{"id":32991,"date":"2024-06-23T13:40:55","date_gmt":"2024-06-23T13:40:55","guid":{"rendered":"https:\/\/waterfall-security.com\/technology-and-products\/hera\/"},"modified":"2025-12-15T14:31:35","modified_gmt":"2025-12-15T14:31:35","slug":"hera","status":"publish","type":"technology___product","link":"https:\/\/waterfall-security.com\/de\/technology-and-products\/hera\/","title":{"rendered":"HERA"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"32991\" class=\"elementor elementor-32991 elementor-23465\" data-elementor-post-type=\"technology___product\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33d7d71e hera-banner e-flex e-con-boxed e-con e-parent\" data-id=\"33d7d71e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4d51f6c8 e-con-full hera-banner-area e-flex e-con e-child\" data-id=\"4d51f6c8\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e0e0b49 e-con-full hera-banner-title-section e-flex e-con e-child\" data-id=\"e0e0b49\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c8c2305 hera-banner-main-title elementor-widget elementor-widget-heading\" data-id=\"c8c2305\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Hardwarebasierter sicherer Fernzugriff f\u00fcr OT-Umgebungen<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c48177b hera-banner-description elementor-widget elementor-widget-text-editor\" data-id=\"6c48177b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>HERA erfindet den sicheren OT-Fernzugriff mit eingebauten physischen Schutzvorrichtungen neu und bietet so un\u00fcbertroffene Sicherheit f\u00fcr Ihre kritischen Systeme.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-749361b3 hera-btns-area e-flex e-con-boxed e-con e-child\" data-id=\"749361b3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-537df92a hera-banner-btn-one elementor-widget elementor-widget-button\" data-id=\"537df92a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/de\/contact-us\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Demo buchen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46d20575 e-con-full e-flex e-con e-child\" data-id=\"46d20575\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7fca8863 video__open hera-banner-main-image elementor-widget elementor-widget-image\" data-id=\"7fca8863\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" loading=\"lazy\" width=\"565\" height=\"379\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2024\/06\/hera-ot-remote-access-video.png\" class=\"attachment-full size-full wp-image-32664\" alt=\"hera ot remote access video\" srcset=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2024\/06\/hera-ot-remote-access-video.png 565w, https:\/\/waterfall-security.com\/wp-content\/uploads\/2024\/06\/hera-ot-remote-access-video-300x201.png 300w\" sizes=\"auto, (max-width: 565px) 100vw, 565px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3cd7b2dd hera-features-section e-flex e-con-boxed e-con e-parent\" data-id=\"3cd7b2dd\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-221c48c3 e-con-full hera-features-container e-flex e-con e-child\" data-id=\"221c48c3\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-18ac5a3d hera-features-box e-con-full e-flex e-con e-child\" data-id=\"18ac5a3d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ebf9ff1 elementor-widget-laptop__width-initial hera-features-img elementor-widget elementor-widget-image\" data-id=\"1ebf9ff1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/icon-2.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a5c9edd elementor-widget-mobile__width-initial hera-features-title elementor-widget elementor-widget-text-editor\" data-id=\"3a5c9edd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3>IT\/OT-Integration mit physischer Segmentierung<\/h3><p>Ein physischer Schutz, der OT-Umgebungen vor allen Cyberbedrohungen abschirmt und gleichzeitig einen nahtlos verwaltbaren Fernzugriff erm\u00f6glicht.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-16ec087b hera-features-box e-con-full e-flex e-con e-child\" data-id=\"16ec087b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e061188 elementor-widget-laptop__width-initial hera-features-img elementor-widget elementor-widget-image\" data-id=\"e061188\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/icon-4.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bfc27a2 elementor-widget-mobile__width-initial hera-features-title elementor-widget elementor-widget-text-editor\" data-id=\"5bfc27a2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3>Voll funktionsf\u00e4higer Fernzugriff<\/h3><p>Erleben Sie einen vollst\u00e4ndig sicheren Fernzugriff mit allem, was Sie brauchen \u2013 in einer einzigen L\u00f6sung.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c636ba7 hera-features-box e-con-full e-flex e-con e-child\" data-id=\"4c636ba7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54abd212 elementor-widget-laptop__width-initial hera-features-img elementor-widget elementor-widget-image\" data-id=\"54abd212\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/icon-5.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f315543 elementor-widget-mobile__width-initial hera-features-title elementor-widget elementor-widget-text-editor\" data-id=\"7f315543\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3>Zuverl\u00e4ssig und sicher<\/h3><p>Bew\u00e4hrte unidirektionale Technologie, die seit 2007 weltweit erfolgreich OT-Umgebungen sch\u00fctzt.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-57c9347 e-con-full hera-hardware-section e-flex e-con e-parent\" data-id=\"57c9347\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-399084d7 h2_with_svg elementor-widget elementor-widget-heading\" data-id=\"399084d7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Hardwarebasierter Fernzugriff in Aktion<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-592d8b29 hera-hardware-box e-flex e-con-boxed e-con e-child\" data-id=\"592d8b29\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48affbd0 elementor-widget elementor-widget-image\" data-id=\"48affbd0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/HERA-diagram-v2.png\" data-elementor-open-lightbox=\"yes\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MzE4NzIsInVybCI6ZmFsc2V9\">\n\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/HERA-diagram-v2.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c0c9f13 e-con-full hera-security-section e-flex e-con e-parent\" data-id=\"3c0c9f13\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-72574c91 elementor-widget-mobile__width-initial hera-security-title elementor-widget elementor-widget-heading\" data-id=\"72574c91\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Eingebetteter Schutz, un\u00fcbertroffene Sicherheit<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2103d0af e-flex e-con-boxed e-con e-child\" data-id=\"2103d0af\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-418fb97c hera-defence-box e-con-full e-flex e-con e-child\" data-id=\"418fb97c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-13ccfe21 elementor-widget-laptop__width-initial hera-defence-img elementor-widget elementor-widget-image\" data-id=\"13ccfe21\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/icon-6@2x.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ef74719 elementor-widget-mobile__width-initial hera-defence-title elementor-widget elementor-widget-text-editor\" data-id=\"1ef74719\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3>Physische Absicherung der OT-Umgebung<\/h3><p>HERA\u00ae sichert Ihre OT-Umgebungen mit zwei erstklassigen Unidirectional Gateways, die das Risiko der Ausbreitung von Angriffen auf das OT-Netzwerk eliminieren.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-307fb84e hera-defence-box e-con-full e-flex e-con e-child\" data-id=\"307fb84e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-527f4ee5 elementor-widget-laptop__width-initial hera-defence-img elementor-widget elementor-widget-image\" data-id=\"527f4ee5\" data-element_type=\"widget\" id=\"globe-image\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/icon-7@2x.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-231ec934 elementor-widget-mobile__width-initial hera-defence-title elementor-widget elementor-widget-text-editor\" data-id=\"231ec934\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3>Verbesserte Protokollisolierung<\/h3><p>Physikalisch getrennte, verschl\u00fcsselte Eingangs- und Ausgangskan\u00e4le erm\u00f6glichen eine strikte Protokollisolierung und verhindern Man-in-the-Middle-Angriffe. Nur Maus- und Tastatureingaben werden vom Client an den Server gesendet.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-45efdcaa hera-defence-box e-con-full e-flex e-con e-child\" data-id=\"45efdcaa\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-687713f7 elementor-widget-laptop__width-initial hera-defence-img elementor-widget elementor-widget-image\" data-id=\"687713f7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/icon-8@2x.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94e6cfc elementor-widget-mobile__width-initial hera-defence-title elementor-widget elementor-widget-text-editor\" data-id=\"94e6cfc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3>Spezialisierte clientseitige Software<\/h3><p>Die <span data-teams=\"true\">hardwarebasierte <\/span>Trusted Platform Module (TPM)-Technologie sichert die Schl\u00fcsselspeicherung, um Schl\u00fcsseldiebstahl zu verhindern, und nutzt die Nachrichtenverschl\u00fcsselung, um clientseitige Angriffe zu verhindern. Die Bindung der Hardware an den Benutzer und den Standort gew\u00e4hrleistet die st\u00e4rkste Multifaktor-Authentifizierung.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1981d93d hera-faq-box e-flex e-con-boxed e-con e-parent\" data-id=\"1981d93d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9f9e7e6 hera-faq-title-area elementor-widget elementor-widget-heading\" data-id=\"9f9e7e6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sicherer Fernzugriff mit fein abgestufter Kontrolle<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ff36a60 e-con-full hera-secure-box e-flex e-con e-child\" data-id=\"5ff36a60\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6955671e hera-faq-area elementor-widget elementor-widget-n-accordion\" data-id=\"6955671e\" data-element_type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"hera-faq-wrap-one\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"hera-faq-wrap-one\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Sitzungsaufzeichnung <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"hera-faq-wrap-one\" class=\"elementor-element elementor-element-2f87357a e-con-full hera-faq-item e-flex e-con e-child\" data-id=\"2f87357a\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"hera-faq-wrap-one\" class=\"elementor-element elementor-element-7be2da2d e-con-full e-flex e-con e-child\" data-id=\"7be2da2d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3fe0df05 elementor-widget elementor-widget-image\" data-id=\"3fe0df05\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/Session-Recording-4.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"hera-faq-wrap-one\" class=\"elementor-element elementor-element-2a564b6e e-con-full secure-faq-content e-flex e-con e-child\" data-id=\"2a564b6e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d519e50 elementor-widget elementor-widget-text-editor\" data-id=\"7d519e50\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Verschaffen Sie sich durch die Echtzeit-Aufzeichnung von Sitzungen f\u00fcr alle Fernzugriffsaktivit\u00e4ten umfassende Transparenz und Verantwortlichkeit. Jede Benutzerinteraktion innerhalb der OT-Umgebung wird protokolliert, wodurch ein detaillierter Pr\u00fcfpfad f\u00fcr die Einhaltung von Vorschriften, forensische Analysen und die Sicherheits\u00fcberwachung entsteht.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1761\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1761\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Sitzungsmoderation <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1761\" class=\"elementor-element elementor-element-13ae4bb6 e-con-full hera-faq-item e-flex e-con e-child\" data-id=\"13ae4bb6\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1761\" class=\"elementor-element elementor-element-152c0947 e-con-full e-flex e-con e-child\" data-id=\"152c0947\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d53df24 elementor-widget elementor-widget-image\" data-id=\"5d53df24\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/Session-Moderation-1.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1761\" class=\"elementor-element elementor-element-2f1a413a e-con-full secure-faq-content e-flex e-con e-child\" data-id=\"2f1a413a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26d3d500 elementor-widget elementor-widget-text-editor\" data-id=\"26d3d500\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>\u00dcberwachen Sie bis zu 10 gleichzeitige aktive Benutzersitzungen durch einen Administrator und beobachten Sie sie in Echtzeit. Trennen Sie die Verbindung f\u00fcr Benutzer, die sich verd\u00e4chtig verhalten, \u00fcbernehmen Sie die Kontrolle \u00fcber aktive Sitzungen oder geben Sie Ihre Sitzung f\u00fcr einen anderen Benutzer frei. Erlauben Sie anderen, Ihre aktive Sitzung zu sehen, um mit ihnen zusammenzuarbeiten oder sie zu \u00fcberwachen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1762\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1762\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Fein abgestufte Benutzerverwaltung <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1762\" class=\"elementor-element elementor-element-4594db4a e-con-full hera-faq-item e-flex e-con e-child\" data-id=\"4594db4a\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1762\" class=\"elementor-element elementor-element-7321fdfb e-con-full e-flex e-con e-child\" data-id=\"7321fdfb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-597794bc elementor-widget elementor-widget-image\" data-id=\"597794bc\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/Fine-Grain-User-Management-1.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1762\" class=\"elementor-element elementor-element-5b5d8238 e-con-full secure-faq-content e-flex e-con e-child\" data-id=\"5b5d8238\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b39056 elementor-widget elementor-widget-text-editor\" data-id=\"6b39056\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Effiziente Zugriffsverwaltung mit einem ausgefeilten Rollenmanagementsystem, das die Erstellung von Benutzergruppen und Asset-Gruppen erm\u00f6glicht. F\u00fcgen Sie Benutzer hinzu oder entfernen Sie sie, trennen Sie ihre Verbindung zu Sitzungen oder Assets und weisen Sie ihnen Rollen wie Moderatoren, Benutzer oder Auftragnehmer zu, um die Kontrolle zu optimieren. Nahtlose Synchronisierung mit Active Directory f\u00fcr eine optimierte und effiziente Benutzerverwaltung in Ihrem gesamten System.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1763\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1763\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Zero-Trust-Kontrollen <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1763\" class=\"elementor-element elementor-element-40bc6cd2 hera-faq-item e-flex e-con-boxed e-con e-child\" data-id=\"40bc6cd2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1763\" class=\"elementor-element elementor-element-328c622 e-con-full e-flex e-con e-child\" data-id=\"328c622\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27816f82 elementor-widget elementor-widget-image\" data-id=\"27816f82\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/Zero-Trust-Controls-1.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1763\" class=\"elementor-element elementor-element-16c2d3ab e-con-full secure-faq-content e-flex e-con e-child\" data-id=\"16c2d3ab\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2994dd99 elementor-widget elementor-widget-text-editor\" data-id=\"2994dd99\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Implementierung eines zeitbasierten Zero-Trust-Zugriffs zur Erh\u00f6hung der Sicherheit durch Verifizierung jeder Zugriffsanfrage. Gew\u00e4hren Sie bestimmten Benutzern nur zu bestimmten Zeiten oder in vordefinierten Zeitfenstern Zugriff, um eine genaue Kontrolle zu gew\u00e4hrleisten und potenzielle Risiken zu minimieren.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1764\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1764\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Protokollierung und SIEM-Berichterstattung <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1764\" class=\"elementor-element elementor-element-152eedd3 hera-faq-item e-flex e-con-boxed e-con e-child\" data-id=\"152eedd3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1764\" class=\"elementor-element elementor-element-68726ef5 e-con-full e-flex e-con e-child\" data-id=\"68726ef5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2647db32 elementor-widget elementor-widget-image\" data-id=\"2647db32\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/Logging-SIEM-Reporting-1.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1764\" class=\"elementor-element elementor-element-5a42129a e-con-full secure-faq-content e-flex e-con e-child\" data-id=\"5a42129a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-562b5208 elementor-widget elementor-widget-text-editor\" data-id=\"562b5208\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Protokollieren und \u00fcberwachen Sie detaillierte und umfangreiche Kennzahlen in einem speziellen \u00dcberwachungssystem, das einen klaren Pr\u00fcfpfad f\u00fcr jede Aktivit\u00e4t bietet. Protokolle k\u00f6nnen auch nahtlos in SIEM-Tools exportiert werden, um eine erweiterte Analyse und Verwaltung von Sicherheitsereignissen zu erm\u00f6glichen und einen umfassenden \u00dcberblick zu gew\u00e4hrleisten.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1765\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1765\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Multi-Site-Management <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1765\" class=\"elementor-element elementor-element-4cfb28f7 hera-faq-item e-flex e-con-boxed e-con e-child\" data-id=\"4cfb28f7\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1765\" class=\"elementor-element elementor-element-25d0e04d e-con-full e-flex e-con e-child\" data-id=\"25d0e04d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16c66b90 elementor-widget elementor-widget-image\" data-id=\"16c66b90\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/Multi-Site-Management-1.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1765\" class=\"elementor-element elementor-element-ded2804 e-con-full secure-faq-content e-flex e-con e-child\" data-id=\"ded2804\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-565df065 elementor-widget elementor-widget-text-editor\" data-id=\"565df065\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Verwalten Sie ganz einfach mehrere Standorte \u00fcber eine einzige Schnittstelle. \u00dcberwachen und steuern Sie Vorg\u00e4nge an verschiedenen Standorten, ohne dass separate Logins oder Schnittstellen erforderlich sind.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1766\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1766\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Clientseitige Software <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1766\" class=\"elementor-element elementor-element-72bb01d6 hera-faq-item e-flex e-con-boxed e-con e-child\" data-id=\"72bb01d6\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1766\" class=\"elementor-element elementor-element-6f51299a e-con-full e-flex e-con e-child\" data-id=\"6f51299a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a64d8ef elementor-widget elementor-widget-image\" data-id=\"4a64d8ef\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/Client-Side-Software-1.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1766\" class=\"elementor-element elementor-element-56887ecd e-con-full secure-faq-content e-flex e-con e-child\" data-id=\"56887ecd\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e7b508d elementor-widget elementor-widget-text-editor\" data-id=\"4e7b508d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Sorgen Sie f\u00fcr sichere Verbindungen mit clientseitiger Software, die jedes Risiko von Man-in-the-Middle-Angriffen ausschlie\u00dft<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b734400 cta_block e-flex e-con-boxed e-con e-parent\" data-id=\"7b734400\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-426e5054 hera-secure-box e-flex e-con-boxed e-con e-child\" data-id=\"426e5054\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3631d217 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"3631d217\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sicherer Fernzugriff <br> ohne die Risiken der Netzwerkkonnektivit\u00e4t.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d17b324 elementor-align-left hera-secure-btn elementor-widget elementor-widget-button\" data-id=\"7d17b324\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/de\/contact-us\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Kostenlose Beratung buchen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"featured_media":32972,"parent":0,"menu_order":0,"template":"","class_list":["post-32991","technology___product","type-technology___product","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/technology___product\/32991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/technology___product"}],"about":[{"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/types\/technology___product"}],"version-history":[{"count":6,"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/technology___product\/32991\/revisions"}],"predecessor-version":[{"id":38024,"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/technology___product\/32991\/revisions\/38024"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/media\/32972"}],"wp:attachment":[{"href":"https:\/\/waterfall-security.com\/de\/wp-json\/wp\/v2\/media?parent=32991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}