{"id":22,"date":"2021-10-19T10:18:01","date_gmt":"2021-10-19T08:18:01","guid":{"rendered":"https:\/\/joomo.w3po.de\/?page_id=22"},"modified":"2022-01-12T16:45:35","modified_gmt":"2022-01-12T15:45:35","slug":"hosting-cloudloesungen-und-benutzerverwaltung","status":"publish","type":"page","link":"https:\/\/joomo.w3po.de\/en\/produkte-und-services\/hosting-cloudloesungen-und-benutzerverwaltung\/","title":{"rendered":"Hosting, cloud solutions and user management"},"content":{"rendered":"\n<div class=\"is-layout-flex wp-container-4 wp-block-columns alignfull\">\n<div class=\"is-layout-flow wp-block-column\">\n<div class=\"is-layout-flow wp-block-group\">\n<h1>Hosting, cloud solutions and user management<\/h1>\n\n\n\n<p>We offer secure hosting and individual cloud solutions on our servers in Germany. If desired, we can also take over the user administration for our clients and enable users to securely access different business process resources such as databases, servers, web-based applications, etc.<\/p>\n\n\n\n<p>The protection of data and the safe use of various tools is our highest priority.<\/p>\n\n\n\n<p>Access is at least via 2 factor authentication (password + token).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/joomo.w3po.de\/wp-content\/uploads\/2022\/01\/hosting-cloudloesungen-benutzerverwaltung-1-eng.svg\"><img decoding=\"async\" loading=\"lazy\" width=\"512\" height=\"286\" src=\"https:\/\/joomo.w3po.de\/wp-content\/uploads\/2022\/01\/hosting-cloudloesungen-benutzerverwaltung-1-eng.svg\" alt=\"Hosting, Cloudloesunge, Benutzerverwaltung EN\" class=\"wp-image-833\"\/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"is-layout-flow wp-block-column\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"576\" src=\"https:\/\/joomo.w3po.de\/wp-content\/uploads\/2021\/10\/iStock-1148233812-1024x576.jpg\" alt=\"\" class=\"wp-image-69\" srcset=\"https:\/\/joomo.w3po.de\/wp-content\/uploads\/2021\/10\/iStock-1148233812-1024x576.jpg 1024w, https:\/\/joomo.w3po.de\/wp-content\/uploads\/2021\/10\/iStock-1148233812-300x169.jpg 300w, https:\/\/joomo.w3po.de\/wp-content\/uploads\/2021\/10\/iStock-1148233812-768x432.jpg 768w, https:\/\/joomo.w3po.de\/wp-content\/uploads\/2021\/10\/iStock-1148233812-1536x864.jpg 1536w, https:\/\/joomo.w3po.de\/wp-content\/uploads\/2021\/10\/iStock-1148233812-2048x1152.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"is-layout-flex wp-container-8 wp-block-columns alignfull\">\n<div class=\"is-layout-flow wp-block-column\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"682\" src=\"https:\/\/joomo.w3po.de\/wp-content\/uploads\/2021\/12\/iStock-1197780051-1024x682.jpg\" alt=\"\" class=\"wp-image-662\" srcset=\"https:\/\/joomo.w3po.de\/wp-content\/uploads\/2021\/12\/iStock-1197780051-1024x682.jpg 1024w, https:\/\/joomo.w3po.de\/wp-content\/uploads\/2021\/12\/iStock-1197780051-300x200.jpg 300w, https:\/\/joomo.w3po.de\/wp-content\/uploads\/2021\/12\/iStock-1197780051-768x512.jpg 768w, https:\/\/joomo.w3po.de\/wp-content\/uploads\/2021\/12\/iStock-1197780051-1536x1024.jpg 1536w, https:\/\/joomo.w3po.de\/wp-content\/uploads\/2021\/12\/iStock-1197780051.jpg 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"is-layout-flow wp-block-column\">\n<div class=\"is-layout-flow wp-block-group\">\n<p>In the case of projects with increased protection requirements, the IT systems must sometimes be individually adapted or additionally secured. We also offer the adaptation and the necessary protection as a service.<\/p>\n\n\n\n<p>All our services are certified according to TISAX (Trusted Information Security Assessment Exchange) and are subject to regular checks. This ensures the integrity, authenticity, availability and confidentiality of your development data.<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Secure hosting, individual cloud solutions and user management.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":12,"menu_order":85,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/joomo.w3po.de\/en\/wp-json\/wp\/v2\/pages\/22"}],"collection":[{"href":"https:\/\/joomo.w3po.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/joomo.w3po.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/joomo.w3po.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/joomo.w3po.de\/en\/wp-json\/wp\/v2\/comments?post=22"}],"version-history":[{"count":40,"href":"https:\/\/joomo.w3po.de\/en\/wp-json\/wp\/v2\/pages\/22\/revisions"}],"predecessor-version":[{"id":834,"href":"https:\/\/joomo.w3po.de\/en\/wp-json\/wp\/v2\/pages\/22\/revisions\/834"}],"up":[{"embeddable":true,"href":"https:\/\/joomo.w3po.de\/en\/wp-json\/wp\/v2\/pages\/12"}],"wp:attachment":[{"href":"https:\/\/joomo.w3po.de\/en\/wp-json\/wp\/v2\/media?parent=22"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}