{"id":3832,"date":"2024-07-04T14:20:07","date_gmt":"2024-07-04T12:20:07","guid":{"rendered":"https:\/\/www.weihrich.ch\/xdr\/"},"modified":"2026-04-15T10:22:52","modified_gmt":"2026-04-15T08:22:52","slug":"xdr","status":"publish","type":"page","link":"https:\/\/www.weihrich.ch\/en\/xdr\/","title":{"rendered":"XDR"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;_initial&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_type=&#8221;circular&#8221; background_color_gradient_direction_radial=&#8221;left&#8221; background_color_gradient_stops=&#8221;rgba(255,255,255,0.79) 45%|rgba(41,196,169,0) 100%&#8221; background_image=&#8221;https:\/\/www.weihrich.ch\/wp-content\/uploads\/2023\/04\/Weihrich-Informatik-GmbH-Landing-Hintergrund-2-optimized.png&#8221; background_position=&#8221;top_center&#8221; background_vertical_offset=&#8221;31%&#8221; background_blend=&#8221;overlay&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;_initial&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;74f7d652-2fbd-47fc-a097-45e9c318505c&#8221; text_text_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Welcome to the XDR solution from Weihrich Informatik<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;_initial&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row make_equal=&#8221;on&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;74f7d652-2fbd-47fc-a097-45e9c318505c&#8221; position_origin_a=&#8221;center_left&#8221; position_origin_a_tablet=&#8221;center_left&#8221; position_origin_a_phone=&#8221;center_left&#8221; position_origin_a_last_edited=&#8221;on|tablet&#8221; position_origin_f_tablet=&#8221;&#8221; position_origin_f_phone=&#8221;&#8221; position_origin_f_last_edited=&#8221;on|tablet&#8221; position_origin_r_tablet=&#8221;&#8221; position_origin_r_phone=&#8221;&#8221; position_origin_r_last_edited=&#8221;on|tablet&#8221; width=&#8221;100%&#8221; positioning_tablet=&#8221;none&#8221; positioning_phone=&#8221;none&#8221; positioning_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>What is XDR?<\/h2>\n<p>Extended Detection and Response (XDR) is the most advanced security solution for organizations that understand the need for comprehensive protection against the ever-growing threats of the cyber world. Our XDR platform integrates multiple security tools and provides a centralized overview and control. <\/p>\n<p><a href=\"\/wp-content\/uploads\/2024\/07\/Weihrich-Informatik-Modern-Managed-Workplace.pdf\" download=\"\" target=\"_blank\" rel=\"noopener\">Here<\/a> you will find all information at a glance.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;_initial&#8221; background_color=&#8221;#f2f2f2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Why XDR?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Improved security&#8221; image=&#8221;https:\/\/www.weihrich.ch\/wp-content\/uploads\/2023\/03\/partner_exchange_FILL0_wght400_GRAD0_opsz48.svg&#8221; icon_alignment=&#8221;left&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;_initial&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#d9883a&#8221; header_font_size=&#8221;24px&#8221; custom_margin=&#8221;|0px||0px|false|true&#8221; custom_padding=&#8221;|0px||0px|false|true&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Protect your data and systems from complex cyber threats. Our XDR platform offers advanced detection and response mechanisms that identify and neutralize threats in real time. <\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Increased efficiency&#8221; image=&#8221;https:\/\/www.weihrich.ch\/wp-content\/uploads\/2023\/03\/lightbulb_FILL0_wght400_GRAD0_opsz48.svg&#8221; icon_alignment=&#8221;left&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;_initial&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#d9883a&#8221; header_font_size=&#8221;24px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Consolidate security information from different sources on one platform. This enables faster analysis and response to security incidents, reducing administrative overhead. <\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Proactive measures&#8221; image=&#8221;https:\/\/www.weihrich.ch\/wp-content\/uploads\/2023\/03\/add_task_FILL0_wght400_GRAD0_opsz48.svg&#8221; icon_alignment=&#8221;left&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;_initial&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#d9883a&#8221; header_font_size=&#8221;24px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Use threat intelligence and security analysis to proactively combat attacks. Through continuous monitoring and adaptation, you can close security gaps before they are exploited. <\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Compliance and data protection&#8221; image=&#8221;https:\/\/www.weihrich.ch\/wp-content\/uploads\/2023\/03\/headset_mic_FILL0_wght400_GRAD0_opsz48.svg&#8221; icon_alignment=&#8221;left&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;_initial&#8221; header_text_align=&#8221;left&#8221; header_text_color=&#8221;#d9883a&#8221; header_font_size=&#8221;24px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Ensure that your data is stored and processed in accordance with regional data protection regulations. Our solution helps you meet legal requirements while protecting the privacy of your customers. <\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.weihrich.ch\/wp-content\/uploads\/2024\/07\/Screenshot-2024-07-29-111515-optimized.png&#8221; alt=&#8221;XDR-solution&#8221; title_text=&#8221;XDR solution&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;Awareness training&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;_initial&#8221; background_color=&#8221;#f2f2f2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;74f7d652-2fbd-47fc-a097-45e9c318505c&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Threat scenarios<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;74f7d652-2fbd-47fc-a097-45e9c318505c&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Phishing  <\/h3>\n<p>[\/et_pb_text][et_pb_blurb image=&#8221;https:\/\/www.weihrich.ch\/wp-content\/uploads\/2024\/07\/8666595_x_icon-optimized.png&#8221; alt=&#8221;x&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; icon_placement_tablet=&#8221;left&#8221; icon_placement_phone=&#8221;left&#8221; icon_placement_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;_initial&#8221; header_text_align=&#8221;left&#8221; header_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding_tablet=&#8221;20px||||false|true&#8221; custom_padding_phone=&#8221;17px||||false|true&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.7em&#8221; header_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Cyber criminals pretend to be someone else in order to obtain passwords and credit card details.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;74f7d652-2fbd-47fc-a097-45e9c318505c&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Network security<\/h3>\n<p>[\/et_pb_text][et_pb_blurb image=&#8221;https:\/\/www.weihrich.ch\/wp-content\/uploads\/2024\/07\/8666595_x_icon-optimized.png&#8221; alt=&#8221;x&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; icon_placement_tablet=&#8221;left&#8221; icon_placement_phone=&#8221;left&#8221; icon_placement_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.26.0&#8243; _module_preset=&#8221;_initial&#8221; header_text_align=&#8221;left&#8221; header_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding_tablet=&#8221;20px||||false|true&#8221; custom_padding_phone=&#8221;17px||||false|true&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.7em&#8221; header_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Attackers exploit network vulnerabilities, leading to unauthorized access and data loss.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;74f7d652-2fbd-47fc-a097-45e9c318505c&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Cloud security<\/h3>\n<p>[\/et_pb_text][et_pb_blurb image=&#8221;https:\/\/www.weihrich.ch\/wp-content\/uploads\/2024\/07\/8666595_x_icon-optimized.png&#8221; alt=&#8221;x&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; icon_placement_tablet=&#8221;left&#8221; icon_placement_phone=&#8221;left&#8221; icon_placement_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;_initial&#8221; header_text_align=&#8221;left&#8221; header_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding_tablet=&#8221;20px||||false|true&#8221; custom_padding_phone=&#8221;17px||||false|true&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.7em&#8221; header_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Hackers attack vulnerabilities in cloud services to steal or manipulate data.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;74f7d652-2fbd-47fc-a097-45e9c318505c&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Endpoint security<\/h3>\n<p>[\/et_pb_text][et_pb_blurb image=&#8221;https:\/\/www.weihrich.ch\/wp-content\/uploads\/2024\/07\/8666595_x_icon-optimized.png&#8221; alt=&#8221;x&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; icon_placement_tablet=&#8221;left&#8221; icon_placement_phone=&#8221;left&#8221; icon_placement_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;_initial&#8221; header_text_align=&#8221;left&#8221; header_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding_tablet=&#8221;20px||||false|true&#8221; custom_padding_phone=&#8221;17px||||false|true&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.7em&#8221; header_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Malware and ransomware infect end devices such as laptops and desktops, leading to data encryption, blackmail and system failures.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;_initial&#8221; background_enable_color=&#8221;off&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;74f7d652-2fbd-47fc-a097-45e9c318505c&#8221; position_origin_a=&#8221;center_left&#8221; position_origin_a_tablet=&#8221;center_left&#8221; position_origin_a_phone=&#8221;center_left&#8221; position_origin_a_last_edited=&#8221;on|tablet&#8221; position_origin_f_tablet=&#8221;&#8221; position_origin_f_phone=&#8221;&#8221; position_origin_f_last_edited=&#8221;on|tablet&#8221; position_origin_r_tablet=&#8221;&#8221; position_origin_r_phone=&#8221;&#8221; position_origin_r_last_edited=&#8221;on|tablet&#8221; width=&#8221;100%&#8221; positioning_tablet=&#8221;none&#8221; positioning_phone=&#8221;none&#8221; positioning_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Protection strategies<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_css_free_form=&#8221;.toggle-text-1, .toggle-text-2, .toggle-text-3, .toggle-text-4 {||    display: none;||}||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_text=&#8221;Secure user access&#8221; module_class=&#8221;toggle-button-1&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][et_pb_text module_class=&#8221;toggle-text-1&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Use multi-factor authentication and strong password policies.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_text=&#8221;  Regular backups&#8221; module_class=&#8221;toggle-button-2&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][et_pb_text module_class=&#8221;toggle-text-2&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Back up your data regularly and protect it from ransomware.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_text=&#8221;User training&#8221; module_class=&#8221;toggle-button-3&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][et_pb_text module_class=&#8221;toggle-text-3&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Raise your employees&#8217; awareness of cyber threats and train them in the secure use of emails and online services.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_text=&#8221;Patch management&#8221; module_class=&#8221;toggle-button-4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][et_pb_text module_class=&#8221;toggle-text-4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Keep your systems up to date to close security gaps.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;Awareness training&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;_initial&#8221; background_color=&#8221;#f2f2f2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;74f7d652-2fbd-47fc-a097-45e9c318505c&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Our technologies<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;_initial&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;74f7d652-2fbd-47fc-a097-45e9c318505c&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>E-mail security<\/h3>\n<p>[\/et_pb_text][et_pb_blurb image=&#8221;https:\/\/www.weihrich.ch\/wp-content\/uploads\/2023\/03\/Check-Icon.svg&#8221; alt=&#8221;Icon Weihrich Informatics&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; icon_placement_tablet=&#8221;left&#8221; icon_placement_phone=&#8221;left&#8221; icon_placement_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;_initial&#8221; header_text_align=&#8221;left&#8221; header_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding_tablet=&#8221;20px||||false|true&#8221; custom_padding_phone=&#8221;17px||||false|true&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.7em&#8221; header_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Our solution offers multi-layered protection against phishing, business email compromise and account takeover. By using artificial intelligence and machine learning, threats are detected and averted at an early stage so that your communication always remains secure. <\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;74f7d652-2fbd-47fc-a097-45e9c318505c&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Network security<\/h3>\n<p>[\/et_pb_text][et_pb_blurb image=&#8221;https:\/\/www.weihrich.ch\/wp-content\/uploads\/2023\/03\/Check-Icon.svg&#8221; alt=&#8221;Icon Weihrich Informatics&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; icon_placement_tablet=&#8221;left&#8221; icon_placement_phone=&#8221;left&#8221; icon_placement_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;_initial&#8221; header_text_align=&#8221;left&#8221; header_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding_tablet=&#8221;20px||||false|true&#8221; custom_padding_phone=&#8221;17px||||false|true&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.7em&#8221; header_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Detect and block threats in network traffic with advanced intrusion detection system (IDS) capabilities. Our technology analyzes billions of pieces of threat intelligence and correlates them to identify and stop potential threats such as command-and-control connections, DDoS attacks and data exfiltration. <\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;74f7d652-2fbd-47fc-a097-45e9c318505c&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Cloud security<\/h3>\n<p>[\/et_pb_text][et_pb_blurb image=&#8221;https:\/\/www.weihrich.ch\/wp-content\/uploads\/2023\/03\/Check-Icon.svg&#8221; alt=&#8221;Icon Weihrich Informatics&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; icon_placement_tablet=&#8221;left&#8221; icon_placement_phone=&#8221;left&#8221; icon_placement_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;_initial&#8221; header_text_align=&#8221;left&#8221; header_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding_tablet=&#8221;20px||||false|true&#8221; custom_padding_phone=&#8221;17px||||false|true&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.7em&#8221; header_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Protect your cloud applications and data from unauthorized access and attacks. Our cloud security solutions continuously monitor suspicious activity and identify identity, asset and privilege risks. We use machine learning to detect anomalous activity and effectively secure your cloud environments.  <\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;74f7d652-2fbd-47fc-a097-45e9c318505c&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Endpoint security<\/h3>\n<p>[\/et_pb_text][et_pb_blurb image=&#8221;https:\/\/www.weihrich.ch\/wp-content\/uploads\/2023\/03\/Check-Icon.svg&#8221; alt=&#8221;Icon Weihrich Informatics&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; icon_placement_tablet=&#8221;left&#8221; icon_placement_phone=&#8221;left&#8221; icon_placement_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;_initial&#8221; header_text_align=&#8221;left&#8221; header_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;||10px||false|false&#8221; custom_padding_tablet=&#8221;20px||||false|true&#8221; custom_padding_phone=&#8221;17px||||false|true&#8221; custom_padding_last_edited=&#8221;off|desktop&#8221; header_line_height_tablet=&#8221;1.3em&#8221; header_line_height_phone=&#8221;1.7em&#8221; header_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Comprehensive protection for laptops, desktops and servers against malware and ransomware. Our endpoint security solutions integrate seamlessly with existing EDR solutions and provide comprehensive protection using technologies such as SentinelOne. Threats are monitored on endpoints and analyzed using the MITRE ATT&amp;CK framework to quickly detect and defend against attacks.  <\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>XDR at a glance<\/h2>\n<p>Our XDR platform offers a centralized solution for your entire security infrastructure. It combines various security solutions and offers comprehensive protection against current and future threats. With our XDR solution, you are always one step ahead and can concentrate on your core business while we take care of your security.  <\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.weihrich.ch\/en\/contact-us\/&#8221; button_text=&#8221;Secure your appointment now&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the XDR solution from Weihrich InformatikWhat is XDR? Extended Detection and Response (XDR) is the most advanced security solution for organizations that understand the need for comprehensive protection against the ever-growing threats of the cyber world. Our XDR platform integrates multiple security tools and provides a centralized overview and control. Here you will [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":1464,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-3832","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>XDR - Weihrich Informatik<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.weihrich.ch\/en\/xdr\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"XDR - Weihrich Informatik\" \/>\n<meta property=\"og:description\" content=\"Welcome to the XDR solution from Weihrich InformatikWhat is XDR? Extended Detection and Response (XDR) is the most advanced security solution for organizations that understand the need for comprehensive protection against the ever-growing threats of the cyber world. Our XDR platform integrates multiple security tools and provides a centralized overview and control. Here you will [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.weihrich.ch\/en\/xdr\/\" \/>\n<meta property=\"og:site_name\" content=\"Weihrich Informatik\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weihrichinformatik\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-15T08:22:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.weihrich.ch\/wp-content\/uploads\/2022\/10\/Weihrich-Informatik-Post-Hintergrund.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@weihrich_it\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/xdr\\\/\",\"url\":\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/xdr\\\/\",\"name\":\"XDR - Weihrich Informatik\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/xdr\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/xdr\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.weihrich.ch\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Weihrich-Informatik-Post-Hintergrund.png\",\"datePublished\":\"2024-07-04T12:20:07+00:00\",\"dateModified\":\"2026-04-15T08:22:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/xdr\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/xdr\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/xdr\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.weihrich.ch\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Weihrich-Informatik-Post-Hintergrund.png\",\"contentUrl\":\"https:\\\/\\\/www.weihrich.ch\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Weihrich-Informatik-Post-Hintergrund.png\",\"width\":1200,\"height\":750,\"caption\":\"Weihrich Informatik Post Hintergrund\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/xdr\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"XDR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/\",\"name\":\"Weihrich Informatik GmbH\",\"description\":\"Alles f\u00fcr Ihren Erfolg\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/#organization\",\"name\":\"Weihrich Informatik GmbH\",\"url\":\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.weihrich.ch\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cropped-Weihrich-Informatik-Icon_2@512x-8.png\",\"contentUrl\":\"https:\\\/\\\/www.weihrich.ch\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/cropped-Weihrich-Informatik-Icon_2@512x-8.png\",\"width\":512,\"height\":512,\"caption\":\"Weihrich Informatik GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/www.weihrich.ch\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/weihrichinformatik\\\/\",\"https:\\\/\\\/x.com\\\/weihrich_it\",\"https:\\\/\\\/www.instagram.com\\\/weihrichinformatik\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/weihrich-informatik-gmbh\\\/\",\"https:\\\/\\\/www.xing.com\\\/pages\\\/weihrichinformatikgmbh\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"XDR - Weihrich Informatik","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.weihrich.ch\/en\/xdr\/","og_locale":"en_US","og_type":"article","og_title":"XDR - Weihrich Informatik","og_description":"Welcome to the XDR solution from Weihrich InformatikWhat is XDR? Extended Detection and Response (XDR) is the most advanced security solution for organizations that understand the need for comprehensive protection against the ever-growing threats of the cyber world. Our XDR platform integrates multiple security tools and provides a centralized overview and control. Here you will [&hellip;]","og_url":"https:\/\/www.weihrich.ch\/en\/xdr\/","og_site_name":"Weihrich Informatik","article_publisher":"https:\/\/www.facebook.com\/weihrichinformatik\/","article_modified_time":"2026-04-15T08:22:52+00:00","og_image":[{"width":1200,"height":750,"url":"https:\/\/www.weihrich.ch\/wp-content\/uploads\/2022\/10\/Weihrich-Informatik-Post-Hintergrund.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@weihrich_it","twitter_misc":{"Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.weihrich.ch\/en\/xdr\/","url":"https:\/\/www.weihrich.ch\/en\/xdr\/","name":"XDR - Weihrich Informatik","isPartOf":{"@id":"https:\/\/www.weihrich.ch\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.weihrich.ch\/en\/xdr\/#primaryimage"},"image":{"@id":"https:\/\/www.weihrich.ch\/en\/xdr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.weihrich.ch\/wp-content\/uploads\/2022\/10\/Weihrich-Informatik-Post-Hintergrund.png","datePublished":"2024-07-04T12:20:07+00:00","dateModified":"2026-04-15T08:22:52+00:00","breadcrumb":{"@id":"https:\/\/www.weihrich.ch\/en\/xdr\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.weihrich.ch\/en\/xdr\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.weihrich.ch\/en\/xdr\/#primaryimage","url":"https:\/\/www.weihrich.ch\/wp-content\/uploads\/2022\/10\/Weihrich-Informatik-Post-Hintergrund.png","contentUrl":"https:\/\/www.weihrich.ch\/wp-content\/uploads\/2022\/10\/Weihrich-Informatik-Post-Hintergrund.png","width":1200,"height":750,"caption":"Weihrich Informatik Post Hintergrund"},{"@type":"BreadcrumbList","@id":"https:\/\/www.weihrich.ch\/en\/xdr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.weihrich.ch\/en\/"},{"@type":"ListItem","position":2,"name":"XDR"}]},{"@type":"WebSite","@id":"https:\/\/www.weihrich.ch\/en\/#website","url":"https:\/\/www.weihrich.ch\/en\/","name":"Weihrich Informatik GmbH","description":"Alles f\u00fcr Ihren Erfolg","publisher":{"@id":"https:\/\/www.weihrich.ch\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.weihrich.ch\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.weihrich.ch\/en\/#organization","name":"Weihrich Informatik GmbH","url":"https:\/\/www.weihrich.ch\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.weihrich.ch\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.weihrich.ch\/wp-content\/uploads\/2023\/03\/cropped-Weihrich-Informatik-Icon_2@512x-8.png","contentUrl":"https:\/\/www.weihrich.ch\/wp-content\/uploads\/2023\/03\/cropped-Weihrich-Informatik-Icon_2@512x-8.png","width":512,"height":512,"caption":"Weihrich Informatik GmbH"},"image":{"@id":"https:\/\/www.weihrich.ch\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weihrichinformatik\/","https:\/\/x.com\/weihrich_it","https:\/\/www.instagram.com\/weihrichinformatik\/","https:\/\/www.linkedin.com\/company\/weihrich-informatik-gmbh\/","https:\/\/www.xing.com\/pages\/weihrichinformatikgmbh"]}]}},"_links":{"self":[{"href":"https:\/\/www.weihrich.ch\/en\/wp-json\/wp\/v2\/pages\/3832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.weihrich.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.weihrich.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.weihrich.ch\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.weihrich.ch\/en\/wp-json\/wp\/v2\/comments?post=3832"}],"version-history":[{"count":5,"href":"https:\/\/www.weihrich.ch\/en\/wp-json\/wp\/v2\/pages\/3832\/revisions"}],"predecessor-version":[{"id":5272,"href":"https:\/\/www.weihrich.ch\/en\/wp-json\/wp\/v2\/pages\/3832\/revisions\/5272"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.weihrich.ch\/en\/wp-json\/wp\/v2\/media\/1464"}],"wp:attachment":[{"href":"https:\/\/www.weihrich.ch\/en\/wp-json\/wp\/v2\/media?parent=3832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}