{"version":"1.0","provider_name":"KYOS","provider_url":"https:\/\/www.kyos.ch\/de\/","title":"Endpoint - KYOS","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"KGbUWcUuu2\"><a href=\"https:\/\/www.kyos.ch\/de\/sicherheitslosungen\/end-points\/\">Endpoint<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.kyos.ch\/de\/sicherheitslosungen\/end-points\/embed\/#?secret=KGbUWcUuu2\" width=\"600\" height=\"338\" title=\"&#8222;Endpoint&#8220; &#8211; KYOS\" data-secret=\"KGbUWcUuu2\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.kyos.ch\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Main Menu Audit und Penetrationstest Identit\u00e4t und Zugriff Perimeter und Inhalt Endpoint Security Daten und Verschl\u00fcsselung Ausbildung Ereignis Management Endpoint Security War fr\u00fcher der Einsatz eines einfachen Virenschutzes ausreichend, so ist der Schutz von Benutzer-Workstations und mobilen Endger\u00e4ten zu einem kritischen Punkt der IT-Sicherheit geworden. Die Entwicklung der Mobilit\u00e4t, der mobilen Endger\u00e4te wie Smartphones und [&hellip;]"}