{"id":1418,"date":"2025-03-18T21:08:10","date_gmt":"2025-03-18T20:08:10","guid":{"rendered":"https:\/\/pma-it-security.de\/?page_id=1418"},"modified":"2025-04-25T08:08:34","modified_gmt":"2025-04-25T06:08:34","slug":"test-pma-it-security","status":"publish","type":"page","link":"https:\/\/pma-it-security.de\/en\/test-pma-it-security\/","title":{"rendered":"Test-PMA IT-Security"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1418\" class=\"elementor elementor-1418\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a8cf6d8 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"a8cf6d8\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b4941ea elementor-widget elementor-widget-image\" data-id=\"b4941ea\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2025\/03\/P-3.png\" class=\"attachment-large size-large wp-image-1455\" alt=\"\" srcset=\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2025\/03\/P-3.png 500w, https:\/\/pma-it-security.de\/wp-content\/uploads\/2025\/03\/P-3-300x300.png 300w, https:\/\/pma-it-security.de\/wp-content\/uploads\/2025\/03\/P-3-150x150.png 150w, https:\/\/pma-it-security.de\/wp-content\/uploads\/2025\/03\/P-3-12x12.png 12w, https:\/\/pma-it-security.de\/wp-content\/uploads\/2025\/03\/elementor\/thumbs\/P-3-r323wqbpy2qdkp6mklet1s25nufjt43951bopb9fc8.png 100w, https:\/\/pma-it-security.de\/wp-content\/uploads\/2025\/03\/elementor\/thumbs\/P-3-r323wqbtln3oepnttc0be0l8rv2fsdqesf375ip3fk.png 400w, https:\/\/pma-it-security.de\/wp-content\/uploads\/2025\/03\/elementor\/thumbs\/P-3-r323wqbszppglpkylvkqbz6296ymgi4juism2tghf0.png 350w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff3a878 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"ff3a878\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-72a4625 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"72a4625\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-92338b1 eael_simple_menu_hamburger_disable_selected_menu_no eael-simple-menu-hamburger-align-right eael-hamburger--tablet elementor-widget elementor-widget-eael-simple-menu\" data-id=\"92338b1\" data-element_type=\"widget\" data-widget_type=\"eael-simple-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\n                        @media screen and (max-width: 1024px) {\n                            .eael-hamburger--tablet {\n                                .eael-simple-menu-horizontal,\n                                .eael-simple-menu-vertical {\n                                    display: none;\n                                }\n                            }\n                            .eael-hamburger--tablet {\n                                .eael-simple-menu-container .eael-simple-menu-toggle {\n                                    display: block;\n                                }\n                            }\n                        }\n                    <\/style>            <div data-hamburger-icon=\"&lt;svg aria-hidden=&quot;true&quot; class=&quot;e-font-icon-svg e-fas-bars&quot; viewBox=&quot;0 0 448 512&quot; xmlns=&quot;http:\/\/www.w3.org\/2000\/svg&quot;&gt;&lt;path d=&quot;M16 132h416c8.837 0 16-7.163 16-16V76c0-8.837-7.163-16-16-16H16C7.163 60 0 67.163 0 76v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16z&quot;&gt;&lt;\/path&gt;&lt;\/svg&gt;\" data-indicator-icon=\"&lt;svg aria-hidden=&quot;true&quot; class=&quot;e-font-icon-svg e-fas-angle-down&quot; viewBox=&quot;0 0 320 512&quot; xmlns=&quot;http:\/\/www.w3.org\/2000\/svg&quot;&gt;&lt;path d=&quot;M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z&quot;&gt;&lt;\/path&gt;&lt;\/svg&gt;\" data-dropdown-indicator-icon=\"&lt;svg class=&quot;e-font-icon-svg e-fas-angle-down&quot; viewBox=&quot;0 0 320 512&quot; xmlns=&quot;http:\/\/www.w3.org\/2000\/svg&quot;&gt;&lt;path d=&quot;M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z&quot;&gt;&lt;\/path&gt;&lt;\/svg&gt;\" class=\"eael-simple-menu-container eael-simple-menu-align-left eael-simple-menu-dropdown-align-left preset-1\" data-hamburger-breakpoints=\"{&quot;mobile&quot;:&quot;Mobile Portrait (&gt; 767px)&quot;,&quot;tablet&quot;:&quot;Tablet Portrait (&gt; 1024px)&quot;,&quot;desktop&quot;:&quot;Desktop (&gt; 2400px)&quot;,&quot;none&quot;:&quot;None&quot;}\" data-hamburger-device=\"tablet\">\n                <ul id=\"menu-pma-gmbh-desktop\" class=\"eael-simple-menu eael-simple-menu-dropdown-animate-to-top eael-simple-menu-indicator eael-simple-menu-horizontal\"><li id=\"menu-item-509\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-509\"><a href=\"https:\/\/pma-it-security.de\/en\/ueber-pma\/\">About PMA<\/a><\/li>\n<li id=\"menu-item-482\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-482\"><a href=\"https:\/\/pma-it-security.de\/en\/leistungen\/\">Services<\/a><\/li>\n<li id=\"menu-item-1507\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-1507\"><a href=\"https:\/\/pma-it-security.de\/en\/ablauf\/\">Process<\/a><\/li>\n<li id=\"menu-item-2047\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-2047\"><a href=\"https:\/\/pma-it-security.de\/en\/projekte\/\">Projects<\/a><\/li>\n<li id=\"menu-item-109\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-109\"><a href=\"https:\/\/pma-it-security.de\/en\/jobs\/\">Career<\/a><\/li>\n<\/ul>                <button class=\"eael-simple-menu-toggle\">\n                    <span class=\"sr-only\">Hamburger Toggle Menu<\/span>\n                    <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-bars\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M16 132h416c8.837 0 16-7.163 16-16V76c0-8.837-7.163-16-16-16H16C7.163 60 0 67.163 0 76v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16zm0 160h416c8.837 0 16-7.163 16-16v-40c0-8.837-7.163-16-16-16H16c-8.837 0-16 7.163-16 16v40c0 8.837 7.163 16 16 16z\"><\/path><\/svg>                <\/button>\n            <\/div>\n            \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ad3524 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"6ad3524\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[{&quot;id&quot;:1450,&quot;url&quot;:&quot;https:\\\/\\\/pma-it-security.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Kein-Titel-1900-x-900-px-11.png&quot;}],&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_scale_effect&quot;:&quot;yes&quot;,&quot;motion_fx_scale_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:2,&quot;sizes&quot;:[]},&quot;motion_fx_scale_range&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:31,&quot;end&quot;:74}},&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500,&quot;motion_fx_scale_direction&quot;:&quot;out-in&quot;,&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd44c3e elementor-widget elementor-widget-n-carousel\" data-id=\"fd44c3e\" data-element_type=\"widget\" data-settings=\"{&quot;carousel_items&quot;:[{&quot;slide_title&quot;:&quot;Slide #1&quot;,&quot;_id&quot;:&quot;3ac4ef7&quot;},{&quot;slide_title&quot;:&quot;Software-Development&quot;,&quot;_id&quot;:&quot;0c227ee&quot;},{&quot;slide_title&quot;:&quot;Slide #3&quot;,&quot;_id&quot;:&quot;d26405c&quot;}],&quot;slides_to_show&quot;:&quot;1&quot;,&quot;autoplay_speed&quot;:6000,&quot;slides_to_show_tablet&quot;:&quot;2&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;offset_sides&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-carousel swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Karussell\" dir=\"ltr\">\n\t\t\t<div class=\"swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"1\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 3\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-310d14d e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"310d14d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-22a2017 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"22a2017\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc9487c elementor-widget elementor-widget-heading\" data-id=\"fc9487c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">EVALUATION &amp; ANALYSIS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"2\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 3\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b47b68f e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"b47b68f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-feb606a elementor-widget elementor-widget-heading\" data-id=\"feb606a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SOFTWARE DEVELOPMENT<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"3\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 3\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-baa6a07 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"baa6a07\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c4b298c elementor-widget elementor-widget-heading\" data-id=\"c4b298c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CONSULTING<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d2f5cb3 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"d2f5cb3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4.4,&quot;sizes&quot;:[]},&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:14,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-85b16d2 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"85b16d2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc259d2 elementor-widget elementor-widget-text-editor\" data-id=\"fc259d2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ihr Partner f\u00fcr sichere und zuverl\u00e4ssige <br \/>IT security systems<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbe6906 elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"fbe6906\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our services stand for competence, reliability and innovation in IT security. We offer you solutions that are specifically tailored to your requirements and needs - from the analysis and minimization of risks to well-founded security assessments and the development of highly secure software solutions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4df7a8 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"a4df7a8\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-a4df7a8\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"a4df7a8\" data-accordion-type=\"toggle\" data-toogle-speed=\"300\">\n    <div class=\"eael-accordion-list\">\n                <div id=\"beratung-support\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-1721\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-far-arrow-alt-circle-down\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm0 448c-110.5 0-200-89.5-200-200S145.5 56 256 56s200 89.5 200 200-89.5 200-200 200zm-32-316v116h-67c-10.7 0-16 12.9-8.5 20.5l99 99c4.7 4.7 12.3 4.7 17 0l99-99c7.6-7.6 2.2-20.5-8.5-20.5h-67V140c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-far-arrow-alt-circle-up\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 504c137 0 248-111 248-248S393 8 256 8 8 119 8 256s111 248 248 248zm0-448c110.5 0 200 89.5 200 200s-89.5 200-200 200S56 366.5 56 256 145.5 56 256 56zm20 328h-40c-6.6 0-12-5.4-12-12V256h-67c-10.7 0-16-12.9-8.5-20.5l99-99c4.7-4.7 12.3-4.7 17 0l99 99c7.6 7.6 2.2 20.5-8.5 20.5h-67v116c0 6.6-5.4 12-12 12z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">CONSULTING &amp; SUPPORT<\/span><\/div><div id=\"elementor-tab-content-1721\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"beratung-support\"><p>We analyze IT risks, close security gaps and develop strategies and concepts to protect your infrastructure in the long term.<\/p><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"bewertung-analyse\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-1722\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-far-arrow-alt-circle-down\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm0 448c-110.5 0-200-89.5-200-200S145.5 56 256 56s200 89.5 200 200-89.5 200-200 200zm-32-316v116h-67c-10.7 0-16 12.9-8.5 20.5l99 99c4.7 4.7 12.3 4.7 17 0l99-99c7.6-7.6 2.2-20.5-8.5-20.5h-67V140c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-far-arrow-alt-circle-up\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 504c137 0 248-111 248-248S393 8 256 8 8 119 8 256s111 248 248 248zm0-448c110.5 0 200 89.5 200 200s-89.5 200-200 200S56 366.5 56 256 145.5 56 256 56zm20 328h-40c-6.6 0-12-5.4-12-12V256h-67c-10.7 0-16-12.9-8.5-20.5l99-99c4.7-4.7 12.3-4.7 17 0l99 99c7.6 7.6 2.2 20.5-8.5 20.5h-67v116c0 6.6-5.4 12-12 12z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">EVALUATION &amp; ANALYSIS<\/span><\/div><div id=\"elementor-tab-content-1722\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"bewertung-analyse\"><p>We check IT systems for vulnerabilities, analyze security aspects of hardware and software and support you with certification processes - precisely and reliably.<\/p><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"software-development\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-1723\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-far-arrow-alt-circle-down\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm0 448c-110.5 0-200-89.5-200-200S145.5 56 256 56s200 89.5 200 200-89.5 200-200 200zm-32-316v116h-67c-10.7 0-16 12.9-8.5 20.5l99 99c4.7 4.7 12.3 4.7 17 0l99-99c7.6-7.6 2.2-20.5-8.5-20.5h-67V140c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-far-arrow-alt-circle-up\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 504c137 0 248-111 248-248S393 8 256 8 8 119 8 256s111 248 248 248zm0-448c110.5 0 200 89.5 200 200s-89.5 200-200 200S56 366.5 56 256 145.5 56 256 56zm20 328h-40c-6.6 0-12-5.4-12-12V256h-67c-10.7 0-16-12.9-8.5-20.5l99-99c4.7-4.7 12.3-4.7 17 0l99 99c7.6 7.6 2.2 20.5-8.5 20.5h-67v116c0 6.6-5.4 12-12 12z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">SOFTWARE DEVELOPMENT<\/span><\/div><div id=\"elementor-tab-content-1723\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"software-development\"><p>We develop modern and secure solutions with in-depth knowledge of information security, cryptography and communication protocols. We create and implement future-proof software solutions that meet the highest standards.<\/p><\/div>\n                <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fe6876c e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"fe6876c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6e773ff e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"6e773ff\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c5cc55 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"7c5cc55\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our mission<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a2ff81 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"6a2ff81\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our mission is to protect your IT systems while developing future-proof concepts. We react flexibly to the constantly changing types of cyber threats.<\/p><p>Together, we develop security systems that adapt to your daily work routine and prevent unauthorized access.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-66c4fe6 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"66c4fe6\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ddbe298 elementor-widget elementor-widget-spacer\" data-id=\"ddbe298\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6019ae animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"d6019ae\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What sets us apart<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d54240 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"0d54240\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Every IT system is unique and requires customized approaches that are tailored to individual requirements. In IT risk management, there is no \u201cone size fits all\u201d approach that is suitable for all systems. This is why PMA GmbH develops security concepts and solutions that are geared towards the specific needs of the client.<\/p><p>As a young company with over 20 years of experience, PMA GmbH combines technical expertise, flexibility and innovative strength. Our focus is on proximity to the client and developing the best solutions together.<\/p><p>We protect your IT systems - reliably, future-oriented and precisely tailored to your needs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-602b33cc e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"602b33cc\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2e3644e2 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"2e3644e2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c04dda2 elementor-headline--style-rotate elementor-widget elementor-widget-animated-headline\" data-id=\"4c04dda2\" data-element_type=\"widget\" data-settings=\"{&quot;headline_style&quot;:&quot;rotate&quot;,&quot;animation_type&quot;:&quot;blinds&quot;,&quot;rotating_text&quot;:&quot;OUT OF \\nTHE BOX&quot;,&quot;rotate_iteration_delay&quot;:2400,&quot;loop&quot;:&quot;yes&quot;}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3 class=\"elementor-headline elementor-headline-animation-type-blinds elementor-headline-letters\">\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">Thinking<\/span>\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">\n\t\t\t\tOUT&nbsp;OF&nbsp;\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text\">\n\t\t\t\tTHE&nbsp;BOX\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5dfcd44 elementor-widget elementor-widget-heading\" data-id=\"5dfcd44\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Act now and let us protect your IT systems together!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7a47b76 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"7a47b76\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-14fbf03d elementor-widget elementor-widget-text-editor\" data-id=\"14fbf03d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Whether you need support with the implementation of security concepts, want to analyze software and hardware or are looking for innovative development approaches - we accompany you with experience, transparency and care on the way to a secure digital future.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f09215b elementor-align-left elementor-widget elementor-widget-button\" data-id=\"f09215b\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/pma-it-security.de\/en\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get in touch<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Kontakt \u00dcber PMA Leistungen Ablauf Projekte Karriere Senior Software Developer Android (m\/w\/d) Senior Software Developer Backend (m\/w\/d) (Junior) Android Developer (m\/w\/d) (Junior) Backend Developer (m\/w\/d) Hamburger Toggle Menu EVALUATION &amp; ANALYSIS SOFTWARE DEVELOPMENT CONSULTING EVALUATION &amp; ANALYSIS SOFTWARE DEVELOPMENT CONSULTING Ihr Partner f\u00fcr sichere und zuverl\u00e4ssige IT-Sicherheitssysteme Unsere Leistungen stehen f\u00fcr Kompetenz, Zuverl\u00e4ssigkeit und Innovation in der IT-Sicherheit. Wir bieten Ihnen L\u00f6sungen, die speziell auf Ihre Anforderungen und Bed\u00fcrfnisse zugeschnitten sind \u2013 von der Analyse und Minimierung von Risiken \u00fcber fundierte Sicherheitsbewertungen bis hin zur Entwicklung hochsicherer Softwarel\u00f6sungen. BERATUNG &amp; SUPPORT Wir analysieren IT-Risiken, schlie\u00dfen Sicherheitsl\u00fccken und entwickeln Strategien und Konzepte, um Ihre Infrastruktur nachhaltig zu sch\u00fctzen. BEWERTUNG &amp; ANALYSE Wir pr\u00fcfen IT-Systeme auf Schwachstellen, analysieren Sicherheitsaspekte von Hardware und Software und begleiten Sie bei Zertifizierungsprozessen &#8211; pr\u00e4zise und zuverl\u00e4ssig. SOFTWARE DEVELOPMENT Wir entwickeln moderne und sichere L\u00f6sungen mit tiefgreifendem Know-How \u00fcber Informationssicherheit, Kryptografie und Kommunikationsprotokollen. Wir erstellen und implementieren zukunftssichere Softwarel\u00f6sungen, die h\u00f6chsten Anspr\u00fcchen gerecht werden. Unsere Mission Unsere Mission ist es, Ihre IT-Systeme zu sch\u00fctzen und gleichzeitig zukunftssichere Konzepte zu schaffen. Wir reagieren agil auf sich stetig \u00e4ndernde Arten der Cyberbedrohung. Gemeinsam entwickeln wir Sicherheitssysteme, die sich an Ihren Arbeitsalltag anpassen und unbefugte Zugriffe verhindern. Was uns auszeichnet Jedes IT-System ist einzigartig und erfordert ma\u00dfgeschneiderte Ans\u00e4tze, die auf individuelle Anforderungen abgestimmt sind. Im IT-Risikomanagement gibt es keinen &#8222;One Size Fits All&#8220;-Ansatz, der f\u00fcr alle Systeme geeignet ist. Deshalb entwickelt die PMA GmbH Sicherheitskonzepte und L\u00f6sungen, die die spezifischen Bed\u00fcrfnisse der Kunden in den Mittelpunkt stellen. Als junges Unternehmen mit \u00fcber 20 Jahren Erfahrung vereint die PMA GmbH technische Expertise, Flexibilit\u00e4t und Innovationskraft. Unser Fokus liegt dabei auf der N\u00e4he zum Kunden und gemeinsam die besten L\u00f6sungen zu entwickeln. Wir sch\u00fctzen Ihre IT-Systeme &#8211; zuverl\u00e4ssig, zukunftsorientiert und exakt auf Ihre Bed\u00fcrfnisse abgestimmt. Thinking OUT&nbsp;OF&nbsp; THE&nbsp;BOX Handeln Sie jetzt und lassen Sie uns gemeinsam Ihre IT-Systeme sch\u00fctzen! Egal, ob Sie Unterst\u00fctzung bei der Implementierung von Sicherheitskonzepten ben\u00f6tigen, Software und Hardware analysieren m\u00f6chten oder auf der Suche nach innovativen Entwicklungsans\u00e4tzen sind \u2013 wir begleiten Sie mit Erfahrung, Transparenz und Sorgfalt auf dem Weg zu einer sicheren digitalen Zukunft. Jetzt Kontakt aufnehmen<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_canvas","meta":{"footnotes":""},"class_list":["post-1418","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Test-PMA IT-Security - PMA GmbH - IT Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pma-it-security.de\/en\/test-pma-it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Test-PMA IT-Security - PMA GmbH - IT Security\" \/>\n<meta property=\"og:description\" content=\"Kontakt \u00dcber PMA Leistungen Ablauf Projekte Karriere Senior Software Developer Android (m\/w\/d) Senior Software Developer Backend (m\/w\/d) (Junior) Android Developer (m\/w\/d) (Junior) Backend Developer (m\/w\/d) Hamburger Toggle Menu EVALUATION &amp; ANALYSIS SOFTWARE DEVELOPMENT CONSULTING EVALUATION &amp; ANALYSIS SOFTWARE DEVELOPMENT CONSULTING Ihr Partner f\u00fcr sichere und zuverl\u00e4ssige IT-Sicherheitssysteme Unsere Leistungen stehen f\u00fcr Kompetenz, Zuverl\u00e4ssigkeit und Innovation in der IT-Sicherheit. Wir bieten Ihnen L\u00f6sungen, die speziell auf Ihre Anforderungen und Bed\u00fcrfnisse zugeschnitten sind \u2013 von der Analyse und Minimierung von Risiken \u00fcber fundierte Sicherheitsbewertungen bis hin zur Entwicklung hochsicherer Softwarel\u00f6sungen. BERATUNG &amp; SUPPORT Wir analysieren IT-Risiken, schlie\u00dfen Sicherheitsl\u00fccken und entwickeln Strategien und Konzepte, um Ihre Infrastruktur nachhaltig zu sch\u00fctzen. BEWERTUNG &amp; ANALYSE Wir pr\u00fcfen IT-Systeme auf Schwachstellen, analysieren Sicherheitsaspekte von Hardware und Software und begleiten Sie bei Zertifizierungsprozessen &#8211; pr\u00e4zise und zuverl\u00e4ssig. SOFTWARE DEVELOPMENT Wir entwickeln moderne und sichere L\u00f6sungen mit tiefgreifendem Know-How \u00fcber Informationssicherheit, Kryptografie und Kommunikationsprotokollen. Wir erstellen und implementieren zukunftssichere Softwarel\u00f6sungen, die h\u00f6chsten Anspr\u00fcchen gerecht werden. Unsere Mission Unsere Mission ist es, Ihre IT-Systeme zu sch\u00fctzen und gleichzeitig zukunftssichere Konzepte zu schaffen. Wir reagieren agil auf sich stetig \u00e4ndernde Arten der Cyberbedrohung. Gemeinsam entwickeln wir Sicherheitssysteme, die sich an Ihren Arbeitsalltag anpassen und unbefugte Zugriffe verhindern. Was uns auszeichnet Jedes IT-System ist einzigartig und erfordert ma\u00dfgeschneiderte Ans\u00e4tze, die auf individuelle Anforderungen abgestimmt sind. Im IT-Risikomanagement gibt es keinen &#8222;One Size Fits All&#8220;-Ansatz, der f\u00fcr alle Systeme geeignet ist. Deshalb entwickelt die PMA GmbH Sicherheitskonzepte und L\u00f6sungen, die die spezifischen Bed\u00fcrfnisse der Kunden in den Mittelpunkt stellen. Als junges Unternehmen mit \u00fcber 20 Jahren Erfahrung vereint die PMA GmbH technische Expertise, Flexibilit\u00e4t und Innovationskraft. Unser Fokus liegt dabei auf der N\u00e4he zum Kunden und gemeinsam die besten L\u00f6sungen zu entwickeln. Wir sch\u00fctzen Ihre IT-Systeme &#8211; zuverl\u00e4ssig, zukunftsorientiert und exakt auf Ihre Bed\u00fcrfnisse abgestimmt. Thinking OUT&nbsp;OF&nbsp; THE&nbsp;BOX Handeln Sie jetzt und lassen Sie uns gemeinsam Ihre IT-Systeme sch\u00fctzen! Egal, ob Sie Unterst\u00fctzung bei der Implementierung von Sicherheitskonzepten ben\u00f6tigen, Software und Hardware analysieren m\u00f6chten oder auf der Suche nach innovativen Entwicklungsans\u00e4tzen sind \u2013 wir begleiten Sie mit Erfahrung, Transparenz und Sorgfalt auf dem Weg zu einer sicheren digitalen Zukunft. Jetzt Kontakt aufnehmen\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pma-it-security.de\/en\/test-pma-it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"PMA GmbH - IT Security\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-25T06:08:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2025\/03\/P-3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pma-it-security.de\/test-pma-it-security\/\",\"url\":\"https:\/\/pma-it-security.de\/test-pma-it-security\/\",\"name\":\"Test-PMA IT-Security - PMA GmbH - IT Security\",\"isPartOf\":{\"@id\":\"https:\/\/pma-it-security.de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pma-it-security.de\/test-pma-it-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pma-it-security.de\/test-pma-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2025\/03\/P-3.png\",\"datePublished\":\"2025-03-18T20:08:10+00:00\",\"dateModified\":\"2025-04-25T06:08:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/pma-it-security.de\/test-pma-it-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pma-it-security.de\/test-pma-it-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pma-it-security.de\/test-pma-it-security\/#primaryimage\",\"url\":\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2025\/03\/P-3.png\",\"contentUrl\":\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2025\/03\/P-3.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pma-it-security.de\/test-pma-it-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/pma-it-security.de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Test-PMA IT-Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pma-it-security.de\/#website\",\"url\":\"https:\/\/pma-it-security.de\/\",\"name\":\"PMA GmbH - IT Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/pma-it-security.de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pma-it-security.de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pma-it-security.de\/#organization\",\"name\":\"PMA GmbH\",\"url\":\"https:\/\/pma-it-security.de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pma-it-security.de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/PMA-800-x-800-px-7.png\",\"contentUrl\":\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/PMA-800-x-800-px-7.png\",\"width\":800,\"height\":800,\"caption\":\"PMA GmbH\"},\"image\":{\"@id\":\"https:\/\/pma-it-security.de\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Test-PMA IT-Security - PMA GmbH - IT Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pma-it-security.de\/en\/test-pma-it-security\/","og_locale":"en_US","og_type":"article","og_title":"Test-PMA IT-Security - PMA GmbH - IT Security","og_description":"Kontakt \u00dcber PMA Leistungen Ablauf Projekte Karriere Senior Software Developer Android (m\/w\/d) Senior Software Developer Backend (m\/w\/d) (Junior) Android Developer (m\/w\/d) (Junior) Backend Developer (m\/w\/d) Hamburger Toggle Menu EVALUATION &amp; ANALYSIS SOFTWARE DEVELOPMENT CONSULTING EVALUATION &amp; ANALYSIS SOFTWARE DEVELOPMENT CONSULTING Ihr Partner f\u00fcr sichere und zuverl\u00e4ssige IT-Sicherheitssysteme Unsere Leistungen stehen f\u00fcr Kompetenz, Zuverl\u00e4ssigkeit und Innovation in der IT-Sicherheit. Wir bieten Ihnen L\u00f6sungen, die speziell auf Ihre Anforderungen und Bed\u00fcrfnisse zugeschnitten sind \u2013 von der Analyse und Minimierung von Risiken \u00fcber fundierte Sicherheitsbewertungen bis hin zur Entwicklung hochsicherer Softwarel\u00f6sungen. BERATUNG &amp; SUPPORT Wir analysieren IT-Risiken, schlie\u00dfen Sicherheitsl\u00fccken und entwickeln Strategien und Konzepte, um Ihre Infrastruktur nachhaltig zu sch\u00fctzen. BEWERTUNG &amp; ANALYSE Wir pr\u00fcfen IT-Systeme auf Schwachstellen, analysieren Sicherheitsaspekte von Hardware und Software und begleiten Sie bei Zertifizierungsprozessen &#8211; pr\u00e4zise und zuverl\u00e4ssig. SOFTWARE DEVELOPMENT Wir entwickeln moderne und sichere L\u00f6sungen mit tiefgreifendem Know-How \u00fcber Informationssicherheit, Kryptografie und Kommunikationsprotokollen. Wir erstellen und implementieren zukunftssichere Softwarel\u00f6sungen, die h\u00f6chsten Anspr\u00fcchen gerecht werden. Unsere Mission Unsere Mission ist es, Ihre IT-Systeme zu sch\u00fctzen und gleichzeitig zukunftssichere Konzepte zu schaffen. Wir reagieren agil auf sich stetig \u00e4ndernde Arten der Cyberbedrohung. Gemeinsam entwickeln wir Sicherheitssysteme, die sich an Ihren Arbeitsalltag anpassen und unbefugte Zugriffe verhindern. Was uns auszeichnet Jedes IT-System ist einzigartig und erfordert ma\u00dfgeschneiderte Ans\u00e4tze, die auf individuelle Anforderungen abgestimmt sind. Im IT-Risikomanagement gibt es keinen &#8222;One Size Fits All&#8220;-Ansatz, der f\u00fcr alle Systeme geeignet ist. Deshalb entwickelt die PMA GmbH Sicherheitskonzepte und L\u00f6sungen, die die spezifischen Bed\u00fcrfnisse der Kunden in den Mittelpunkt stellen. Als junges Unternehmen mit \u00fcber 20 Jahren Erfahrung vereint die PMA GmbH technische Expertise, Flexibilit\u00e4t und Innovationskraft. Unser Fokus liegt dabei auf der N\u00e4he zum Kunden und gemeinsam die besten L\u00f6sungen zu entwickeln. Wir sch\u00fctzen Ihre IT-Systeme &#8211; zuverl\u00e4ssig, zukunftsorientiert und exakt auf Ihre Bed\u00fcrfnisse abgestimmt. Thinking OUT&nbsp;OF&nbsp; THE&nbsp;BOX Handeln Sie jetzt und lassen Sie uns gemeinsam Ihre IT-Systeme sch\u00fctzen! Egal, ob Sie Unterst\u00fctzung bei der Implementierung von Sicherheitskonzepten ben\u00f6tigen, Software und Hardware analysieren m\u00f6chten oder auf der Suche nach innovativen Entwicklungsans\u00e4tzen sind \u2013 wir begleiten Sie mit Erfahrung, Transparenz und Sorgfalt auf dem Weg zu einer sicheren digitalen Zukunft. Jetzt Kontakt aufnehmen","og_url":"https:\/\/pma-it-security.de\/en\/test-pma-it-security\/","og_site_name":"PMA GmbH - IT Security","article_modified_time":"2025-04-25T06:08:34+00:00","og_image":[{"width":500,"height":500,"url":"https:\/\/pma-it-security.de\/wp-content\/uploads\/2025\/03\/P-3.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pma-it-security.de\/test-pma-it-security\/","url":"https:\/\/pma-it-security.de\/test-pma-it-security\/","name":"Test-PMA IT-Security - PMA GmbH - IT Security","isPartOf":{"@id":"https:\/\/pma-it-security.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pma-it-security.de\/test-pma-it-security\/#primaryimage"},"image":{"@id":"https:\/\/pma-it-security.de\/test-pma-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/pma-it-security.de\/wp-content\/uploads\/2025\/03\/P-3.png","datePublished":"2025-03-18T20:08:10+00:00","dateModified":"2025-04-25T06:08:34+00:00","breadcrumb":{"@id":"https:\/\/pma-it-security.de\/test-pma-it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pma-it-security.de\/test-pma-it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pma-it-security.de\/test-pma-it-security\/#primaryimage","url":"https:\/\/pma-it-security.de\/wp-content\/uploads\/2025\/03\/P-3.png","contentUrl":"https:\/\/pma-it-security.de\/wp-content\/uploads\/2025\/03\/P-3.png"},{"@type":"BreadcrumbList","@id":"https:\/\/pma-it-security.de\/test-pma-it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/pma-it-security.de\/"},{"@type":"ListItem","position":2,"name":"Test-PMA IT-Security"}]},{"@type":"WebSite","@id":"https:\/\/pma-it-security.de\/#website","url":"https:\/\/pma-it-security.de\/","name":"PMA GmbH - IT Security","description":"","publisher":{"@id":"https:\/\/pma-it-security.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pma-it-security.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pma-it-security.de\/#organization","name":"PMA GmbH","url":"https:\/\/pma-it-security.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pma-it-security.de\/#\/schema\/logo\/image\/","url":"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/PMA-800-x-800-px-7.png","contentUrl":"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/PMA-800-x-800-px-7.png","width":800,"height":800,"caption":"PMA GmbH"},"image":{"@id":"https:\/\/pma-it-security.de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/pma-it-security.de\/en\/wp-json\/wp\/v2\/pages\/1418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pma-it-security.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pma-it-security.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pma-it-security.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pma-it-security.de\/en\/wp-json\/wp\/v2\/comments?post=1418"}],"version-history":[{"count":10,"href":"https:\/\/pma-it-security.de\/en\/wp-json\/wp\/v2\/pages\/1418\/revisions"}],"predecessor-version":[{"id":1533,"href":"https:\/\/pma-it-security.de\/en\/wp-json\/wp\/v2\/pages\/1418\/revisions\/1533"}],"wp:attachment":[{"href":"https:\/\/pma-it-security.de\/en\/wp-json\/wp\/v2\/media?parent=1418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}