{"id":2573,"date":"2024-03-20T12:40:26","date_gmt":"2024-03-20T10:40:26","guid":{"rendered":"https:\/\/www.quality.one\/?page_id=2573"},"modified":"2026-01-31T17:06:01","modified_gmt":"2026-01-31T15:06:01","slug":"security-testing","status":"publish","type":"page","link":"https:\/\/www.quality.one\/en\/leistungen\/security-testing\/","title":{"rendered":"Security Testing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2573\" class=\"elementor elementor-2573\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d6ba1f6 e-flex e-con-boxed e-con e-parent\" data-id=\"d6ba1f6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-95e344c e-flex e-con-boxed e-con e-child\" data-id=\"95e344c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f27c2b6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f27c2b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cda1c5 elementor-widget elementor-widget-heading\" data-id=\"4cda1c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">SECURITY TESTING\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ceb192a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ceb192a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;d8b603d&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}],&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-bda5553\" data-id=\"bda5553\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e50ea32 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e50ea32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39cc82c elementor-widget elementor-widget-heading\" data-id=\"39cc82c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SICHERHEITSL\u00dcCKEN IM SYSTEM ENTDECKEN\nUND SOFORT BEHEBEN!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da4ce6c elementor-widget elementor-widget-text-editor\" data-id=\"da4ce6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Sicherheitstests sind von au\u00dferordentlichem Nutzen. Jede Schwachstelle in Ihrem Softwaresystem kann Ihrem Unternehmen zum Verh\u00e4ngnis werden, denn sie kann zu Daten-, Umsatz-, Kunden- und Reputationsverlusten f\u00fchren und auch rechtliche Konsequenzen nach sich ziehen. Bei Sicherheitstests wird, wie der Name schon sagt, \u00fcberpr\u00fcft, ob Ihr System gesch\u00fctzt ist. Sie decken alle Verwundbarkeiten innerhalb des Systems auf und stellen sicher, dass Ihre Daten und Ressourcen vor Eindringlingen gesch\u00fctzt sind. Ziel dieser Tests ist es, Sicherheitsl\u00fccken, Betrugsm\u00f6glichkeiten und Risiken in einer Softwareanwendung zu finden und Angriffe von Eindringlingen zu verhindern.<\/p><p>Mit diesem Verfahren stellen wir sicher, dass ein Informationssystem Daten sch\u00fctzt, ohne die beabsichtigte Funktionalit\u00e4t zu beeintr\u00e4chtigen.<\/p><p>Zu den sechs grundlegenden Sicherheitsprinzipien, von Sicherheitstests abgedeckt, geh\u00f6ren Vertraulichkeit, Integrit\u00e4t, Authentifizierung, Verf\u00fcgbarkeit, Autorisierung und Nachweisbarkeit (Non-Repudiation). Quality.One konzentriert sich bei der Durchf\u00fchrung von Sicherheitstests f\u00fcr Sie auf die wichtigsten Bereiche: Netzwerksicherheit, Systemsoftwaresicherheit, clientseitige Anwendungssicherheit und serverseitige Anwendungssicherheit. Je nach Komplexit\u00e4t Ihrer Anforderungen tauchen wir auch tiefer ein.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-25340cd\" data-id=\"25340cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-f47ba91 e-flex e-con-boxed e-con e-parent\" data-id=\"f47ba91\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1272dac e-con-full e-flex e-con e-child\" data-id=\"1272dac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t<div class=\"elementor-element elementor-element-ea52921 e-flex e-con-boxed e-con e-child\" data-id=\"ea52921\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-052a19f elementor-widget elementor-widget-heading\" data-id=\"052a19f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">VULNERABILITY SCANNING\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f76d74 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4f76d74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0329569 elementor-widget elementor-widget-text-editor\" data-id=\"0329569\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0c14c07 elementor-widget elementor-widget-text-editor\" data-id=\"0c14c07\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Das Vulnerability Scanning wird mit Hilfe automatisierter Software durchgef\u00fchrt. Diese Software scannt das System und erkennt alle bekannten Schwachstellenmuster. Eine Sicherheitsl\u00fccke ist eine Schwachstelle, die ein potenzieller Angreifer ausnutzen wird, wenn er in das System einbricht. Dieser Eindringling kann intern oder extern sein. Mit Hilfe unserer Sicherheitstests verhindern wir, dass dieser keinen Zugang zu Ihrem System hat.<\/p><\/div><\/div><div class=\"elementor-element elementor-element-29940d4 elementor-widget elementor-widget-spacer\" data-id=\"29940d4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-spacer\">\u00a0<\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6336e45 e-con-full e-flex e-con e-child\" data-id=\"6336e45\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t<div class=\"elementor-element elementor-element-75f6962 e-flex e-con-boxed e-con e-child\" data-id=\"75f6962\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5181fe8 elementor-widget elementor-widget-heading\" data-id=\"5181fe8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SECURITY SCANNING\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6348348 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6348348\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d91035 elementor-widget elementor-widget-text-editor\" data-id=\"9d91035\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2fc4fe3 elementor-widget elementor-widget-text-editor\" data-id=\"2fc4fe3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Sicherheitsscans (Security Scanning) k\u00f6nnen sowohl manuell als auch automatisiert durchgef\u00fchrt werden. Zun\u00e4chst werden alle m\u00f6glichen Anf\u00e4lligkeiten in Ihrem Netzwerk und System identifiziert und dann L\u00f6sungen f\u00fcr diese Schwachstellen oder Risiken angeboten.<\/p><\/div><\/div><div class=\"elementor-element elementor-element-8a14a2f elementor-widget elementor-widget-spacer\" data-id=\"8a14a2f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-spacer\">\u00a0<\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f411501 e-con-full e-flex e-con e-child\" data-id=\"f411501\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t<div class=\"elementor-element elementor-element-2765e89 e-flex e-con-boxed e-con e-child\" data-id=\"2765e89\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68a5357 elementor-widget elementor-widget-heading\" data-id=\"68a5357\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PENETRATION TESTING\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4fcf3d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a4fcf3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0b43a5 elementor-widget elementor-widget-text-editor\" data-id=\"e0b43a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8d31f6a elementor-widget elementor-widget-text-editor\" data-id=\"8d31f6a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Ein Angriff auf Ihr System k\u00f6nnte zu sehr hohen finanziellen Kosten f\u00fchren. Dieser Test pr\u00fcft das Verhalten Ihres Systems gegen\u00fcber einem gezielten Angriff. Dazu wird ein Hackerangriff simuliert, der von einem b\u00f6swilligen Hacker (Black Hat) ausgeht. Der Test umfasst eine Analyse Ihres Systems, um potenzielle Schwachstellen f\u00fcr einen externen Hacking-Versuch zu ermitteln.<\/p><\/div><\/div><div class=\"elementor-element elementor-element-ce76a09 elementor-widget elementor-widget-spacer\" data-id=\"ce76a09\" data-element_type=\"widget\" data-widget_type=\"spacer.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-spacer\">\u00a0<\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ca811b1 e-con-full e-flex e-con e-child\" data-id=\"ca811b1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t<div class=\"elementor-element elementor-element-1a42266 e-flex e-con-boxed e-con e-child\" data-id=\"1a42266\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-326c35c elementor-widget elementor-widget-heading\" data-id=\"326c35c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">RISK ASSESSMENT\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07abdc5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"07abdc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbceadd elementor-widget elementor-widget-text-editor\" data-id=\"dbceadd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9b82c49 elementor-widget elementor-widget-text-editor\" data-id=\"9b82c49\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-element elementor-element-3c8b658 elementor-widget elementor-widget-text-editor\" data-id=\"3c8b658\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-element elementor-element-fcb1cbe elementor-widget elementor-widget-text-editor\" data-id=\"fcb1cbe\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>In jeder Organisation gibt es geringe, mittlere und hohe Risiken. Bei der Risikobewertung werden diese Risiken analysiert, um sie so weit wie m\u00f6glich zu minimieren.<\/p><\/div><\/div><div class=\"elementor-element elementor-element-02da0e4 elementor-widget elementor-widget-spacer\" data-id=\"02da0e4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-spacer\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8c016ea e-con-full e-flex e-con e-child\" data-id=\"8c016ea\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t<div class=\"elementor-element elementor-element-25e3c4e e-flex e-con-boxed e-con e-child\" data-id=\"25e3c4e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-96e3b47 elementor-widget elementor-widget-heading\" data-id=\"96e3b47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SECURITY AUDITING\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dabd76d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"dabd76d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7892b26 elementor-widget elementor-widget-text-editor\" data-id=\"7892b26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f922115 elementor-widget elementor-widget-text-editor\" data-id=\"f922115\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Security Auditing ist ein wirksames Verfahren zur Aufrechterhaltung der Integrit\u00e4t eines Systems. Die Sicherheits\u00fcberpr\u00fcfung bezieht sich auf eine interne Inspektion von Anwendungen und Betriebssystemen im Hinblick auf Sicherheitsm\u00e4ngel.<\/p><\/div><\/div><div class=\"elementor-element elementor-element-59df87e elementor-widget elementor-widget-spacer\" data-id=\"59df87e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-spacer\">\u00a0<\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b19941f e-con-full e-flex e-con e-child\" data-id=\"b19941f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t<div class=\"elementor-element elementor-element-2205055 e-flex e-con-boxed e-con e-child\" data-id=\"2205055\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f3ae042 elementor-widget elementor-widget-heading\" data-id=\"f3ae042\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ETHICAL HACKING\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1944e0 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d1944e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3c5dbe elementor-widget elementor-widget-text-editor\" data-id=\"d3c5dbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-34d8725 elementor-widget elementor-widget-text-editor\" data-id=\"34d8725\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-element elementor-element-839129c elementor-widget elementor-widget-text-editor\" data-id=\"839129c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Ethical Hacking ist nicht dasselbe wie Black Hat Hacking (kriminelles Hacking). Ethical Hacking bedeutet, dass ein Software-System einer Organisation bewusst versucht wird zu hacken, um Sicherheitsl\u00fccken in diesem System aufzudecken.<\/p><\/div><\/div><div class=\"elementor-element elementor-element-bca9930 elementor-widget elementor-widget-spacer\" data-id=\"bca9930\" data-element_type=\"widget\" data-widget_type=\"spacer.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-spacer\">\u00a0<\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f04515 e-con-full e-flex e-con e-child\" data-id=\"6f04515\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t<div class=\"elementor-element elementor-element-2e4788f e-flex e-con-boxed e-con e-child\" data-id=\"2e4788f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-163cb2a elementor-widget elementor-widget-heading\" data-id=\"163cb2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">POSTURE ASSESSMENT\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f515539 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f515539\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0907a3d elementor-widget elementor-widget-text-editor\" data-id=\"0907a3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Hierbei handelt es sich um eine Kombination aus Security Scanning, Ethical Hacking und Risikobewertung. Es zeigt die allgemeine Sicherheitslage einer Organisation auf.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-78301c1 e-flex e-con-boxed e-con e-child\" data-id=\"78301c1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[],&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a29437b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a29437b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb9afa2 elementor-widget elementor-widget-heading\" data-id=\"cb9afa2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ANGEBOT SCHNELLANFRAGE\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2af9ec8 elementor-widget elementor-widget-text-editor\" data-id=\"2af9ec8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Quality.One bietet Ihnen Erfahrung und Wissen aus zahlreichen Projekten globaler Unternehmen.<\/p><p>Unsere Test Experten besitzen verschiedenartige Kenntnisse in zahlreichen Disziplinen, um eine holistische Testabdeckung hochskalierbarer Industrieanwendungen gew\u00e4hrleisten zu k\u00f6nnen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59deb57 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"59deb57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.quality.one\/get-an-estimate\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Jetzt Angebot einholen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>SECURITY TESTING SICHERHEITSL\u00dcCKEN IM SYSTEM ENTDECKEN UND SOFORT BEHEBEN! Sicherheitstests sind von au\u00dferordentlichem Nutzen. Jede Schwachstelle in Ihrem Softwaresystem kann Ihrem Unternehmen zum Verh\u00e4ngnis werden, denn sie kann zu Daten-, Umsatz-, Kunden- und Reputationsverlusten f\u00fchren und auch rechtliche Konsequenzen nach sich ziehen. Bei Sicherheitstests wird, wie der Name schon sagt, \u00fcberpr\u00fcft, ob Ihr System gesch\u00fctzt [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":3975,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2573","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Testing \u2013 Schwachstellen &amp; Risiken | Quality.One<\/title>\n<meta name=\"description\" content=\"Security Testing deckt Angriffspunkte auf: Scans, Pr\u00fcfungen und Empfehlungen f\u00fcr Netzwerk, Client und Server \u2013 um Daten zu sch\u00fctzen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.quality.one\/en\/leistungen\/security-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Testing \u2013 Schwachstellen &amp; Risiken | Quality.One\" \/>\n<meta property=\"og:description\" content=\"Security Testing deckt Angriffspunkte auf: Scans, Pr\u00fcfungen und Empfehlungen f\u00fcr Netzwerk, Client und Server \u2013 um Daten zu sch\u00fctzen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.quality.one\/en\/leistungen\/security-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"QualityOne\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-31T15:06:01+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.quality.one\\\/leistungen\\\/security-testing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.quality.one\\\/leistungen\\\/security-testing\\\/\"},\"author\":{\"name\":\"Armin Haller\",\"@id\":\"https:\\\/\\\/www.quality.one\\\/#\\\/schema\\\/person\\\/895fbdf1157109b4fd715b895fa28b0f\"},\"headline\":\"Security Testing\",\"datePublished\":\"2024-03-20T10:40:26+00:00\",\"dateModified\":\"2026-01-31T15:06:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.quality.one\\\/leistungen\\\/security-testing\\\/\"},\"wordCount\":499,\"publisher\":{\"@id\":\"https:\\\/\\\/www.quality.one\\\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.quality.one\\\/leistungen\\\/security-testing\\\/\",\"url\":\"https:\\\/\\\/www.quality.one\\\/leistungen\\\/security-testing\\\/\",\"name\":\"Security Testing \u2013 Schwachstellen & Risiken | Quality.One\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.quality.one\\\/#website\"},\"datePublished\":\"2024-03-20T10:40:26+00:00\",\"dateModified\":\"2026-01-31T15:06:01+00:00\",\"description\":\"Security Testing deckt Angriffspunkte auf: Scans, Pr\u00fcfungen und Empfehlungen f\u00fcr Netzwerk, Client und Server \u2013 um Daten zu sch\u00fctzen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.quality.one\\\/leistungen\\\/security-testing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.quality.one\\\/leistungen\\\/security-testing\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.quality.one\\\/leistungen\\\/security-testing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.quality.one\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unsere Leistungen\",\"item\":\"https:\\\/\\\/www.quality.one\\\/leistungen\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security Testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.quality.one\\\/#website\",\"url\":\"https:\\\/\\\/www.quality.one\\\/\",\"name\":\"QualityOne\",\"description\":\"pure play testing\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.quality.one\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.quality.one\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.quality.one\\\/#organization\",\"name\":\"QualityOne\",\"url\":\"https:\\\/\\\/www.quality.one\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.quality.one\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.quality.one\\\/wp-content\\\/uploads\\\/cropped-Logo-Color-Positive-scaled-1.png\",\"contentUrl\":\"https:\\\/\\\/www.quality.one\\\/wp-content\\\/uploads\\\/cropped-Logo-Color-Positive-scaled-1.png\",\"width\":2558,\"height\":495,\"caption\":\"QualityOne\"},\"image\":{\"@id\":\"https:\\\/\\\/www.quality.one\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/qualityone-pureplaytesting\",\"https:\\\/\\\/bsky.app\\\/profile\\\/qualityone.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.quality.one\\\/#\\\/schema\\\/person\\\/895fbdf1157109b4fd715b895fa28b0f\",\"name\":\"Armin Haller\",\"url\":\"https:\\\/\\\/www.quality.one\\\/en\\\/author\\\/ahallerrocketlab-ch\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Testing \u2013 Schwachstellen & Risiken | Quality.One","description":"Security Testing deckt Angriffspunkte auf: Scans, Pr\u00fcfungen und Empfehlungen f\u00fcr Netzwerk, Client und Server \u2013 um Daten zu sch\u00fctzen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.quality.one\/en\/leistungen\/security-testing\/","og_locale":"en_US","og_type":"article","og_title":"Security Testing \u2013 Schwachstellen & Risiken | Quality.One","og_description":"Security Testing deckt Angriffspunkte auf: Scans, Pr\u00fcfungen und Empfehlungen f\u00fcr Netzwerk, Client und Server \u2013 um Daten zu sch\u00fctzen.","og_url":"https:\/\/www.quality.one\/en\/leistungen\/security-testing\/","og_site_name":"QualityOne","article_modified_time":"2026-01-31T15:06:01+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.quality.one\/leistungen\/security-testing\/#article","isPartOf":{"@id":"https:\/\/www.quality.one\/leistungen\/security-testing\/"},"author":{"name":"Armin Haller","@id":"https:\/\/www.quality.one\/#\/schema\/person\/895fbdf1157109b4fd715b895fa28b0f"},"headline":"Security Testing","datePublished":"2024-03-20T10:40:26+00:00","dateModified":"2026-01-31T15:06:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.quality.one\/leistungen\/security-testing\/"},"wordCount":499,"publisher":{"@id":"https:\/\/www.quality.one\/#organization"},"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.quality.one\/leistungen\/security-testing\/","url":"https:\/\/www.quality.one\/leistungen\/security-testing\/","name":"Security Testing \u2013 Schwachstellen & Risiken | Quality.One","isPartOf":{"@id":"https:\/\/www.quality.one\/#website"},"datePublished":"2024-03-20T10:40:26+00:00","dateModified":"2026-01-31T15:06:01+00:00","description":"Security Testing deckt Angriffspunkte auf: Scans, Pr\u00fcfungen und Empfehlungen f\u00fcr Netzwerk, Client und Server \u2013 um Daten zu sch\u00fctzen.","breadcrumb":{"@id":"https:\/\/www.quality.one\/leistungen\/security-testing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.quality.one\/leistungen\/security-testing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.quality.one\/leistungen\/security-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.quality.one\/"},{"@type":"ListItem","position":2,"name":"Unsere Leistungen","item":"https:\/\/www.quality.one\/leistungen\/"},{"@type":"ListItem","position":3,"name":"Security Testing"}]},{"@type":"WebSite","@id":"https:\/\/www.quality.one\/#website","url":"https:\/\/www.quality.one\/","name":"QualityOne","description":"pure play testing","publisher":{"@id":"https:\/\/www.quality.one\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.quality.one\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.quality.one\/#organization","name":"QualityOne","url":"https:\/\/www.quality.one\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.quality.one\/#\/schema\/logo\/image\/","url":"https:\/\/www.quality.one\/wp-content\/uploads\/cropped-Logo-Color-Positive-scaled-1.png","contentUrl":"https:\/\/www.quality.one\/wp-content\/uploads\/cropped-Logo-Color-Positive-scaled-1.png","width":2558,"height":495,"caption":"QualityOne"},"image":{"@id":"https:\/\/www.quality.one\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/qualityone-pureplaytesting","https:\/\/bsky.app\/profile\/qualityone.bsky.social"]},{"@type":"Person","@id":"https:\/\/www.quality.one\/#\/schema\/person\/895fbdf1157109b4fd715b895fa28b0f","name":"Armin Haller","url":"https:\/\/www.quality.one\/en\/author\/ahallerrocketlab-ch\/"}]}},"_links":{"self":[{"href":"https:\/\/www.quality.one\/en\/wp-json\/wp\/v2\/pages\/2573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.quality.one\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.quality.one\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.quality.one\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quality.one\/en\/wp-json\/wp\/v2\/comments?post=2573"}],"version-history":[{"count":0,"href":"https:\/\/www.quality.one\/en\/wp-json\/wp\/v2\/pages\/2573\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.quality.one\/en\/wp-json\/wp\/v2\/pages\/3975"}],"wp:attachment":[{"href":"https:\/\/www.quality.one\/en\/wp-json\/wp\/v2\/media?parent=2573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}