{"id":365,"date":"2023-11-17T10:31:22","date_gmt":"2023-11-17T09:31:22","guid":{"rendered":"https:\/\/pma-it-security.de\/?page_id=365"},"modified":"2023-11-17T10:35:37","modified_gmt":"2023-11-17T09:35:37","slug":"referenzen","status":"publish","type":"page","link":"https:\/\/pma-it-security.de\/en\/referenzen\/","title":{"rendered":"Referenzen"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"365\" class=\"elementor elementor-365\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a83cba7 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"a83cba7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eccdcc6 elementor--h-position-center elementor--v-position-middle elementor-widget elementor-widget-slides\" data-id=\"eccdcc6\" data-element_type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;transition&quot;:&quot;slide&quot;,&quot;transition_speed&quot;:500}\" data-widget_type=\"slides.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t\t\t<div class=\"elementor-slides-wrapper elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Slides\" dir=\"ltr\" data-animation=\"fadeInUp\">\n\t\t\t\t<div class=\"swiper-wrapper elementor-slides\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-repeater-item-66c70cc swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><div class=\"elementor-slide-heading\">REFERENZEN<\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-755b7b5 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"755b7b5\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52ca142 elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"52ca142\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInLeft&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3680df1e e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"3680df1e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-371b3687 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"371b3687\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb4c57d elementor-widget elementor-widget-heading\" data-id=\"cb4c57d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our clients<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ccbf8f elementor-widget elementor-widget-heading\" data-id=\"6ccbf8f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-61cae6ae e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"61cae6ae\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-66f69429 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"66f69429\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-75d688dd elementor-widget elementor-widget-image\" data-id=\"75d688dd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/Marketing-Agency-bueno-Icon.svg\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c29792d e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"4c29792d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-64db8877 elementor-widget elementor-widget-image\" data-id=\"64db8877\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"270\" height=\"100\" src=\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/Icon-The-MUSTARD.svg\" class=\"attachment-large size-large wp-image-374\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b14fe8c e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"b14fe8c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6af183d0 elementor-widget elementor-widget-image\" data-id=\"6af183d0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/Marketing-Agency-cela-Icon.svg\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-618fe087 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"618fe087\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ec7ae24 elementor-widget elementor-widget-image\" data-id=\"5ec7ae24\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"270\" height=\"100\" src=\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/Icon-Toute-lannee.svg\" class=\"attachment-large size-large wp-image-382\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-328cf361 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"328cf361\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41a59a75 elementor-widget elementor-widget-image\" data-id=\"41a59a75\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"270\" height=\"100\" src=\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/Icon-The-WHITE-BEAR.svg\" class=\"attachment-large size-large wp-image-386\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c29ac4c e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"c29ac4c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4690b1c6 elementor-widget elementor-widget-image\" data-id=\"4690b1c6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"270\" height=\"100\" src=\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/Icon-Silhouette.svg\" class=\"attachment-large size-large wp-image-390\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a8f3b39 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"6a8f3b39\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1d47076a e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"1d47076a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1614c9 animated-slow elementor-widget elementor-widget-heading\" data-id=\"1a1614c9\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;_animation_mobile&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">OUR SERVICES<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-568ed4c2 animated-slow elementor-widget elementor-widget-heading\" data-id=\"568ed4c2\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;_animation_mobile&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ihr Partner f\u00fcr Unternehmen und Institutionen mit sehr hohen Sicherheitsanforderungen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4df7a8 elementor-invisible elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"a4df7a8\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-a4df7a8\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"a4df7a8\" data-accordion-type=\"toggle\" data-toogle-speed=\"300\">\n    <div class=\"eael-accordion-list\">\n                <div id=\"consulting-beratung\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-1721\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-far-arrow-alt-circle-up\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 504c137 0 248-111 248-248S393 8 256 8 8 119 8 256s111 248 248 248zm0-448c110.5 0 200 89.5 200 200s-89.5 200-200 200S56 366.5 56 256 145.5 56 256 56zm20 328h-40c-6.6 0-12-5.4-12-12V256h-67c-10.7 0-16-12.9-8.5-20.5l99-99c4.7-4.7 12.3-4.7 17 0l99 99c7.6 7.6 2.2 20.5-8.5 20.5h-67v116c0 6.6-5.4 12-12 12z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-far-arrow-alt-circle-up\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 504c137 0 248-111 248-248S393 8 256 8 8 119 8 256s111 248 248 248zm0-448c110.5 0 200 89.5 200 200s-89.5 200-200 200S56 366.5 56 256 145.5 56 256 56zm20 328h-40c-6.6 0-12-5.4-12-12V256h-67c-10.7 0-16-12.9-8.5-20.5l99-99c4.7-4.7 12.3-4.7 17 0l99 99c7.6 7.6 2.2 20.5-8.5 20.5h-67v116c0 6.6-5.4 12-12 12z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">CONSULTING &amp; BERATUNG<\/span><\/div><div id=\"elementor-tab-content-1721\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"consulting-beratung\"><ul><li>Etablierung von Prozessen und Betriebskonzepten<\/li><li>Bedrohungsanalyse und Bedrohungsmodellierung<\/li><li>Sicherheitsstrategie<\/li><li>Infrastruktur f\u00fcr \u00f6ffentliche Schl\u00fcssel (PKI)<\/li><li>Hardware-Sicherheitsmodule (HSM) und Smartcards<\/li><li>Sicherheitsprotokolle, z. B. Transport Layer Security (TLS\/SSL)<\/li><\/ul><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"bewertung-analyse\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-1722\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-far-arrow-alt-circle-down\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm0 448c-110.5 0-200-89.5-200-200S145.5 56 256 56s200 89.5 200 200-89.5 200-200 200zm-32-316v116h-67c-10.7 0-16 12.9-8.5 20.5l99 99c4.7 4.7 12.3 4.7 17 0l99-99c7.6-7.6 2.2-20.5-8.5-20.5h-67V140c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-far-arrow-alt-circle-up\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 504c137 0 248-111 248-248S393 8 256 8 8 119 8 256s111 248 248 248zm0-448c110.5 0 200 89.5 200 200s-89.5 200-200 200S56 366.5 56 256 145.5 56 256 56zm20 328h-40c-6.6 0-12-5.4-12-12V256h-67c-10.7 0-16-12.9-8.5-20.5l99-99c4.7-4.7 12.3-4.7 17 0l99 99c7.6 7.6 2.2 20.5-8.5 20.5h-67v116c0 6.6-5.4 12-12 12z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">EVALUATION &amp; ANALYSIS<\/span><\/div><div id=\"elementor-tab-content-1722\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"bewertung-analyse\"><p>Wenn Sie die Behauptungen eines Anbieters \u00fcber Produkteigenschaften \u00fcberpr\u00fcfen wollen, Open-Source-Softwarekomponenten f\u00fcr die Produktintegration evaluieren oder Sicherheitsaspekte Ihrer eigenen Produkte verifizieren wollen: Wir evaluieren, analysieren und verifizieren die Software. Wir unterst\u00fctzen Sie auch bei der Vorbereitung auf eine staatliche oder industrielle Zertifizierung.<\/p><ul><li>\u00dcberpr\u00fcfung des Quellcodes<br \/>Statische und dynamische Analyse<\/li><li>Reverse Engineering von Software und Hardware<\/li><li>Reine Bin\u00e4r- und Blackbox-Analyse<\/li><li>Vorbereitung von Dokumenten f\u00fcr die Zertifizier<\/li><\/ul><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"software-entwicklung\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-1723\"><span class=\"eael-advanced-accordion-icon-closed\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-far-arrow-alt-circle-down\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm0 448c-110.5 0-200-89.5-200-200S145.5 56 256 56s200 89.5 200 200-89.5 200-200 200zm-32-316v116h-67c-10.7 0-16 12.9-8.5 20.5l99 99c4.7 4.7 12.3 4.7 17 0l99-99c7.6-7.6 2.2-20.5-8.5-20.5h-67V140c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12z\"><\/path><\/svg><\/span><span class=\"eael-advanced-accordion-icon-opened\"><svg aria-hidden=\"true\" class=\"fa-accordion-icon e-font-icon-svg e-far-arrow-alt-circle-up\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 504c137 0 248-111 248-248S393 8 256 8 8 119 8 256s111 248 248 248zm0-448c110.5 0 200 89.5 200 200s-89.5 200-200 200S56 366.5 56 256 145.5 56 256 56zm20 328h-40c-6.6 0-12-5.4-12-12V256h-67c-10.7 0-16-12.9-8.5-20.5l99-99c4.7-4.7 12.3-4.7 17 0l99 99c7.6 7.6 2.2 20.5-8.5 20.5h-67v116c0 6.6-5.4 12-12 12z\"><\/path><\/svg><\/span><span class=\"eael-accordion-tab-title\">SOFTWARE DEVELOPMENT<\/span><\/div><div id=\"elementor-tab-content-1723\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"software-entwicklung\"><p>Unsere besonderen Fachgebiete sind Sicherheitsaspekte von Software, Kommunikationsprotokolle und Kryptographie. Wir erstellen Software mit schnellen Feedback-Zyklen unter Verwendung eines agilen Prozesses in den folgenden Bereichen:<\/p><ul><li>Sichere vernetzte Systeme<\/li><li>Angewandte Informationssicherheit<\/li><li>Theorie und Praxis der Kryptographie<\/li><li>Hocheffiziente Implementierungen<\/li><\/ul><\/div>\n                <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-645e2434 e-con-full elementor-hidden-mobile e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"645e2434\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ffaa902 elementor-widget elementor-widget-image\" data-id=\"6ffaa902\" data-element_type=\"widget\" data-settings=\"{&quot;_animation_mobile&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/pma-it-security.de\/wp-content\/uploads\/elementor\/thumbs\/Dein-Abschnittstext-22-qf5hekdhtdunikqmd483u4udyy7w3y29j2nql67aa8.png\" title=\"Dein-Abschnittstext-22.png\" alt=\"Dein-Abschnittstext-22.png\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-602b33cc e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"602b33cc\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2e3644e2 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"2e3644e2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c04dda2 elementor-headline--style-rotate elementor-widget elementor-widget-animated-headline\" data-id=\"4c04dda2\" data-element_type=\"widget\" data-settings=\"{&quot;headline_style&quot;:&quot;rotate&quot;,&quot;animation_type&quot;:&quot;blinds&quot;,&quot;rotating_text&quot;:&quot;black \\nor white&quot;,&quot;rotate_iteration_delay&quot;:2400,&quot;loop&quot;:&quot;yes&quot;}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3 class=\"elementor-headline elementor-headline-animation-type-blinds elementor-headline-letters\">\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">It\u00b4s not all <\/span>\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">\n\t\t\t\tblack&nbsp;\t\t\t<\/span>\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text\">\n\t\t\t\tor&nbsp;white\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-232aed31 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"232aed31\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:100}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Thinking OUT OF THE BOX <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7a47b76 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"7a47b76\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-14fbf03d elementor-widget elementor-widget-text-editor\" data-id=\"14fbf03d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>20 Jahre Erfahrung in der IT\/Cyber-Security.\u00a0<\/p><p>Sicherheitskonzepte f\u00fcr Ihr Unternehmen oder Institution, die im Arbeitsalltag tats\u00e4chlich nutz- und umsetzbar sind. Wir setzen bei sicheren Systemen an, die hohe Sicherheitsstandards erf\u00fcllen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>REFERENZEN Unsere Kunden Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor. LEISTUNGEN Ihr Partner f\u00fcr Unternehmen und Institutionen mit sehr hohen Sicherheitsanforderungen CONSULTING &amp; BERATUNG Etablierung von Prozessen und Betriebskonzepten Bedrohungsanalyse und Bedrohungsmodellierung Sicherheitsstrategie Infrastruktur f\u00fcr \u00f6ffentliche Schl\u00fcssel (PKI) Hardware-Sicherheitsmodule (HSM) und Smartcards Sicherheitsprotokolle, z. B. Transport Layer Security (TLS\/SSL) BEWERTUNG &amp; ANALYSE Wenn Sie die Behauptungen eines Anbieters \u00fcber Produkteigenschaften \u00fcberpr\u00fcfen wollen, Open-Source-Softwarekomponenten f\u00fcr die Produktintegration evaluieren oder Sicherheitsaspekte Ihrer eigenen Produkte verifizieren wollen: Wir evaluieren, analysieren und verifizieren die Software. Wir unterst\u00fctzen Sie auch bei der Vorbereitung auf eine staatliche oder industrielle Zertifizierung. \u00dcberpr\u00fcfung des QuellcodesStatische und dynamische Analyse Reverse Engineering von Software und Hardware Reine Bin\u00e4r- und Blackbox-Analyse Vorbereitung von Dokumenten f\u00fcr die Zertifizier SOFTWARE-ENTWICKLUNG Unsere besonderen Fachgebiete sind Sicherheitsaspekte von Software, Kommunikationsprotokolle und Kryptographie. Wir erstellen Software mit schnellen Feedback-Zyklen unter Verwendung eines agilen Prozesses in den folgenden Bereichen: Sichere vernetzte Systeme Angewandte Informationssicherheit Theorie und Praxis der Kryptographie Hocheffiziente Implementierungen It\u00b4s not all black&nbsp; or&nbsp;white Thinking OUT OF THE BOX 20 Jahre Erfahrung in der IT\/Cyber-Security.\u00a0 Sicherheitskonzepte f\u00fcr Ihr Unternehmen oder Institution, die im Arbeitsalltag tats\u00e4chlich nutz- und umsetzbar sind. Wir setzen bei sicheren Systemen an, die hohe Sicherheitsstandards erf\u00fcllen.<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-365","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Referenzen - PMA GmbH - IT Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pma-it-security.de\/en\/referenzen\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Referenzen - PMA GmbH - IT Security\" \/>\n<meta property=\"og:description\" content=\"REFERENZEN Unsere Kunden Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor. LEISTUNGEN Ihr Partner f\u00fcr Unternehmen und Institutionen mit sehr hohen Sicherheitsanforderungen CONSULTING &amp; BERATUNG Etablierung von Prozessen und Betriebskonzepten Bedrohungsanalyse und Bedrohungsmodellierung Sicherheitsstrategie Infrastruktur f\u00fcr \u00f6ffentliche Schl\u00fcssel (PKI) Hardware-Sicherheitsmodule (HSM) und Smartcards Sicherheitsprotokolle, z. B. Transport Layer Security (TLS\/SSL) BEWERTUNG &amp; ANALYSE Wenn Sie die Behauptungen eines Anbieters \u00fcber Produkteigenschaften \u00fcberpr\u00fcfen wollen, Open-Source-Softwarekomponenten f\u00fcr die Produktintegration evaluieren oder Sicherheitsaspekte Ihrer eigenen Produkte verifizieren wollen: Wir evaluieren, analysieren und verifizieren die Software. Wir unterst\u00fctzen Sie auch bei der Vorbereitung auf eine staatliche oder industrielle Zertifizierung. \u00dcberpr\u00fcfung des QuellcodesStatische und dynamische Analyse Reverse Engineering von Software und Hardware Reine Bin\u00e4r- und Blackbox-Analyse Vorbereitung von Dokumenten f\u00fcr die Zertifizier SOFTWARE-ENTWICKLUNG Unsere besonderen Fachgebiete sind Sicherheitsaspekte von Software, Kommunikationsprotokolle und Kryptographie. Wir erstellen Software mit schnellen Feedback-Zyklen unter Verwendung eines agilen Prozesses in den folgenden Bereichen: Sichere vernetzte Systeme Angewandte Informationssicherheit Theorie und Praxis der Kryptographie Hocheffiziente Implementierungen It\u00b4s not all black&nbsp; or&nbsp;white Thinking OUT OF THE BOX 20 Jahre Erfahrung in der IT\/Cyber-Security.\u00a0 Sicherheitskonzepte f\u00fcr Ihr Unternehmen oder Institution, die im Arbeitsalltag tats\u00e4chlich nutz- und umsetzbar sind. Wir setzen bei sicheren Systemen an, die hohe Sicherheitsstandards erf\u00fcllen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pma-it-security.de\/en\/referenzen\/\" \/>\n<meta property=\"og:site_name\" content=\"PMA GmbH - IT Security\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-17T09:35:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/Marketing-Agency-bueno-Icon.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pma-it-security.de\/referenzen\/\",\"url\":\"https:\/\/pma-it-security.de\/referenzen\/\",\"name\":\"Referenzen - PMA GmbH - IT Security\",\"isPartOf\":{\"@id\":\"https:\/\/pma-it-security.de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pma-it-security.de\/referenzen\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pma-it-security.de\/referenzen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/Marketing-Agency-bueno-Icon.svg\",\"datePublished\":\"2023-11-17T09:31:22+00:00\",\"dateModified\":\"2023-11-17T09:35:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/pma-it-security.de\/referenzen\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pma-it-security.de\/referenzen\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pma-it-security.de\/referenzen\/#primaryimage\",\"url\":\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/Marketing-Agency-bueno-Icon.svg\",\"contentUrl\":\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/Marketing-Agency-bueno-Icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pma-it-security.de\/referenzen\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/pma-it-security.de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Referenzen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pma-it-security.de\/#website\",\"url\":\"https:\/\/pma-it-security.de\/\",\"name\":\"PMA GmbH - IT Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/pma-it-security.de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pma-it-security.de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pma-it-security.de\/#organization\",\"name\":\"PMA GmbH\",\"url\":\"https:\/\/pma-it-security.de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pma-it-security.de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/PMA-800-x-800-px-7.png\",\"contentUrl\":\"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/PMA-800-x-800-px-7.png\",\"width\":800,\"height\":800,\"caption\":\"PMA GmbH\"},\"image\":{\"@id\":\"https:\/\/pma-it-security.de\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Referenzen - PMA GmbH - IT Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pma-it-security.de\/en\/referenzen\/","og_locale":"en_US","og_type":"article","og_title":"Referenzen - PMA GmbH - IT Security","og_description":"REFERENZEN Unsere Kunden Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor. LEISTUNGEN Ihr Partner f\u00fcr Unternehmen und Institutionen mit sehr hohen Sicherheitsanforderungen CONSULTING &amp; BERATUNG Etablierung von Prozessen und Betriebskonzepten Bedrohungsanalyse und Bedrohungsmodellierung Sicherheitsstrategie Infrastruktur f\u00fcr \u00f6ffentliche Schl\u00fcssel (PKI) Hardware-Sicherheitsmodule (HSM) und Smartcards Sicherheitsprotokolle, z. B. Transport Layer Security (TLS\/SSL) BEWERTUNG &amp; ANALYSE Wenn Sie die Behauptungen eines Anbieters \u00fcber Produkteigenschaften \u00fcberpr\u00fcfen wollen, Open-Source-Softwarekomponenten f\u00fcr die Produktintegration evaluieren oder Sicherheitsaspekte Ihrer eigenen Produkte verifizieren wollen: Wir evaluieren, analysieren und verifizieren die Software. Wir unterst\u00fctzen Sie auch bei der Vorbereitung auf eine staatliche oder industrielle Zertifizierung. \u00dcberpr\u00fcfung des QuellcodesStatische und dynamische Analyse Reverse Engineering von Software und Hardware Reine Bin\u00e4r- und Blackbox-Analyse Vorbereitung von Dokumenten f\u00fcr die Zertifizier SOFTWARE-ENTWICKLUNG Unsere besonderen Fachgebiete sind Sicherheitsaspekte von Software, Kommunikationsprotokolle und Kryptographie. Wir erstellen Software mit schnellen Feedback-Zyklen unter Verwendung eines agilen Prozesses in den folgenden Bereichen: Sichere vernetzte Systeme Angewandte Informationssicherheit Theorie und Praxis der Kryptographie Hocheffiziente Implementierungen It\u00b4s not all black&nbsp; or&nbsp;white Thinking OUT OF THE BOX 20 Jahre Erfahrung in der IT\/Cyber-Security.\u00a0 Sicherheitskonzepte f\u00fcr Ihr Unternehmen oder Institution, die im Arbeitsalltag tats\u00e4chlich nutz- und umsetzbar sind. Wir setzen bei sicheren Systemen an, die hohe Sicherheitsstandards erf\u00fcllen.","og_url":"https:\/\/pma-it-security.de\/en\/referenzen\/","og_site_name":"PMA GmbH - IT Security","article_modified_time":"2023-11-17T09:35:37+00:00","og_image":[{"url":"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/Marketing-Agency-bueno-Icon.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pma-it-security.de\/referenzen\/","url":"https:\/\/pma-it-security.de\/referenzen\/","name":"Referenzen - PMA GmbH - IT Security","isPartOf":{"@id":"https:\/\/pma-it-security.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pma-it-security.de\/referenzen\/#primaryimage"},"image":{"@id":"https:\/\/pma-it-security.de\/referenzen\/#primaryimage"},"thumbnailUrl":"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/Marketing-Agency-bueno-Icon.svg","datePublished":"2023-11-17T09:31:22+00:00","dateModified":"2023-11-17T09:35:37+00:00","breadcrumb":{"@id":"https:\/\/pma-it-security.de\/referenzen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pma-it-security.de\/referenzen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pma-it-security.de\/referenzen\/#primaryimage","url":"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/Marketing-Agency-bueno-Icon.svg","contentUrl":"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/Marketing-Agency-bueno-Icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/pma-it-security.de\/referenzen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/pma-it-security.de\/"},{"@type":"ListItem","position":2,"name":"Referenzen"}]},{"@type":"WebSite","@id":"https:\/\/pma-it-security.de\/#website","url":"https:\/\/pma-it-security.de\/","name":"PMA GmbH - IT Security","description":"","publisher":{"@id":"https:\/\/pma-it-security.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pma-it-security.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pma-it-security.de\/#organization","name":"PMA GmbH","url":"https:\/\/pma-it-security.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pma-it-security.de\/#\/schema\/logo\/image\/","url":"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/PMA-800-x-800-px-7.png","contentUrl":"https:\/\/pma-it-security.de\/wp-content\/uploads\/2023\/11\/PMA-800-x-800-px-7.png","width":800,"height":800,"caption":"PMA GmbH"},"image":{"@id":"https:\/\/pma-it-security.de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/pma-it-security.de\/en\/wp-json\/wp\/v2\/pages\/365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pma-it-security.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pma-it-security.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pma-it-security.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pma-it-security.de\/en\/wp-json\/wp\/v2\/comments?post=365"}],"version-history":[{"count":4,"href":"https:\/\/pma-it-security.de\/en\/wp-json\/wp\/v2\/pages\/365\/revisions"}],"predecessor-version":[{"id":402,"href":"https:\/\/pma-it-security.de\/en\/wp-json\/wp\/v2\/pages\/365\/revisions\/402"}],"wp:attachment":[{"href":"https:\/\/pma-it-security.de\/en\/wp-json\/wp\/v2\/media?parent=365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}