[{"data":1,"prerenderedAt":321},["ShallowReactive",2],{"QiJ2vHnmCO":3,"09kd8Fpqn0":29,"OpBzYOiT0G":43,"2rFMUScw3t":59,"iovSgOMBMn":76,"VY8b1aodTk":93,"udrO6mol8o":110,"Ls2NhtrUTw":121,"Jh31xijZcC":135,"E5xVMCyB6l":149,"47DEQpj8HB":166,"B569JC5TKs":172,"4ZOIPe8FaY":204,"Zn4Mmic6Tk":221,"ucPERc2h4y":240,"EE9WKIS1oR":264,"XwC0WZ3JHi":280,"wbfzwYV1Cl":297},{"data":4,"body":7,"excerpt":-1,"toc":26},{"title":5,"description":6},"","Omniac: Cyber Intelligence für Ihr Unternehmen",{"type":8,"children":9},"root",[10],{"type":11,"tag":12,"props":13,"children":14},"element","p",{},[15,18,24],{"type":16,"value":17},"text","Omniac: ",{"type":11,"tag":19,"props":20,"children":21},"strong",{},[22],{"type":16,"value":23},"Cyber Intelligence",{"type":16,"value":25}," für Ihr Unternehmen",{"title":5,"searchDepth":27,"depth":27,"links":28},2,[],{"data":30,"body":32,"excerpt":-1,"toc":41},{"title":5,"description":31},"Identitäts- und Datendiebstahl frühzeitig erkennen. Globale Angriffsflächen aufdecken, bevor Cyberkriminelle zuschlagen können.",{"type":8,"children":33},[34],{"type":11,"tag":12,"props":35,"children":36},{},[37],{"type":11,"tag":19,"props":38,"children":39},{},[40],{"type":16,"value":31},{"title":5,"searchDepth":27,"depth":27,"links":42},[],{"data":44,"body":46,"excerpt":-1,"toc":57},{"title":5,"description":45},"Omniac überwacht rund um die Uhr Zugangsdaten im Internet und Darknet sowie nicht-invasiv externe Angriffsflächen. Wir informieren sofort über gestohlene Identitäten, Schatten-IT und Schwachstellen.",{"type":8,"children":47},[48,52],{"type":11,"tag":12,"props":49,"children":50},{},[51],{"type":16,"value":45},{"type":11,"tag":12,"props":53,"children":54},{},[55],{"type":16,"value":56},"So verhindern Sie Kontoübernahmen (Account Take Over) und verbessern Ihre Verteidigung.",{"title":5,"searchDepth":27,"depth":27,"links":58},[],{"data":60,"body":62,"excerpt":-1,"toc":74},{"title":5,"description":61},"Alle Branchen. Weltweit.",{"type":8,"children":63},[64],{"type":11,"tag":12,"props":65,"children":66},{},[67,69],{"type":16,"value":68},"Alle Branchen. ",{"type":11,"tag":19,"props":70,"children":71},{},[72],{"type":16,"value":73},"Weltweit.",{"title":5,"searchDepth":27,"depth":27,"links":75},[],{"data":77,"body":79,"excerpt":-1,"toc":91},{"title":5,"description":78},"Ihre Vorteile",{"type":8,"children":80},[81],{"type":11,"tag":12,"props":82,"children":83},{},[84,86],{"type":16,"value":85},"Ihre ",{"type":11,"tag":19,"props":87,"children":88},{},[89],{"type":16,"value":90},"Vorteile",{"title":5,"searchDepth":27,"depth":27,"links":92},[],{"data":94,"body":96,"excerpt":-1,"toc":108},{"title":5,"description":95},"360° Cyber Threat Intelligence & Identitätsschutz",{"type":8,"children":97},[98],{"type":11,"tag":12,"props":99,"children":100},{},[101,106],{"type":11,"tag":19,"props":102,"children":103},{},[104],{"type":16,"value":105},"360° Cyber Threat Intelligence",{"type":16,"value":107}," & Identitätsschutz",{"title":5,"searchDepth":27,"depth":27,"links":109},[],{"data":111,"body":113,"excerpt":-1,"toc":119},{"title":5,"description":112},"External Attack Surface Management (EASM)",{"type":8,"children":114},[115],{"type":11,"tag":12,"props":116,"children":117},{},[118],{"type":16,"value":112},{"title":5,"searchDepth":27,"depth":27,"links":120},[],{"data":122,"body":124,"excerpt":-1,"toc":133},{"title":5,"description":123},"Credential Intelligence & Account Take Over (ATO) Prävention",{"type":8,"children":125},[126],{"type":11,"tag":12,"props":127,"children":128},{},[129],{"type":11,"tag":19,"props":130,"children":131},{},[132],{"type":16,"value":123},{"title":5,"searchDepth":27,"depth":27,"links":134},[],{"data":136,"body":138,"excerpt":-1,"toc":147},{"title":5,"description":137},"Digital Risk Protection",{"type":8,"children":139},[140],{"type":11,"tag":12,"props":141,"children":142},{},[143],{"type":11,"tag":19,"props":144,"children":145},{},[146],{"type":16,"value":137},{"title":5,"searchDepth":27,"depth":27,"links":148},[],{"data":150,"body":152,"excerpt":-1,"toc":164},{"title":5,"description":151},"Datenüberwachung per Web Dashboard & API",{"type":8,"children":153},[154],{"type":11,"tag":12,"props":155,"children":156},{},[157,159],{"type":16,"value":158},"Datenüberwachung per ",{"type":11,"tag":19,"props":160,"children":161},{},[162],{"type":16,"value":163},"Web Dashboard & API",{"title":5,"searchDepth":27,"depth":27,"links":165},[],{"data":167,"body":168,"excerpt":-1,"toc":170},{"title":5,"description":5},{"type":8,"children":169},[],{"title":5,"searchDepth":27,"depth":27,"links":171},[],{"data":173,"body":175,"excerpt":-1,"toc":202},{"title":5,"description":174},"Web Dashboard",{"type":8,"children":176},[177,184,189,197],{"type":11,"tag":12,"props":178,"children":179},{},[180],{"type":11,"tag":19,"props":181,"children":182},{},[183],{"type":16,"value":174},{"type":11,"tag":12,"props":185,"children":186},{},[187],{"type":16,"value":188},"Mithilfe unseres Dashboards definieren Sie Ihre zu überwachenden Daten und Bereiche. Die Ergebnisse der nicht-invasiven, mehrmals täglichen Scans werden in übersichtlichen Dashboards angezeigt; außerdem können Sie automatische Warnhinweise einrichten und die Rohdaten analysieren. Behalten Sie Ihren Bedrohungsstatus jederzeit und ohne Integrationsaufwand im Blick.",{"type":11,"tag":12,"props":190,"children":191},{},[192],{"type":11,"tag":19,"props":193,"children":194},{},[195],{"type":16,"value":196},"Individuelle Anbindung (API)",{"type":11,"tag":12,"props":198,"children":199},{},[200],{"type":16,"value":201},"Automatisieren Sie mit unserer API die kontinuierliche Überwachung von personenbezogenen Daten Ihrer Mitarbeiter und Kunden im Darknet, Deep Web und Internet. Für die individuelle Integration in Ihre bestehende Systemlandschaft stellen wir Ihnen eine ausführlich dokumentierte API zur Verfügung und unterstützen Sie bei der Implementierung.",{"title":5,"searchDepth":27,"depth":27,"links":203},[],{"data":205,"body":207,"excerpt":-1,"toc":219},{"title":5,"description":206},"Omniac überwacht Ihre gesamten Unternehmens- und Partner-Domains.",{"type":8,"children":208},[209],{"type":11,"tag":12,"props":210,"children":211},{},[212,214],{"type":16,"value":213},"Omniac überwacht Ihre ",{"type":11,"tag":19,"props":215,"children":216},{},[217],{"type":16,"value":218},"gesamten Unternehmens- und Partner-Domains.",{"title":5,"searchDepth":27,"depth":27,"links":220},[],{"data":222,"body":224,"excerpt":-1,"toc":238},{"title":5,"description":223},"Mithilfe des Web Dashboards behalten Sie den Bedrohungsstatus jederzeit im Blick.",{"type":8,"children":225},[226],{"type":11,"tag":12,"props":227,"children":228},{},[229,231,236],{"type":16,"value":230},"Mithilfe des ",{"type":11,"tag":19,"props":232,"children":233},{},[234],{"type":16,"value":235},"Web Dashboards",{"type":16,"value":237}," behalten Sie den Bedrohungsstatus jederzeit im Blick.",{"title":5,"searchDepth":27,"depth":27,"links":239},[],{"data":241,"body":243,"excerpt":-1,"toc":262},{"title":5,"description":242},"Ihre Daten. Unsere Verantwortung.",{"type":8,"children":244},[245],{"type":11,"tag":12,"props":246,"children":247},{},[248,253,255,260],{"type":11,"tag":19,"props":249,"children":250},{},[251],{"type":16,"value":252},"Ihre",{"type":16,"value":254}," Daten. ",{"type":11,"tag":19,"props":256,"children":257},{},[258],{"type":16,"value":259},"Unsere",{"type":16,"value":261}," Verantwortung.",{"title":5,"searchDepth":27,"depth":27,"links":263},[],{"data":265,"body":267,"excerpt":-1,"toc":278},{"title":5,"description":266},"Wir erfüllen vollumfänglich die Anforderungen der europäischen Datenschutz-Grundverordnung (DSGVO) und haben keinerlei Zugriff auf Ihre eingegebenen oder übertragenen Daten.",{"type":8,"children":268},[269,273],{"type":11,"tag":12,"props":270,"children":271},{},[272],{"type":16,"value":266},{"type":11,"tag":12,"props":274,"children":275},{},[276],{"type":16,"value":277},"In der omniac App hashen, maskieren und verschlüsseln wir Ihre Daten, sowohl bei der Übertragung als auch bei der Speicherung. Wir entwickeln und hosten auf der sicheren STACKIT Cloud in Deutschland.",{"title":5,"searchDepth":27,"depth":27,"links":279},[],{"data":281,"body":283,"excerpt":-1,"toc":295},{"title":5,"description":282},"Bereit für omniac Cyber Intelligence?",{"type":8,"children":284},[285],{"type":11,"tag":12,"props":286,"children":287},{},[288,290],{"type":16,"value":289},"Bereit für ",{"type":11,"tag":19,"props":291,"children":292},{},[293],{"type":16,"value":294},"omniac Cyber Intelligence?",{"title":5,"searchDepth":27,"depth":27,"links":296},[],{"data":298,"body":300,"excerpt":-1,"toc":319},{"title":5,"description":299},"Datenklau aufdecken. Betrug vorbeugen. Vertrauen stärken.",{"type":8,"children":301},[302,309,314],{"type":11,"tag":12,"props":303,"children":304},{},[305],{"type":11,"tag":19,"props":306,"children":307},{},[308],{"type":16,"value":299},{"type":11,"tag":12,"props":310,"children":311},{},[312],{"type":16,"value":313},"Kontaktieren Sie uns für detaillierte Informationen zu Leistungsumfang, Integrationsmöglichkeiten und Preisen.\nWir freuen uns auf den Austausch mit Ihnen.",{"type":11,"tag":12,"props":315,"children":316},{},[317],{"type":16,"value":318},"Senden Sie uns eine E-Mail an:",{"title":5,"searchDepth":27,"depth":27,"links":320},[],1773847060981]