the focus of cyberattacks. KRITIS Defender increases IT security through efficient monitoring.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xitaso.com\/en\/projects\/ausecus-it-security-through-kritis-defender\/\" \/>\n<meta property=\"og:site_name\" content=\"XITASO\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XITASOGmbH\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T10:27:04+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@xitasogmbh\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xitaso.com\\\/en\\\/projects\\\/ausecus-it-security-through-kritis-defender\\\/\",\"url\":\"https:\\\/\\\/xitaso.com\\\/en\\\/projects\\\/ausecus-it-security-through-kritis-defender\\\/\",\"name\":\"ausecus - IT security through KRITIS Defender &#060; XITASO\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xitaso.com\\\/#website\"},\"datePublished\":\"2020-10-13T07:29:08+00:00\",\"dateModified\":\"2026-04-07T10:27:04+00:00\",\"description\":\"\\\"Critical infrastructures\\\" are the focus of cyberattacks. KRITIS Defender increases IT security through efficient monitoring.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xitaso.com\\\/en\\\/projects\\\/ausecus-it-security-through-kritis-defender\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xitaso.com\\\/en\\\/projects\\\/ausecus-it-security-through-kritis-defender\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xitaso.com\\\/en\\\/projects\\\/ausecus-it-security-through-kritis-defender\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/xitaso.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Projects\",\"item\":\"https:\\\/\\\/xitaso.com\\\/en\\\/projects\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ausecus &#8211; IT security through KRITIS Defender\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xitaso.com\\\/#website\",\"url\":\"https:\\\/\\\/xitaso.com\\\/\",\"name\":\"XITASO\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xitaso.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xitaso.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xitaso.com\\\/#organization\",\"name\":\"XITASO GmbH\",\"url\":\"https:\\\/\\\/xitaso.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xitaso.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xitaso.com\\\/wp-content\\\/uploads\\\/XITASO-Logo-quer.png\",\"contentUrl\":\"https:\\\/\\\/xitaso.com\\\/wp-content\\\/uploads\\\/XITASO-Logo-quer.png\",\"width\":1746,\"height\":438,\"caption\":\"XITASO GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/xitaso.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XITASOGmbH\\\/\",\"https:\\\/\\\/x.com\\\/xitasogmbh\",\"https:\\\/\\\/www.linkedin.com\\\/organization-guest\\\/company\\\/xitasogmbh\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCQ4Qjq-Pr58NjGVLryNEuyA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ausecus - IT security through KRITIS Defender &#060; XITASO","description":"\"Critical infrastructures\" are the focus of cyberattacks. KRITIS Defender increases IT security through efficient monitoring.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xitaso.com\/en\/projects\/ausecus-it-security-through-kritis-defender\/","og_locale":"en_US","og_type":"article","og_title":"ausecus - IT security through KRITIS Defender &#060; XITASO","og_description":"\"Critical infrastructures\" are the focus of cyberattacks. KRITIS Defender increases IT security through efficient monitoring.","og_url":"https:\/\/xitaso.com\/en\/projects\/ausecus-it-security-through-kritis-defender\/","og_site_name":"XITASO","article_publisher":"https:\/\/www.facebook.com\/XITASOGmbH\/","article_modified_time":"2026-04-07T10:27:04+00:00","twitter_card":"summary_large_image","twitter_site":"@xitasogmbh","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/xitaso.com\/en\/projects\/ausecus-it-security-through-kritis-defender\/","url":"https:\/\/xitaso.com\/en\/projects\/ausecus-it-security-through-kritis-defender\/","name":"ausecus - IT security through KRITIS Defender &#060; XITASO","isPartOf":{"@id":"https:\/\/xitaso.com\/#website"},"datePublished":"2020-10-13T07:29:08+00:00","dateModified":"2026-04-07T10:27:04+00:00","description":"\"Critical infrastructures\" are the focus of cyberattacks. KRITIS Defender increases IT security through efficient monitoring.","breadcrumb":{"@id":"https:\/\/xitaso.com\/en\/projects\/ausecus-it-security-through-kritis-defender\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xitaso.com\/en\/projects\/ausecus-it-security-through-kritis-defender\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xitaso.com\/en\/projects\/ausecus-it-security-through-kritis-defender\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/xitaso.com\/en\/"},{"@type":"ListItem","position":2,"name":"Projects","item":"https:\/\/xitaso.com\/en\/projects\/"},{"@type":"ListItem","position":3,"name":"ausecus &#8211; IT security through KRITIS Defender"}]},{"@type":"WebSite","@id":"https:\/\/xitaso.com\/#website","url":"https:\/\/xitaso.com\/","name":"XITASO","description":"","publisher":{"@id":"https:\/\/xitaso.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xitaso.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xitaso.com\/#organization","name":"XITASO GmbH","url":"https:\/\/xitaso.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xitaso.com\/#\/schema\/logo\/image\/","url":"https:\/\/xitaso.com\/wp-content\/uploads\/XITASO-Logo-quer.png","contentUrl":"https:\/\/xitaso.com\/wp-content\/uploads\/XITASO-Logo-quer.png","width":1746,"height":438,"caption":"XITASO GmbH"},"image":{"@id":"https:\/\/xitaso.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XITASOGmbH\/","https:\/\/x.com\/xitasogmbh","https:\/\/www.linkedin.com\/organization-guest\/company\/xitasogmbh","https:\/\/www.youtube.com\/channel\/UCQ4Qjq-Pr58NjGVLryNEuyA"]}]}},"_links":{"self":[{"href":"https:\/\/xitaso.com\/en\/wp-json\/wp\/v2\/pages\/22164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xitaso.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/xitaso.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/xitaso.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/xitaso.com\/en\/wp-json\/wp\/v2\/comments?post=22164"}],"version-history":[{"count":2,"href":"https:\/\/xitaso.com\/en\/wp-json\/wp\/v2\/pages\/22164\/revisions"}],"predecessor-version":[{"id":101901,"href":"https:\/\/xitaso.com\/en\/wp-json\/wp\/v2\/pages\/22164\/revisions\/101901"}],"up":[{"embeddable":true,"href":"https:\/\/xitaso.com\/en\/wp-json\/wp\/v2\/pages\/22122"}],"wp:attachment":[{"href":"https:\/\/xitaso.com\/en\/wp-json\/wp\/v2\/media?parent=22164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}