{"id":35134,"date":"2024-05-30T15:35:03","date_gmt":"2024-05-30T15:35:03","guid":{"rendered":"https:\/\/www.bloomreach.com\/sicherheit-bei-bloomreach"},"modified":"2024-09-18T14:41:19","modified_gmt":"2024-09-18T14:41:19","slug":"sicherheit-bei-bloomreach","status":"publish","type":"page","link":"https:\/\/www.bloomreach.com\/de\/sicherheit-bei-bloomreach","title":{"rendered":"Sicherheit bei Bloomreach"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"35134\" class=\"elementor elementor-35134 elementor-27021\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b26939 e-flex e-con-boxed e-con e-parent\" data-id=\"9b26939\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2bf7458 e-con-full e-flex e-con e-child\" data-id=\"2bf7458\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-667fa9a e-con-full e-flex e-con e-child\" data-id=\"667fa9a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-943a21b elementor-widget elementor-widget-heading\" data-id=\"943a21b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Sicherheit bei Bloomreach<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12c53fc elementor-widget elementor-widget-text-editor\" data-id=\"12c53fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Sorgen Sie daf\u00fcr, dass Ihre Teams alle Kampagnen auf einer zentralen, nutzerfreundlichen Plattform erstellen, versenden, testen und analysieren \u2013 f\u00fcr maximalen Nutzen und h\u00f6chste Verl\u00e4sslichkeit.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-643b002 e-con-full e-flex e-con e-child\" data-id=\"643b002\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8466889 elementor-widget__width-initial elementor-absolute no_border_radius elementor-widget elementor-widget-image\" data-id=\"8466889\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/04\/bloomreach_pattern.svg\" class=\"attachment-full size-full wp-image-1278\" alt=\"bloomreach_pattern\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f4b5d7 elementor-widget__width-inherit elementor-widget elementor-widget-image\" data-id=\"5f4b5d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"810\" height=\"636\" src=\"https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/Rectangle-5.png\" class=\"attachment-full size-full wp-image-27031\" alt=\"Rectangle-5\" srcset=\"https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/Rectangle-5.png 810w, https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/Rectangle-5-300x236.png 300w, https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/Rectangle-5-768x603.png 768w\" sizes=\"(max-width: 810px) 100vw, 810px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73152a8 e-flex e-con-boxed e-con e-parent\" data-id=\"73152a8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27b0494 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"27b0494\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Weil Kontrolle besser ist<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fc6047 e-n-tabs-tablet elementor-widget elementor-widget-n-tabs\" data-id=\"6fc6047\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"117203015\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1172030151\" data-tab-title-id=\"e-n-tab-title-1172030151\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1172030151\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewBox=\"0 0 20 20\" fill=\"none\"><path d=\"M14.5312 9.46875C14.8125 9.78125 14.8125 10.25 14.5312 10.5312L8.53125 16.5312C8.21875 16.8438 7.75 16.8438 7.46875 16.5312C7.15625 16.25 7.15625 15.7812 7.46875 15.5L12.9375 10.0312L7.46875 4.53125C7.15625 4.25 7.15625 3.78125 7.46875 3.5C7.75 3.1875 8.21875 3.1875 8.5 3.5L14.5312 9.46875Z\" fill=\"#002840\"><\/path><\/svg>\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewBox=\"0 0 20 20\" fill=\"none\"><path d=\"M14.5312 9.46875C14.8125 9.78125 14.8125 10.25 14.5312 10.5312L8.53125 16.5312C8.21875 16.8438 7.75 16.8438 7.46875 16.5312C7.15625 16.25 7.15625 15.7812 7.46875 15.5L12.9375 10.0312L7.46875 4.53125C7.15625 4.25 7.15625 3.78125 7.46875 3.5C7.75 3.1875 8.21875 3.1875 8.5 3.5L14.5312 9.46875Z\" fill=\"#002840\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tUnsere Zertifizierungen\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1172030152\" data-tab-title-id=\"e-n-tab-title-1172030152\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1172030152\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewBox=\"0 0 20 20\" fill=\"none\"><path d=\"M14.5312 9.46875C14.8125 9.78125 14.8125 10.25 14.5312 10.5312L8.53125 16.5312C8.21875 16.8438 7.75 16.8438 7.46875 16.5312C7.15625 16.25 7.15625 15.7812 7.46875 15.5L12.9375 10.0312L7.46875 4.53125C7.15625 4.25 7.15625 3.78125 7.46875 3.5C7.75 3.1875 8.21875 3.1875 8.5 3.5L14.5312 9.46875Z\" fill=\"#002840\"><\/path><\/svg>\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewBox=\"0 0 20 20\" fill=\"none\"><path d=\"M14.5312 9.46875C14.8125 9.78125 14.8125 10.25 14.5312 10.5312L8.53125 16.5312C8.21875 16.8438 7.75 16.8438 7.46875 16.5312C7.15625 16.25 7.15625 15.7812 7.46875 15.5L12.9375 10.0312L7.46875 4.53125C7.15625 4.25 7.15625 3.78125 7.46875 3.5C7.75 3.1875 8.21875 3.1875 8.5 3.5L14.5312 9.46875Z\" fill=\"#002840\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tSicherheit als Eckpfeiler unserer Unternehmenskultur\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1172030153\" data-tab-title-id=\"e-n-tab-title-1172030153\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1172030153\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t<span class=\"e-n-tab-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewBox=\"0 0 20 20\" fill=\"none\"><path d=\"M14.5312 9.46875C14.8125 9.78125 14.8125 10.25 14.5312 10.5312L8.53125 16.5312C8.21875 16.8438 7.75 16.8438 7.46875 16.5312C7.15625 16.25 7.15625 15.7812 7.46875 15.5L12.9375 10.0312L7.46875 4.53125C7.15625 4.25 7.15625 3.78125 7.46875 3.5C7.75 3.1875 8.21875 3.1875 8.5 3.5L14.5312 9.46875Z\" fill=\"#002840\"><\/path><\/svg>\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20\" height=\"20\" viewBox=\"0 0 20 20\" fill=\"none\"><path d=\"M14.5312 9.46875C14.8125 9.78125 14.8125 10.25 14.5312 10.5312L8.53125 16.5312C8.21875 16.8438 7.75 16.8438 7.46875 16.5312C7.15625 16.25 7.15625 15.7812 7.46875 15.5L12.9375 10.0312L7.46875 4.53125C7.15625 4.25 7.15625 3.78125 7.46875 3.5C7.75 3.1875 8.21875 3.1875 8.5 3.5L14.5312 9.46875Z\" fill=\"#002840\"><\/path><\/svg>\t\t<\/span>\n\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tSichere Entwicklungsmethoden\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1172030151\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1172030151\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-0730f16 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"0730f16\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ef1584 elementor-widget elementor-widget-heading\" data-id=\"0ef1584\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SOC2 Type II<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3154132 e-flex e-con-boxed e-con e-child\" data-id=\"3154132\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d8b5db elementor-widget elementor-widget-text-editor\" data-id=\"5d8b5db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"white-space-collapse: preserve;\">Bloomreach erhielt am 14. M\u00e4rz 2023 seine SOC 2 Type II Zertifizierung und erf\u00fcllt seitdem nachweislich die strengen Kriterien des AICPA (American Institute of Certified Public Accountants).<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78d4331 elementor-widget elementor-widget-text-editor\" data-id=\"78d4331\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"white-space-collapse: preserve;\">Der SOC 2 Type II Bericht best\u00e4tigt die Effektivit\u00e4t unserer Informationssicherheitskontrollen, die garantieren, dass alle Daten, die \u00fcber uns laufen, sicher sowie verf\u00fcgbar sind und vertraulich behandelt werden. Der Bericht enth\u00e4lt zudem ein Schreiben, in dem das Pr\u00fcfungsteam seine pers\u00f6nliche Meinung kundtut, ein Compliance-Statement der Gesch\u00e4ftsf\u00fchrung, Beschreibungen der gepr\u00fcften Systeme und der durchgef\u00fchrten Tests sowie deren Ergebnis.<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2e5f88 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"e2e5f88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"white-space-collapse: preserve;\">Auf Basis einer Geheimhaltungserkl\u00e4rung kann unser SOC2 Type II Zertifikat auf Wunsch auch zur Verf\u00fcgung gestellt werden.<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ded7de8 elementor-widget elementor-widget-text-editor\" data-id=\"ded7de8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"white-space-collapse: preserve;\">Je nach Unternehmensart und den dazugeh\u00f6rigen Leistungen verf\u00fcgt Bloomreach<\/span> <span style=\"white-space-collapse: preserve;\">\u00fcber diverse Zertifizierungen von unabh\u00e4ngigen Dritten f\u00fcr seine Sicherheitsprogramme und seine Betriebsumgebung:<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b468a70 elementor-widget elementor-widget-text-editor\" data-id=\"b468a70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"\/wp-content\/uploads\/2024\/05\/iso-9001_2015_bloomreach-b.v._eng.pdf\">ISO 9001<\/a><\/p>\n<p><a href=\"\/wp-content\/uploads\/2024\/05\/iso_iec-27001_2013_bloomreach-b.v._en.pdf\">ISO 27001<\/a><\/p>\n<p><a href=\"\/wp-content\/uploads\/2024\/05\/iso_iec-27017_2015_bloomreach-b.v._eng.pdf\">ISO 27017<\/a><\/p>\n<p><a href=\"\/wp-content\/uploads\/2024\/05\/iso_iec-27018_2019_bloomreach-b.v._eng.pdf\">ISO 27018<\/a><\/p>\n<p><a href=\"\/wp-content\/uploads\/2024\/05\/iso-22301_2019_bloomreach-b.v._eng.pdf\">ISO 22301<\/a><\/p>\n<p><a href=\"\/wp-content\/uploads\/2024\/05\/gdpr_bloomreach-b.v._en.pdf\">DSGVO-Zertifizierung<\/a><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1172030152\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1172030152\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-f6e4153 e-con-full e-flex e-con e-child\" data-id=\"f6e4153\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7514bcb e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"7514bcb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8595a25 elementor-widget elementor-widget-text-editor\" data-id=\"8595a25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"white-space-collapse: preserve;\">Wir achten bei Bloomreach stets auf eine verl\u00e4ssliche Sicherheitskultur, da jeder und jede Mitarbeitende eine wichtige Rolle im Kampf gegen m\u00f6gliche Verst\u00f6\u00dfe spielt.<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c9e05b elementor-widget elementor-widget-text-editor\" data-id=\"2c9e05b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"white-space-collapse: preserve;\">Unsere Sicherheitskultur zeigt sich in allen Phasen der Employee Journey: vom Recruiting \u00fcber das Onboarding und die Weiterbildung bis hin zu Unternehmensveranstaltungen. Alle neue Mitarbeitenden unterzeichnen eine Geheimhaltungserkl\u00e4rung und absolvieren eine OWASP-Schulung. Mit Ma\u00dfnahmen wie diesen zeigen wir, wie wichtig uns der Schutz der Daten unserer Unternehmenskunden ist.  <\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1129f0 elementor-widget elementor-widget-image\" data-id=\"d1129f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"519\" src=\"https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/exp_photopool_a-12-at-2x-1024x664.png\" class=\"attachment-large size-large wp-image-27204\" alt=\"exp_photopool_a-12-at-2x\" srcset=\"https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/exp_photopool_a-12-at-2x-1024x664.png 1024w, https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/exp_photopool_a-12-at-2x-300x194.png 300w, https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/exp_photopool_a-12-at-2x-768x498.png 768w, https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/exp_photopool_a-12-at-2x.png 1080w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1172030153\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1172030153\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-c06baf8 e-con-full e-flex e-con e-child\" data-id=\"c06baf8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-effab8e e-flex e-con-boxed elementor-invisible e-con e-child\" data-id=\"effab8e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-713c878 elementor-widget elementor-widget-text-editor\" data-id=\"713c878\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"white-space-collapse: preserve;\">Die Entwickler:innen in unserem IT-Team erhalten strikte Anweisungen zu Themen wie Best Practices f\u00fcr das Programmieren und die Entwicklung oder das Least-Privilege-Prinzip bei der Vergabe von Zugriffsrechten. \u00dcber einen eigenen Channel erh\u00e4lt unsere IT-Abteilung zudem regelm\u00e4\u00dfig Informationen \u00fcber sicherheitsrelevante Themen und aktuelle Entwicklungen in der Cybersecurity.  <\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7bc6c1 elementor-widget elementor-widget-image\" data-id=\"b7bc6c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"519\" src=\"https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/irvan-smith-ymn_ty_mbn8-unsplash-at-2x-1024x664.png\" class=\"attachment-large size-large wp-image-27201\" alt=\"irvan-smith-ymn_ty_mbn8-unsplash-at-2x\" srcset=\"https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/irvan-smith-ymn_ty_mbn8-unsplash-at-2x-1024x664.png 1024w, https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/irvan-smith-ymn_ty_mbn8-unsplash-at-2x-300x194.png 300w, https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/irvan-smith-ymn_ty_mbn8-unsplash-at-2x-768x498.png 768w, https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/irvan-smith-ymn_ty_mbn8-unsplash-at-2x.png 1080w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f6c6fc7 e-flex e-con-boxed e-con e-parent\" data-id=\"f6c6fc7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-37c853f elementor-widget elementor-widget-heading\" data-id=\"37c853f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sicherheitsmanagement<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a547b7 e-con-full e-flex e-con e-child\" data-id=\"1a547b7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-cd7613c e-con-full e-flex e-con e-child\" data-id=\"cd7613c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3e2085d e-con-full e-flex e-con e-child\" data-id=\"3e2085d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-314c798 elementor-widget__width-initial elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"314c798\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"icon icon-security-lock\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea37cb8 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"ea37cb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Endpunktsicherheit<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d49303a elementor-widget elementor-widget-text-editor\" data-id=\"d49303a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Wir stellen sicher, dass unsere Endpunktger\u00e4te gem\u00e4\u00df unserer Endpunktsicherheitsrichtlinie gesch\u00fctzt sind. Zu den Ma\u00dfnahmen z\u00e4hlen die Festplattenverschl\u00fcsselung, Malwareschutz, keine Gastzugriffe, Firewall und regelm\u00e4\u00dfige Updates f\u00fcr Betriebssysteme. Dar\u00fcber hinaus f\u00fchren wir immer wieder Pr\u00fcfungen durch, um sicherzugehen, dass wir unsere hohen Sicherheitslevel halten.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-01af8e7 e-con-full e-flex e-con e-child\" data-id=\"01af8e7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-790c38c e-con-full e-flex e-con e-child\" data-id=\"790c38c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d37ff35 elementor-widget__width-initial elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"d37ff35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"icon icon-database-sync\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f49c38b elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"f49c38b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Schwachstellen-Management<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad5d491 elementor-widget elementor-widget-text-editor\" data-id=\"ad5d491\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Bloomreach hat eine eigene Richtlinie f\u00fcr das Management von Schwachstellen. Sie sieht Prozesse wie regelm\u00e4\u00dfige Webscans und Scans nach m\u00f6glichen Bedrohungen vor. Sobald eine relevante Schwachstelle entdeckt wurde, wird sie genau untersucht, rasch zugeteilt und beseitigt. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f3eb765 e-con-full e-flex e-con e-child\" data-id=\"f3eb765\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-a7b950a e-con-full e-flex e-con e-child\" data-id=\"a7b950a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa985d5 elementor-widget__width-initial elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"fa985d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"icon icon-computer-bug-search\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f6424a elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"0f6424a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Qualit\u00e4tssicherung<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8be050f elementor-widget elementor-widget-text-editor\" data-id=\"8be050f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Wir testen jede neue Funktion umfassend, bevor wir sie implementieren. Nur so k\u00f6nnen wir verhindern, dass es zu unerwarteten Schwachstellen in der Anwendung kommt. Unser Qualit\u00e4tssicherungsteam garantiert, dass alle Erweiterungen unserer Anwendung vor ihrer Ver\u00f6ffentlichung fehlerfrei sind. Dar\u00fcber hinaus testet das Team isolierte Instanzen f\u00fcr Neukunden, kurz bevor sie an unser Kundenservice-Team \u00fcbergeben werden.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-03f188e e-con-full e-flex e-con e-child\" data-id=\"03f188e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-069b495 e-con-full e-flex e-con e-child\" data-id=\"069b495\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bcb3697 elementor-widget__width-initial elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"bcb3697\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"icon icon-cursor-target-1\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14e5515 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"14e5515\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Monitoring<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a574401 elementor-widget elementor-widget-text-editor\" data-id=\"a574401\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Unser Sicherheitsmonitoring umfasst alle Daten, die wir im Rahmen unseres internen Netzwerktraffics sammeln, sowie alle bekannten Schwachstellen. Der interne Traffic wird auf verd\u00e4chtiges Verhalten gepr\u00fcft. Netzwerkanalysen und Systemprotokollpr\u00fcfungen zur Identifikation ungew\u00f6hnlichen Verhaltens sind ein wesentlicher Bestandteil unseres Monitorings. Wir platzieren Suchanfragen auf \u00f6ffentlichen Datenbest\u00e4nden, um nach Sicherheitsvorf\u00e4llen zu suchen und Systemprotokolle zu analysieren.   <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f3c3d0 e-con-full e-flex e-con e-child\" data-id=\"5f3c3d0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-db6502a e-con-full e-flex e-con e-child\" data-id=\"db6502a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-192f6d3 elementor-widget__width-initial elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"192f6d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"icon icon-shield-warning\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-109769a elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"109769a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">St\u00f6rfallmanagement<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93b5cb3 elementor-widget elementor-widget-text-editor\" data-id=\"93b5cb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Bloomreach hat genau definierte Prozesse f\u00fcr das Management von St\u00f6rfallen, die die Vertraulichkeit, die Integrit\u00e4t oder die Verf\u00fcgbarkeit der Ressourcen oder der Daten unserer Kunden gef\u00e4hrden k\u00f6nnten. Jeder St\u00f6rfall wird von unserem Sicherheitsteam identifiziert, dokumentiert, zugewiesen, nach Dringlichkeit priorisiert und gel\u00f6st. Vorf\u00e4lle, die unsere Kunden direkt betreffen, werden immer priorisiert und damit am schnellsten bearbeitet. Teil unseres Prozesses sind Aktionspl\u00e4ne sowie Verfahren f\u00fcr die Identifikation, Eskalation, Mitigation und das Reporting.   <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21b0469 e-con-full e-flex e-con e-child\" data-id=\"21b0469\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-cb9790d e-con-full e-flex e-con e-child\" data-id=\"cb9790d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-30745fb elementor-widget__width-initial elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"30745fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"icon icon-common-file-award\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8328a2 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"e8328a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">R\u00fcckversicherung<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c58bce3 elementor-widget elementor-widget-text-editor\" data-id=\"c58bce3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Um sicherzustellen, dass unser Sicherheitsmanagement transparent ist und alle genau die Informationen bekommen, die sie am dringendsten ben\u00f6tigen, folgen wir dem SOC-2-Bericht. Nach Unterzeichnung einer Geheimhaltungserkl\u00e4rung kann dieser Bericht auf Nachfrage zur Verf\u00fcgung gestellt werden. Er gibt einen \u00dcberblick \u00fcber die technischen und organisatorischen Sicherheitsma\u00dfnahmen von Bloomreach. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eece42d e-flex e-con-boxed e-con e-parent\" data-id=\"eece42d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aaed85f elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"aaed85f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wir sch\u00fctzen die Daten unserer Kunden<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-75170e5 e-con-full e-flex e-con e-child\" data-id=\"75170e5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66511a5 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-image\" data-id=\"66511a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"810\" height=\"648\" src=\"https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/Rectangle-5-2.png\" class=\"attachment-full size-full wp-image-27081\" alt=\"Rectangle-5-2\" srcset=\"https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/Rectangle-5-2.png 810w, https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/Rectangle-5-2-300x240.png 300w, https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/Rectangle-5-2-768x614.png 768w\" sizes=\"(max-width: 810px) 100vw, 810px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fe4d15d e-con-full e-flex e-con e-child\" data-id=\"fe4d15d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cd6914 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"3cd6914\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Datenverschl\u00fcsselung<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5897193 post_content elementor-widget elementor-widget-text-editor\" data-id=\"5897193\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Sobald wir Daten in der Cloud speichern, kommen mehrere Verschl\u00fcsselungsebenen zum Einsatz. Standardm\u00e4\u00dfig werden dabei sowohl ruhende Daten (Data-at-Rest) als auch bewegte Daten (Data-in-Transit) verschl\u00fcsselt. Je nach Bedarf unserer Kunden setzen wir auch zus\u00e4tzliche Sicherheitsprotokolle um.  <\/p>\n<p>Ohne weitere Implementierungen verschl\u00fcsseln und authentifizieren unsere Cloud-Provider s\u00e4mtliche Data-in-Transit auf einer oder mehreren Netzwerkebenen, sobald Daten physische Grenzen, die nicht mehr vom Cloud-Provider oder in dessen Auftrag kontrolliert werden, \u00fcberschreiten. Google und Amazon nutzen den Advanced Encryption Standard (AES) Algorithmus, um Data-at-Rest zu verschl\u00fcsseln. Data-in-Transit werden mittels Transport Layer Security (TLS) verschl\u00fcsselt.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6af8d24 e-con-full e-flex e-con e-child\" data-id=\"6af8d24\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-817c2b6 e-con-full e-flex e-con e-child\" data-id=\"817c2b6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cc66ba elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"3cc66ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">DSGVO-Compliance<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-096f356 post_content elementor-widget elementor-widget-text-editor\" data-id=\"096f356\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Bloomreach unterst\u00fctzt seine Kunden dabei, den besten Weg zur DSGVO-Compliance zu finden. Im Engagement-Bereich haben die Kunden die volle Kontrolle \u00fcber das Consent Management (sie bestimmen den Verarbeitungszweck) und das Rechtemanagement f\u00fcr das Datensubjekt (sie k\u00f6nnen alle Kundendaten herunterladen sowie Kund:innen anonymisieren oder l\u00f6schen). <\/p>\n<p>\u00dcber das Access Management von Bloomreach k\u00f6nnen Nutzer:innen bestimmte Datentypen als PII ausw\u00e4hlen, um die Anzeigegenehmigung f\u00fcr PII auf Nutzerebene einzustellen oder einzuschr\u00e4nken. Aufbewahrungs- und Ablauffristen k\u00f6nnen f\u00fcr jedes Event separat eingestellt werden. Dar\u00fcber hinaus k\u00f6nnen Kunden \u00fcber unsere Daten-API ihre Systeme integrieren, um alle Anfragen von Datensubjekten rasch zu bearbeiten.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67af166 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-image\" data-id=\"67af166\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"810\" height=\"649\" src=\"https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/Rectangle-5-1.png\" class=\"attachment-full size-full wp-image-27078\" alt=\"Rectangle-5-1\" srcset=\"https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/Rectangle-5-1.png 810w, https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/Rectangle-5-1-300x240.png 300w, https:\/\/www.bloomreach.com\/wp-content\/uploads\/2024\/05\/Rectangle-5-1-768x615.png 768w\" sizes=\"(max-width: 810px) 100vw, 810px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d2a9d5 e-flex e-con-boxed e-con e-parent\" data-id=\"3d2a9d5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c72cd92 elementor-widget elementor-widget-breadcrumbs\" data-id=\"c72cd92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<nav aria-label=\"breadcrumbs\" class=\"rank-math-breadcrumb\"><p><span class=\"last\">Home<\/span><\/p><\/nav>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Sorgen Sie daf\u00fcr, dass Ihre Teams alle Kampagnen auf einer zentralen, nutzerfreundlichen Plattform erstellen, versenden, testen und analysieren \u2013 f\u00fcr maximalen Nutzen und h\u00f6chste Verl\u00e4sslichkeit.<\/p>\n","protected":false},"author":225,"featured_media":29753,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-35134","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.bloomreach.com\/de\/wp-json\/wp\/v2\/pages\/35134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bloomreach.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bloomreach.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bloomreach.com\/de\/wp-json\/wp\/v2\/users\/225"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bloomreach.com\/de\/wp-json\/wp\/v2\/comments?post=35134"}],"version-history":[{"count":1,"href":"https:\/\/www.bloomreach.com\/de\/wp-json\/wp\/v2\/pages\/35134\/revisions"}],"predecessor-version":[{"id":51018,"href":"https:\/\/www.bloomreach.com\/de\/wp-json\/wp\/v2\/pages\/35134\/revisions\/51018"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bloomreach.com\/de\/wp-json\/wp\/v2\/media\/29753"}],"wp:attachment":[{"href":"https:\/\/www.bloomreach.com\/de\/wp-json\/wp\/v2\/media?parent=35134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}