{"id":8263,"date":"2023-05-22T14:38:59","date_gmt":"2023-05-22T12:38:59","guid":{"rendered":"https:\/\/www.tecracer.com\/?page_id=8263"},"modified":"2023-08-18T12:19:37","modified_gmt":"2023-08-18T10:19:37","slug":"continuous-security-as-a-service","status":"publish","type":"page","link":"https:\/\/www.tecracer.com\/en\/solutions\/continuous-security-as-a-service\/","title":{"rendered":"Continuous Security as a Service"},"content":{"rendered":"<h1>\n<p><strong><span role=\"presentation\" dir=\"ltr\">Continuous <\/span><span role=\"presentation\" dir=\"ltr\">Security<br \/><\/span><span role=\"presentation\" dir=\"ltr\">as a Service <\/span> <\/strong><\/p>\n<\/h1>\n<hr>\n<div>\n<p>Together with Amazon Web Services (AWS) and our <a href=\"https:\/\/www.tecracer.com\/en\/news-en\/netapp-spot-preferred-partner\/\" target=\"_blank\" rel=\"noopener\">partner Spot by NetApp<\/a>, we have built a solution for you based on AWS best practices and tools to continuously identify and assess security risks in the cloud.<\/p>\n<\/div>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/03\/AWS_premier_tier_training_partner_badge.png\" alt=\"\"><\/p>\n<h3>Aws Premium Consuting Partner<\/h3>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/03\/AWS_advanced_tier_consulting_partner_badge.png\" alt=\"\"><\/p>\n<h3>Aws Advanced Training Partner<\/h3>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/02\/200-Cert-Light-English-1.png\" alt=\"aws certified partner network\"><\/p>\n<h3>Aws Cert<\/h3>\n<\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/02\/web_AdobeStock_259470952.jpeg\" alt=\"\"><\/p>\n<h3>Challenges<\/h3>\n<hr>\n<div>\n<p>Cloud teams are constantly challenged to find solutions to a variety of challenges that can directly impact the efficiency and operations of their business.<\/p>\n<p>These include protecting data from unauthorized access, complying with regulations and standards, and maintaining secure connections between cloud services and users.<\/p>\n<p>In addition, IT security must be able to detect and quickly respond to potential threats such as data breaches, malware and malicious actors.<\/p>\n<p>To address these challenges, we have developed a solution for our customers based on Spot by NetApp that enables enterprises to continuously identify and assess their security risks in the cloud.<\/p>\n<\/div>\n<h3>Our Consulting Services<\/h3>\n<hr>\n<div>\n<ul>\n<li>Wir begleiten Sie gerne in allen Phasen Ihrer Cloud- Journey \u2013 auf Basis von AWS Best Practices und bew\u00e4hrten Tools wie Spot by NetApp<\/li>\n<li>Essenziell f\u00fcr den Erfolg der Cloud-Transition sind ein strukturiertes Vorgehen und eine klare AWS Cloud-Strategie<\/li>\n<li>Und um die Cloud-Transition zu beschleunigen, sollten sich Unternehmen lieber gleich auf erfahrene Profis wie AWS, Spot by NetApp und tecRacer verlassen<\/li>\n<\/ul>\n<\/div>\n<h3>\n<p><strong>AWS, Spot by NETAPP AND TECRACER \u2013 OUR SOLUTION <\/strong>YOU CAN RELY ON<\/p>\n<\/h3>\n<hr>\n<div>\n<p>Designed specifically for the cloud, Spot Security enables continuous assessment and analysis of the security state &#8211; not just in the AWS cloud. With Spot Security, cloud teams can more easily collaborate to identify misconfigurations, reduce their potential attack surface, and ensure compliance.<\/p>\n<p>Spot Security&#8217;s agentless technology analyzes relationships between cloud resources to provide a clear view and prioritize countermeasures. It automatically determines the potential threat level of each cloud resource and uncovers critical security threats based on their potential impact on the business.<\/p>\n<p>The automated measures reduce so-called &#8220;alert fatigue&#8221;, i.e. that alerts are disregarded because there are too many or too frequent false positives. In this way, they ensure a secure cloud infrastructure and efficient workflows.<\/p>\n<\/div>\n<h3>\n<h3 id=\"headline-style-h4\">YOUR BENEFITS FROM OUR SOLUTION<\/h3>\n<\/h3>\n<hr>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/02\/icon-bewaehrte_sicherheit-1.png\" alt=\"\"><\/p>\n<h2>COMPLIANCE<\/h2>\n<div>\n<p>Spot Security helps companies comply with industry-standard security standards and regulatory requirements.<\/p>\n<\/div>\n<p><a href=\"#\">Read More<\/a><\/p>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/02\/icon_funktionalitaet-1.png\" alt=\"\"><\/p>\n<h2>AUTOMATED DETECTION AND ELIMINATION OF PROBLEMS<\/h2>\n<div>\n<p><span>With Spot Security, cloud teams can easily and cost-effectively collaborate to identify misconfigurations, reduce potential attack surfaces, and ensure compliance.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/02\/tecracer_performance_icon.png\" alt=\"\"><\/p>\n<h2>360\u00b0 VISIBILITY<\/h2>\n<div>\n<p>Organizations get a clear view of the security state and attack surfaces, network analysis, asset inventory, and cloud user behavior. All these factors are displayed on one user interface via graphical visualization of risk and service maps.<\/p>\n<\/div>\n<p><a href=\"#\">Read More<\/a><\/p>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2022\/02\/icon_costs-1.png\" alt=\"\"><\/p>\n<h2>PRIORITIZED ANALYSES<\/h2>\n<div>\n<p>With continuous monitoring and analysis, new risks, abnormal behavior or new cloud resources can be identified instantly. This gives cloud teams clear objectives to focus on. They can focus their efforts on real issues, eliminate false alarms, and holistically secure cloud operations.<\/p>\n<\/div>\n<p><a href=\"#\">Read More<\/a><\/p>\n<\/li>\n<\/ul>\n<h3>\n<p><strong>AWS AND TECRACER <\/strong>CO-INVEST IN YOUR CUSTOM PROOF OF CONCEPT (POC)<strong>. <\/strong>LEARN MORE IN OUR PACKAGED OFFER <strong>\u201cSpot security\u201d:<\/strong><\/p>\n<\/h3>\n<hr>\n<pre><code>\n\t\t\t\t\t\t<script>\n\t\t\t\t\t\t\twindow.hsFormsOnReady = window.hsFormsOnReady || [];\n\t\t\t\t\t\t\twindow.hsFormsOnReady.push(()=>{\n\t\t\t\t\t\t\t\thbspt.forms.create({\n\t\t\t\t\t\t\t\t\tportalId: 25477004,\n\t\t\t\t\t\t\t\t\tformId: \"449f745a-8dcd-414e-9d43-b8d00fbc8843\",\n\t\t\t\t\t\t\t\t\ttarget: \"#hbspt-form-1776210922000-4272773299\",\n\t\t\t\t\t\t\t\t\tregion: \"eu1\",\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t})});\n\t\t\t\t\t\t<\/script>\n\t\t\t\t\t\t<div class=\"hbspt-form\" id=\"hbspt-form-1776210922000-4272773299\"><\/div><\/code><\/pre>\n<h3>NetApp and tecRacer &#8211; <span>A STRONG PARTNERSHIP<\/span><\/h3>\n<hr>\n<div>\n<\/div>\n<p><!--more--><br \/>\n<!-- {\"name\":\"Quanten-Vorlage\",\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"100\",\"image_position\":\"center-center\",\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"order_first\":\"m\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"\n\n<p><strong><span role=\\\"presentation\\\" dir=\\\"ltr\\\">Continuous <\\\/span><span role=\\\"presentation\\\" dir=\\\"ltr\\\">Security<br \\\/><\\\/span><span role=\\\"presentation\\\" dir=\\\"ltr\\\">as a Service <\\\/span> <\\\/strong><\\\/p>\",\"title_element\":\"h1\"}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"small\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Together with Amazon Web Services (AWS) and our <a href=\\\"https:\\\/\\\/www.tecracer.com\\\/en\\\/news-en\\\/netapp-spot-preferred-partner\\\/\\\" target=\\\"_blank\\\" rel=\\\"noopener\\\">partner Spot by NetApp<\\\/a>, we have built a solution for you based on AWS best practices and tools to continuously identify and assess security risks in the cloud.<\\\/p>\",\"margin\":\"default\"}},{\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"2\",\"grid_medium\":\"4\",\"grid_small\":\"4\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"item_animation\":true,\"link_style\":\"default\",\"link_text\":\"Read more\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_style\":\"tile-default\",\"parallax_easing\":\"1\",\"show_content\":false,\"show_image\":true,\"show_link\":false,\"show_meta\":false,\"show_title\":false,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2022\\\/03\\\/AWS_premier_tier_training_partner_badge.png\",\"title\":\"Aws Premium Consuting Partner\"}},{\"type\":\"grid_item\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2022\\\/03\\\/AWS_advanced_tier_consulting_partner_badge.png\",\"title\":\"Aws Advanced Training Partner\"}},{\"type\":\"grid_item\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2023\\\/02\\\/200-Cert-Light-English-1.png\",\"image_alt\":\"aws certified partner network\",\"title\":\"Aws Cert\"}}],\"name\":\"AWS Badges\"}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"order_first\":\"xs\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"image\",\"props\":{\"class\":\"heroimg maske5 maskr\",\"image\":\"wp-content\\\/uploads\\\/2022\\\/02\\\/web_AdobeStock_259470952.jpeg\",\"image_box_decoration\":\"mask\",\"image_height\":\"600\",\"image_svg_color\":\"emphasis\",\"image_width\":\"600\",\"margin\":\"default\",\"text_align\":\"right\",\"visibility\":\"s\"}}]}]}],\"modified\":\"2022-02-07T09:34:39.020Z\",\"name\":\"Section-1\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"100\",\"image_position\":\"center-center\",\"overlap\":false,\"padding_remove_bottom\":false,\"padding_remove_horizontal\":false,\"style\":\"muted\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"1-2,1-2\",\"margin_remove_bottom\":false,\"match\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-muted\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Challenges\",\"title_element\":\"h3\"}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"small\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Cloud teams are constantly challenged to find solutions to a variety of challenges that can directly impact the efficiency and operations of their business.<\\\/p>\\n\n\n<p>These include protecting data from unauthorized access, complying with regulations and standards, and maintaining secure connections between cloud services and users.<\\\/p>\\n\n\n<p>In addition, IT security must be able to detect and quickly respond to potential threats such as data breaches, malware and malicious actors.<\\\/p>\\n\n\n<p>To address these challenges, we have developed a solution for our customers based on Spot by NetApp that enables enterprises to continuously identify and assess their security risks in the cloud.<\\\/p>\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":true,\"style\":\"tile-secondary\",\"width_medium\":\"1-2\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Our Consulting Services\",\"title_color\":\"danger\",\"title_element\":\"h3\"}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"small\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<ul>\\n\n\n<li>Wir begleiten Sie gerne in allen Phasen Ihrer Cloud- Journey \\u2013 auf Basis von AWS Best Practices und bew\\u00e4hrten Tools wie Spot by NetApp<\\\/li>\\n\n\n<li>Essenziell f\\u00fcr den Erfolg der Cloud-Transition sind ein strukturiertes Vorgehen und eine klare AWS Cloud-Strategie<\\\/li>\\n\n\n<li>Und um die Cloud-Transition zu beschleunigen, sollten sich Unternehmen lieber gleich auf erfahrene Profis wie AWS, Spot by NetApp und tecRacer verlassen<\\\/li>\\n<\\\/ul>\",\"margin\":\"default\",\"text_color\":\"danger\"}}]}]}],\"modified\":\"2022-02-09T13:12:52.089Z\",\"name\":\"TEXT-TEXT-BLUE\"},{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"padding_remove_bottom\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"props\":{\"margin\":\"remove-vertical\",\"row_gap\":\"collapse\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"path\":\"elements\",\"name\":\"Headline Style H4\",\"type\":\"headline\",\"props\":{\"content\":\"\n\n<p><strong>AWS, Spot by NETAPP AND TECRACER \\u2013 OUR SOLUTION <\\\/strong>YOU CAN RELY ON<\\\/p>\",\"id\":\"headline-style-h4\",\"title_element\":\"h3\"},\"meta\":{\"type\":\"headline\",\"website\":\"elements\",\"image\":\"https:\\\/\\\/downloads-yootheme.storage.googleapis.com\\\/library\\\/elements\\\/elements\\\/headline-style-h-4.jpg\"},\"images\":[]},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"small\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Designed specifically for the cloud, Spot Security enables continuous assessment and analysis of the security state - not just in the AWS cloud. With Spot Security, cloud teams can more easily collaborate to identify misconfigurations, reduce their potential attack surface, and ensure compliance.<\\\/p>\\n\n\n<p>Spot Security's agentless technology analyzes relationships between cloud resources to provide a clear view and prioritize countermeasures. It automatically determines the potential threat level of each cloud resource and uncovers critical security threats based on their potential impact on the business.<\\\/p>\\n\n\n<p>The automated measures reduce so-called \\\"alert fatigue\\\", i.e. that alerts are disregarded because there are too many or too frequent false positives. In this way, they ensure a secure cloud infrastructure and efficient workflows.<\\\/p>\",\"margin\":\"default\"}}]}]}]},{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"style\":\"muted\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"path\":\"elements\",\"name\":\"Headline Style H4\",\"type\":\"headline\",\"props\":{\"content\":\"\n\n<h3 id=\\\"headline-style-h4\\\">YOUR BENEFITS FROM OUR SOLUTION<\\\/h3>\",\"id\":\"headline-style-h4\",\"title_element\":\"h3\"},\"meta\":{\"type\":\"headline\",\"website\":\"elements\",\"image\":\"https:\\\/\\\/downloads-yootheme.storage.googleapis.com\\\/library\\\/elements\\\/elements\\\/headline-style-h-4.jpg\"},\"images\":[]},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"small\"}},{\"path\":\"elements\",\"name\":\"Grid Panel Style Card\",\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"content_margin\":\"small\",\"css\":\".el-image {\\n    margin:auto auto;\\n    display: block;\\n}\\n\\n\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":true,\"grid_default\":\"1\",\"grid_medium\":\"2\",\"grid_small\":\"1\",\"icon_width\":\"\",\"id\":\"grid-panel-style-card\",\"image_align\":\"left\",\"image_grid_breakpoint\":\"m\",\"image_grid_column_gap\":\"collapse\",\"image_grid_row_gap\":\"collapse\",\"image_grid_width\":\"1-5\",\"image_link\":true,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":\"80\",\"item_animation\":true,\"link_style\":\"text\",\"link_text\":\"Read More\",\"margin\":\"remove-vertical\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":true,\"panel_link\":false,\"panel_padding\":\"default\",\"parallax_easing\":\"1\",\"show_content\":true,\"show_image\":true,\"show_link\":false,\"show_meta\":false,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_link\":true,\"title_margin\":\"small\",\"title_style\":\"h3\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Spot Security helps companies comply with industry-standard security standards and regulatory requirements.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2022\\\/02\\\/icon-bewaehrte_sicherheit-1.png\",\"link\":\"#\",\"meta\":\"\",\"title\":\"COMPLIANCE\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p><span>With Spot Security, cloud teams can easily and cost-effectively collaborate to identify misconfigurations, reduce potential attack surfaces, and ensure compliance.<\\\/span><\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2022\\\/02\\\/icon_funktionalitaet-1.png\",\"title\":\"AUTOMATED DETECTION AND ELIMINATION OF PROBLEMS\"}}],\"meta\":{\"type\":\"grid\",\"website\":\"elements\",\"image\":\"https:\\\/\\\/downloads-yootheme.storage.googleapis.com\\\/library\\\/elements\\\/elements\\\/grid-panel-style-card.jpg\"},\"images\":[{\"src\":\"wp-content\\\/themes\\\/yootheme\\\/vendor\\\/yootheme\\\/theme\\\/assets\\\/images\\\/element-image-placeholder.png\",\"md5\":\"1f8accb872d02d8f699c779e9d0f606c\"},{\"src\":\"wp-content\\\/themes\\\/yootheme\\\/vendor\\\/yootheme\\\/theme\\\/assets\\\/images\\\/element-image-placeholder.png\",\"md5\":\"99b225df96823f8c2833c627cff6b68e\"},{\"src\":\"wp-content\\\/themes\\\/yootheme\\\/vendor\\\/yootheme\\\/theme\\\/assets\\\/images\\\/element-image-placeholder.png\",\"md5\":\"5ca53767787885c270fb3d114d83e73d\"}]},{\"path\":\"elements\",\"name\":\"Grid Panel Style Card\",\"type\":\"grid\",\"props\":{\"content_column_breakpoint\":\"m\",\"content_margin\":\"small\",\"css\":\".el-image {\\n    margin:auto auto;\\n    display: block;\\n}\\n\\n\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":true,\"grid_default\":\"1\",\"grid_medium\":\"2\",\"grid_small\":\"1\",\"icon_width\":\"\",\"id\":\"grid-panel-style-card\",\"image_align\":\"left\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-5\",\"image_link\":true,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":\"80\",\"item_animation\":true,\"link_style\":\"text\",\"link_text\":\"Read More\",\"margin\":\"remove-vertical\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_image_no_padding\":true,\"panel_link\":false,\"panel_padding\":\"default\",\"parallax_easing\":\"1\",\"show_content\":true,\"show_image\":true,\"show_link\":false,\"show_meta\":false,\"show_title\":true,\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_link\":true,\"title_margin\":\"small\",\"title_style\":\"h3\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Organizations get a clear view of the security state and attack surfaces, network analysis, asset inventory, and cloud user behavior. All these factors are displayed on one user interface via graphical visualization of risk and service maps.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2022\\\/02\\\/tecracer_performance_icon.png\",\"link\":\"#\",\"meta\":\"\",\"title\":\"360\\u00b0 VISIBILITY\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>With continuous monitoring and analysis, new risks, abnormal behavior or new cloud resources can be identified instantly. This gives cloud teams clear objectives to focus on. They can focus their efforts on real issues, eliminate false alarms, and holistically secure cloud operations.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2022\\\/02\\\/icon_costs-1.png\",\"link\":\"#\",\"meta\":\"\",\"title\":\"PRIORITIZED ANALYSES\"}}],\"meta\":{\"type\":\"grid\",\"website\":\"elements\",\"image\":\"https:\\\/\\\/downloads-yootheme.storage.googleapis.com\\\/library\\\/elements\\\/elements\\\/grid-panel-style-card.jpg\"},\"images\":[{\"src\":\"wp-content\\\/themes\\\/yootheme\\\/vendor\\\/yootheme\\\/theme\\\/assets\\\/images\\\/element-image-placeholder.png\",\"md5\":\"1f8accb872d02d8f699c779e9d0f606c\"},{\"src\":\"wp-content\\\/themes\\\/yootheme\\\/vendor\\\/yootheme\\\/theme\\\/assets\\\/images\\\/element-image-placeholder.png\",\"md5\":\"99b225df96823f8c2833c627cff6b68e\"},{\"src\":\"wp-content\\\/themes\\\/yootheme\\\/vendor\\\/yootheme\\\/theme\\\/assets\\\/images\\\/element-image-placeholder.png\",\"md5\":\"5ca53767787885c270fb3d114d83e73d\"}]}]}]}]},{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"padding_remove_bottom\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"props\":{\"margin\":\"remove-vertical\",\"row_gap\":\"collapse\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"path\":\"elements\",\"name\":\"Headline Style H4\",\"type\":\"headline\",\"props\":{\"content\":\"\n\n<p><strong>AWS AND TECRACER <\\\/strong>CO-INVEST IN YOUR CUSTOM PROOF OF CONCEPT (POC)<strong>. <\\\/strong>LEARN MORE IN OUR PACKAGED OFFER <strong>\\u201cSpot security\\u201d:<\\\/strong><\\\/p>\",\"id\":\"headline-style-h4\",\"title_element\":\"h3\"},\"meta\":{\"type\":\"headline\",\"website\":\"elements\",\"image\":\"https:\\\/\\\/downloads-yootheme.storage.googleapis.com\\\/library\\\/elements\\\/elements\\\/headline-style-h-4.jpg\"},\"images\":[]},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"small\"}},{\"type\":\"code\",\"props\":{\"content\":\"[hubspot type=form portal=25477004 id=449f745a-8dcd-414e-9d43-b8d00fbc8843]\"}}]}]}]},{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"status\":\"disabled\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"image\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2022\\\/02\\\/matthias_jansky_600.jpeg\",\"image_border\":\"circle\",\"image_height\":\"150\",\"image_svg_color\":\"emphasis\",\"image_width\":\"150\",\"inline_align\":\"center\",\"margin\":\"default\",\"text_align\":\"center\"}},{\"type\":\"quotation\",\"props\":{\"block_align\":\"center\",\"content\":\"\n\n<p>\\\" Als langj\\u00e4hriger AWS-Partner \\u00fcbersetzten wir die Vorteile der AWS-Cloud f\\u00fcr den Mittelstand und arbeiten mit unseren Kunden \\u00fcber \\u00fcber den gesamten Lebenszyklus der Cloud auf Augenh\\u00f6he zusammen. \\\"<\\\/p>\",\"footer\":\"Matthias Jansky, Managing Director, tecRacer Project Management GmbH\",\"margin\":\"medium\",\"maxwidth\":\"xlarge\",\"text_align\":\"center\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-3\"},\"children\":[{\"path\":\"elements\",\"name\":\"Headline Style H4\",\"type\":\"headline\",\"props\":{\"content\":\"Warum ist tecRacer der richtige Partner f\\u00fcr Ihr Unternehmen ?\",\"id\":\"headline-style-h4\",\"title_element\":\"h4\"},\"meta\":{\"type\":\"headline\",\"website\":\"elements\",\"image\":\"https:\\\/\\\/downloads-yootheme.storage.googleapis.com\\\/library\\\/elements\\\/elements\\\/headline-style-h-4.jpg\"},\"images\":[]},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"small\"}},{\"path\":\"elements\",\"name\":\"List Marker Icon\",\"type\":\"list\",\"props\":{\"column_breakpoint\":\"m\",\"icon\":\"check\",\"icon_color\":\"primary\",\"id\":\"list-marker-icon\",\"image\":true,\"image_align\":\"left\",\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"list_element\":\"ul\",\"list_horizontal_separator\":\", \",\"list_type\":\"vertical\",\"margin\":\"default\",\"show_image\":true,\"show_link\":true},\"children\":[{\"type\":\"list_item\",\"props\":{\"content\":\"\n\n<p>Partner f\\u00fcr den Mittelstand \\u2013 Vertrauensvolle Kommunikation auf Augenh\\u00f6he<\\\/p>\",\"icon\":\"\",\"image\":\"\"}},{\"type\":\"list_item\",\"props\":{\"content\":\"Langj\\u00e4hrige Erfahrung \\u2013 Erster AWS-Partner in Deutschland mit \\u00fcber 50 erfolgreichen Migrationsprojekten\",\"icon\":\"\",\"image\":\"\"}},{\"type\":\"list_item\",\"props\":{\"content\":\"Alles aus einer Hand: Betreuung des kompletten Cloud Lebenszyklus\",\"icon\":\"\",\"image\":\"\"}},{\"type\":\"list_item\",\"props\":{\"content\":\"Enge Zusammenarbeit mit AWS: Seit 2011 fokussieren wir uns auf AWS-Cloud\",\"icon\":\"\",\"image\":\"\"}},{\"type\":\"list_item\",\"props\":{\"content\":\"Zertifiziertes Know-How: Erster zertifizierter externer AWS-Trainer in Deutschland\"}}],\"meta\":{\"type\":\"list\",\"website\":\"elements\",\"image\":\"https:\\\/\\\/downloads-yootheme.storage.googleapis.com\\\/library\\\/elements\\\/elements\\\/list-marker-icon.jpg\"},\"images\":[]}]}],\"props\":{\"layout\":\"1-3,2-3\"}}]},{\"type\":\"section\",\"props\":{\"image_position\":\"center-center\",\"style\":\"muted\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"middle\",\"width\":\"default\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"path\":\"elements\",\"name\":\"Headline Style H4\",\"type\":\"headline\",\"props\":{\"content\":\"NetApp and tecRacer - <span>A STRONG PARTNERSHIP<\\\/span>\",\"id\":\"headline-style-h4\",\"title_element\":\"h3\"},\"meta\":{\"type\":\"headline\",\"website\":\"elements\",\"image\":\"https:\\\/\\\/downloads-yootheme.storage.googleapis.com\\\/library\\\/elements\\\/elements\\\/headline-style-h-4.jpg\"},\"images\":[]},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"small\"}},{\"type\":\"panel-slider\",\"props\":{\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_color\":\"emphasis\",\"link_style\":\"\",\"link_text\":\"Learn more\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"nav\":\"dotnav\",\"nav_align\":\"center\",\"nav_breakpoint\":\"s\",\"panel_card_match\":true,\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":false,\"show_title\":true,\"slidenav\":\"outside\",\"slidenav_breakpoint\":\"xl\",\"slidenav_margin\":\"medium\",\"slidenav_outside_breakpoint\":\"xl\",\"slider_autoplay\":true,\"slider_autoplay_pause\":true,\"slider_divider\":false,\"slider_gap\":\"default\",\"slider_width\":\"fixed\",\"slider_width_default\":\"1-1\",\"slider_width_medium\":\"1-3\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"panel-slider_item\",\"props\":{\"link_text\":\"Learn more\",\"panel_style\":\"card-hover\"},\"source\":{\"query\":{\"name\":\"posts.customPosts\",\"arguments\":{\"terms\":[142],\"category_operator\":\"IN\",\"post_tag_operator\":\"IN\",\"users\":[],\"users_operator\":\"IN\",\"offset\":0,\"limit\":4,\"order\":\"date\",\"order_direction\":\"DESC\"}},\"props\":{\"title\":{\"filters\":{\"search\":\"\"},\"name\":\"title\"},\"link\":{\"filters\":{\"search\":\"\"},\"name\":\"link\"},\"image\":{\"filters\":{\"search\":\"\"},\"name\":\"featuredImage.url\"}}}}]}]}]}]}],\"version\":\"4.0.5\",\"yooessentialsVersion\":\"2.0.7\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Continuous Securityas a Service Together with Amazon Web Services (AWS) and our partner Spot by NetApp, we have built a solution for you based on AWS best practices and tools to continuously identify and assess security risks in the cloud. Aws Premium Consuting Partner Aws Advanced Training Partner Aws Cert Challenges Cloud teams are constantly [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":2962,"parent":6553,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-8263","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Continuous Security as a Service - tecRacer<\/title>\n<meta name=\"description\" content=\"Continuous Security as a Service - continuously identify and assess security risks in the cloud!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecracer.com\/en\/solutions\/continuous-security-as-a-service\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Continuous Security as a Service\" \/>\n<meta property=\"og:description\" content=\"Continuous Security as a Service - continuously identify and assess security risks in the cloud!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecracer.com\/en\/solutions\/continuous-security-as-a-service\/\" \/>\n<meta property=\"og:site_name\" content=\"tecRacer\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tecRacer\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-18T10:19:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecracer.com\/wp-content\/uploads\/2022\/02\/web_AdobeStock_259470952.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"536\" \/>\n\t<meta property=\"og:image:height\" content=\"417\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@tecRacer\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.tecracer.com\\\/en\\\/solutions\\\/continuous-security-as-a-service\\\/\",\"url\":\"https:\\\/\\\/www.tecracer.com\\\/en\\\/solutions\\\/continuous-security-as-a-service\\\/\",\"name\":\"Continuous Security as a Service - tecRacer\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecracer.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.tecracer.com\\\/en\\\/solutions\\\/continuous-security-as-a-service\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tecracer.com\\\/en\\\/solutions\\\/continuous-security-as-a-service\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecracer.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/web_AdobeStock_259470952.jpeg\",\"datePublished\":\"2023-05-22T12:38:59+00:00\",\"dateModified\":\"2023-08-18T10:19:37+00:00\",\"description\":\"Continuous Security as a Service - continuously identify and assess security risks in the cloud!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.tecracer.com\\\/en\\\/solutions\\\/continuous-security-as-a-service\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.tecracer.com\\\/en\\\/solutions\\\/continuous-security-as-a-service\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.tecracer.com\\\/en\\\/solutions\\\/continuous-security-as-a-service\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.tecracer.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/web_AdobeStock_259470952.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.tecracer.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/web_AdobeStock_259470952.jpeg\",\"width\":536,\"height\":417,\"caption\":\"Padlock with computer keyboard. Internet and computer security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.tecracer.com\\\/en\\\/solutions\\\/continuous-security-as-a-service\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/www.tecracer.com\\\/en\\\/solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Continuous Security as a Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.tecracer.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.tecracer.com\\\/en\\\/\",\"name\":\"tecRacer\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.tecracer.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.tecracer.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.tecracer.com\\\/en\\\/#organization\",\"name\":\"tecRacer\",\"url\":\"https:\\\/\\\/www.tecracer.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.tecracer.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.tecracer.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/tR_-logo_White.png\",\"contentUrl\":\"https:\\\/\\\/www.tecracer.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/tR_-logo_White.png\",\"width\":786,\"height\":129,\"caption\":\"tecRacer\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tecracer.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/tecRacer\\\/\",\"https:\\\/\\\/x.com\\\/tecRacer\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/tecracer-group\\\/\",\"https:\\\/\\\/www.instagram.com\\\/tecracergroup\",\"https:\\\/\\\/www.xing.com\\\/pages\\\/tecracergmbh-co-kg\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Continuous Security as a Service - tecRacer","description":"Continuous Security as a Service - continuously identify and assess security risks in the cloud!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecracer.com\/en\/solutions\/continuous-security-as-a-service\/","og_locale":"en_US","og_type":"article","og_title":"Continuous Security as a Service","og_description":"Continuous Security as a Service - continuously identify and assess security risks in the cloud!","og_url":"https:\/\/www.tecracer.com\/en\/solutions\/continuous-security-as-a-service\/","og_site_name":"tecRacer","article_publisher":"https:\/\/www.facebook.com\/tecRacer\/","article_modified_time":"2023-08-18T10:19:37+00:00","og_image":[{"width":536,"height":417,"url":"https:\/\/www.tecracer.com\/wp-content\/uploads\/2022\/02\/web_AdobeStock_259470952.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@tecRacer","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tecracer.com\/en\/solutions\/continuous-security-as-a-service\/","url":"https:\/\/www.tecracer.com\/en\/solutions\/continuous-security-as-a-service\/","name":"Continuous Security as a Service - tecRacer","isPartOf":{"@id":"https:\/\/www.tecracer.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecracer.com\/en\/solutions\/continuous-security-as-a-service\/#primaryimage"},"image":{"@id":"https:\/\/www.tecracer.com\/en\/solutions\/continuous-security-as-a-service\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecracer.com\/wp-content\/uploads\/2022\/02\/web_AdobeStock_259470952.jpeg","datePublished":"2023-05-22T12:38:59+00:00","dateModified":"2023-08-18T10:19:37+00:00","description":"Continuous Security as a Service - continuously identify and assess security risks in the cloud!","breadcrumb":{"@id":"https:\/\/www.tecracer.com\/en\/solutions\/continuous-security-as-a-service\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecracer.com\/en\/solutions\/continuous-security-as-a-service\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecracer.com\/en\/solutions\/continuous-security-as-a-service\/#primaryimage","url":"https:\/\/www.tecracer.com\/wp-content\/uploads\/2022\/02\/web_AdobeStock_259470952.jpeg","contentUrl":"https:\/\/www.tecracer.com\/wp-content\/uploads\/2022\/02\/web_AdobeStock_259470952.jpeg","width":536,"height":417,"caption":"Padlock with computer keyboard. Internet and computer security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecracer.com\/en\/solutions\/continuous-security-as-a-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Solutions","item":"https:\/\/www.tecracer.com\/en\/solutions\/"},{"@type":"ListItem","position":2,"name":"Continuous Security as a Service"}]},{"@type":"WebSite","@id":"https:\/\/www.tecracer.com\/en\/#website","url":"https:\/\/www.tecracer.com\/en\/","name":"tecRacer","description":"","publisher":{"@id":"https:\/\/www.tecracer.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecracer.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.tecracer.com\/en\/#organization","name":"tecRacer","url":"https:\/\/www.tecracer.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecracer.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecracer.com\/wp-content\/uploads\/2022\/06\/tR_-logo_White.png","contentUrl":"https:\/\/www.tecracer.com\/wp-content\/uploads\/2022\/06\/tR_-logo_White.png","width":786,"height":129,"caption":"tecRacer"},"image":{"@id":"https:\/\/www.tecracer.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/tecRacer\/","https:\/\/x.com\/tecRacer","https:\/\/www.linkedin.com\/company\/tecracer-group\/","https:\/\/www.instagram.com\/tecracergroup","https:\/\/www.xing.com\/pages\/tecracergmbh-co-kg"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.tecracer.com\/en\/wp-json\/wp\/v2\/pages\/8263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecracer.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tecracer.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecracer.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecracer.com\/en\/wp-json\/wp\/v2\/comments?post=8263"}],"version-history":[{"count":5,"href":"https:\/\/www.tecracer.com\/en\/wp-json\/wp\/v2\/pages\/8263\/revisions"}],"predecessor-version":[{"id":9161,"href":"https:\/\/www.tecracer.com\/en\/wp-json\/wp\/v2\/pages\/8263\/revisions\/9161"}],"up":[{"embeddable":true,"href":"https:\/\/www.tecracer.com\/en\/wp-json\/wp\/v2\/pages\/6553"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecracer.com\/en\/wp-json\/wp\/v2\/media\/2962"}],"wp:attachment":[{"href":"https:\/\/www.tecracer.com\/en\/wp-json\/wp\/v2\/media?parent=8263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}