{"id":22507,"date":"2025-05-12T14:27:06","date_gmt":"2025-05-12T12:27:06","guid":{"rendered":"https:\/\/dev.xoap.io\/?p=22507"},"modified":"2025-05-12T14:27:32","modified_gmt":"2025-05-12T12:27:32","slug":"security-compliance-automation-insights-from-the-second-episode-of-our-podcast","status":"publish","type":"post","link":"https:\/\/dev.xoap.io\/de\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/","title":{"rendered":"Sicherheit und Compliance: Einblicke aus unserem Podcast Folge 02"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"22507\" class=\"elementor elementor-22507\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-86c21a6 e-flex e-con-boxed e-con e-parent\" data-id=\"86c21a6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-05c1ca8 e-con-full e-flex e-con e-child\" data-id=\"05c1ca8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a91d282 elementor-widget elementor-widget-text-editor\" data-id=\"a91d282\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In der zweiten Folge von <a href=\"https:\/\/www.youtube.com\/playlist?list=PLs-JcRlVtkHqiQcAv-Xj5_mqDHtHEQ2CK\" target=\"_blank\" rel=\"noopener\">Cloud trifft auf Hybrid | Automatisierungsgespr\u00e4che<\/a>, die Podcast-Serie von XOAP, die sich mit realen Herausforderungen und L\u00f6sungen im Bereich der Automatisierung befasst, <strong>Mario Istuk setzt sich zusammen mit <a href=\"https:\/\/www.linkedin.com\/in\/norbert-ponak\/\" target=\"_blank\" rel=\"noopener\">Norbert Ponak<\/a>, Gr\u00fcnder von Clourity<\/strong>um \u00fcber Sicherheit, Compliance und Automatisierung in den heutigen hybriden IT-Umgebungen zu diskutieren.<\/p><p>Mit mehr als drei Jahrzehnten Erfahrung bei Unternehmen wie Citrix, Nutanix und dem Microsoft-Partner Aero ECS leitet Norbert jetzt Clourity, ein Beratungsunternehmen, das Unternehmen bei der sicheren und strategischen Umstellung auf die Cloud unterst\u00fctzt.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d4c7ac4 e-con-full e-flex e-con e-child\" data-id=\"d4c7ac4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52df673 elementor-widget elementor-widget-heading\" data-id=\"52df673\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Einhaltung von Vorschriften in hybriden Umgebungen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d4f9aa elementor-widget elementor-widget-text-editor\" data-id=\"3d4f9aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Norbert hebt hervor, dass moderne IT-Umgebungen eine Mischung aus Legacy-, On-Premises- und Cloud-Systemen sind, die oft \u00fcber verschiedene Tools wie GPO oder Intune verwaltet werden oder sogar unverwaltet sind. Diese Fragmentierung erschwert die Nachverfolgung und Durchsetzung der Compliance.<\/p><p>Er erkl\u00e4rt, dass <strong>Bei der Compliance-Automatisierung geht es darum, eine einheitliche Umgebung zu schaffen, die verschiedene Anforderungen plattform\u00fcbergreifend unterst\u00fctzt.<\/strong>. Der wirkliche Engpass, sagt Norbert, ist nicht die Identifizierung von Problemen.<strong>er beseitigt sie schnell<\/strong> mit begrenzter Zeit und Ressourcen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7a0651 elementor-widget elementor-widget-heading\" data-id=\"b7a0651\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wichtige Benchmarks und Vorschriften<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42d9ff2 elementor-widget elementor-widget-text-editor\" data-id=\"42d9ff2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Norbert verweist auf zwei rechtliche Rahmenbedingungen, die heute die Bem\u00fchungen um die Einhaltung der Vorschriften bestimmen:<\/p><p>- <strong><a href=\"https:\/\/dev.xoap.io\/de\/nis2-compliance-automation\/\" target=\"_blank\" rel=\"noopener\">NIS2<\/a>:<\/strong> Neue EU-Verordnung zur Cybersicherheit. <br \/>- <strong>DORA (Digital Operational Resilience Act)<\/strong>: Besonders wichtig im Finanzsektor, wo strenge Fristen und Unterlagen erforderlich sind.<\/p><p>Er betont, dass die Automatisierung sowohl technische Abhilfema\u00dfnahmen als auch die von den Pr\u00fcfern erwarteten Berichterstattungsprozesse unterst\u00fctzt.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70904c7 elementor-widget elementor-widget-text-editor\" data-id=\"70904c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><strong>Automatisierungsgespr\u00e4che #02<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51b457e elementor-widget__width-initial elementor-widget elementor-widget-video\" data-id=\"51b457e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/JLoOO-khJXc&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2c16be elementor-widget elementor-widget-text-editor\" data-id=\"d2c16be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><em>Dieses Video kann aufgrund Ihrer Cookie-Einstellungen nicht geladen werden. Passen Sie Ihre Cookie-Einstellungen an oder <a href=\"https:\/\/www.youtube.com\/watch?v=Uc7NNnafdIw\" target=\"_blank\" rel=\"noopener\" data-wplink-edit=\"true\">direkt auf YouTube ansehen<\/a>.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7a5661 elementor-widget elementor-widget-heading\" data-id=\"c7a5661\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Die Rolle der Automatisierung - und XOAP<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8afb5a3 elementor-widget elementor-widget-text-editor\" data-id=\"8afb5a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Obwohl die Automatisierung eine entscheidende Rolle spielt, betont Norbert, dass <strong>es ersetzt die manuelle Pr\u00fcfung nicht vollst\u00e4ndig<\/strong>. Stattdessen wird es Teil eines hybriden Ansatzes, der granulare Daten auf Systemebene liefert, die die Berichterstattung \u00fcber die Einhaltung von Vorschriften unterst\u00fctzen.<\/p><p>Tools wie <a href=\"https:\/\/dev.xoap.io\/de\/\" target=\"_blank\" rel=\"noopener\">XOAP<\/a> sind von zentraler Bedeutung f\u00fcr diese Strategie. Norbert beschreibt XOAP als eine <strong>modulare, flexible Plattform<\/strong> das sich an die einzigartigen Bed\u00fcrfnisse jedes Projekts anpasst. Clourity sieht es als eine L\u00f6sung f\u00fcr:<\/p><p>- Definieren und durchsetzen <strong>Konfigurationsgrundlagen<\/strong><br \/>- Verwaltung der Infrastruktur \u00fcber verschiedene Plattformen hinweg (vor Ort, Cloud, Hypervisoren)<br \/>- Automatisieren Sie Rollouts und Patches von Anwendungen<br \/>- Schnelle Reaktion auf Compliance-Probleme, die von SOC-Teams gemeldet werden<\/p><p>Die Modularit\u00e4t von XOAP erm\u00f6glicht es den Benutzern, sich nur auf die Komponenten zu konzentrieren, die sie ben\u00f6tigen, ohne einen Einheitsansatz zu erzwingen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95d71d5 elementor-widget elementor-widget-heading\" data-id=\"95d71d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Die Bedeutung der Planung<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-409b633 elementor-widget elementor-widget-text-editor\" data-id=\"409b633\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Norberts wichtigster Tipp f\u00fcr Unternehmen, die sich auf den Weg zur Einhaltung von Vorschriften machen: <strong>\"Planen Sie, bevor Sie etwas tun.\"<\/strong><\/p><p>Er beobachtet, dass sich viele Teams ohne angemessene Struktur in Cloud-Projekte oder Sicherheitsinitiativen st\u00fcrzen, was zu unorganisierten Systemen f\u00fchrt, die \u00fcberarbeitet werden m\u00fcssen. Anfangen mit <strong>klare Grundlinien und Automatisierung<\/strong> hilft den Teams, kostspielige Fehler zu vermeiden.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7f329d elementor-widget elementor-widget-heading\" data-id=\"a7f329d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Was im Jahr 2025 ansteht<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0d0025 elementor-widget elementor-widget-text-editor\" data-id=\"c0d0025\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Mit Blick auf die zweite H\u00e4lfte des Jahres 2025 erwartet Norbert einen Anstieg der <strong>KI-gesteuerte Projekte<\/strong>insbesondere in den Bereichen Sicherheit und Gesch\u00e4ftsbetrieb. Seiner Meinung nach wird dies die <strong>Wolken\u00fcberg\u00e4nge<\/strong>da Unternehmen eine skalierbare Infrastruktur ben\u00f6tigen, um KI-Dienste vollst\u00e4ndig nutzen zu k\u00f6nnen.<\/p><p>Mit der zunehmenden Verbreitung der Cloud wird auch die Nachfrage nach <strong>Desktop-Virtualisierung, Plattformdienste und standardisierte Automatisierungsframeworks<\/strong> wie XOAP.<\/p><p><a href=\"https:\/\/youtu.be\/JLoOO-khJXc\" target=\"_blank\" rel=\"noopener\"><strong>Die ganze Episode ansehen<\/strong><\/a> von <em>Gespr\u00e4che \u00fcber Automatisierung<\/em> um das vollst\u00e4ndige Gespr\u00e4ch mit Norbert Ponak zu h\u00f6ren. F\u00fcr weitere Einblicke in Compliance, Automatisierung und hybride Cloud-Strategien, abonnieren Sie den Podcast und folgen Sie XOAP f\u00fcr zuk\u00fcnftige Updates.<\/p><p>Der Podcast ist auch verf\u00fcgbar auf <a href=\"https:\/\/open.spotify.com\/show\/34ajDoQAmEaMf3yJohx6tM\" target=\"_blank\" rel=\"noopener\">Spotify<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f53cd66 e-con-full e-flex e-con e-child\" data-id=\"f53cd66\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t<div class=\"elementor-element elementor-element-a401343 e-con-full e-flex e-con e-child\" data-id=\"a401343\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a5be23e elementor-widget elementor-widget-text-editor\" data-id=\"a5be23e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: right;\">Verf\u00fcgbares Bild von slidesgo auf<a href=\"https:\/\/www.freepik.com\/\" target=\"_blank\" rel=\"noopener\"> Freepik<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>In Episode 02 erfahren Sie, wie Unternehmen die Herausforderungen der Compliance und Sicherheit mit flexiblen, automatisierten Strategien bew\u00e4ltigen.<\/p>","protected":false},"author":9,"featured_media":22511,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[40],"tags":[187,189,33],"class_list":["post-22507","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-culture","tag-automation-talks","tag-podcast","tag-xoap"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security and compliance: Insights from our podcast episode 02 | XOAP<\/title>\n<meta name=\"description\" content=\"In Episode 02, we explore how organizations tackle compliance and security challenges using flexible, automation-driven strategies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dev.xoap.io\/de\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security and compliance: Insights from our podcast episode 02 | Security and compliance: Insights from our podcast episode 02\" \/>\n<meta property=\"og:description\" content=\"In Episode 02, we explore how organizations tackle compliance and security challenges using flexible, automation-driven strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev.xoap.io\/de\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/\" \/>\n<meta property=\"og:site_name\" content=\"XOAP\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XOAP.io\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-12T12:27:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-12T12:27:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dev.xoap.io\/wp-content\/uploads\/2025\/05\/General-With-image-17.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Stella\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Security and compliance: Insights from our podcast episode 02 | Security and compliance: Insights from our podcast episode 02\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/dev.xoap.io\/wp-content\/uploads\/2025\/05\/General-With-image-17.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@xoap_io\" \/>\n<meta name=\"twitter:site\" content=\"@xoap_io\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/\"},\"author\":{\"name\":\"Stella\",\"@id\":\"https:\/\/dev.xoap.io\/#\/schema\/person\/637e41ef061727bfd6dd9f77c4357c0b\"},\"headline\":\"Security and compliance: Insights from our podcast episode 02\",\"datePublished\":\"2025-05-12T12:27:06+00:00\",\"dateModified\":\"2025-05-12T12:27:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/\"},\"wordCount\":507,\"publisher\":{\"@id\":\"https:\/\/dev.xoap.io\/#organization\"},\"image\":{\"@id\":\"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dev.xoap.io\/wp-content\/uploads\/2025\/05\/General-With-image-17.webp\",\"keywords\":[\"automation talks\",\"podcast\",\"xoap\"],\"articleSection\":[\"Company &amp; culture\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/\",\"url\":\"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/\",\"name\":\"Security and compliance: Insights from our podcast episode 02 | XOAP\",\"isPartOf\":{\"@id\":\"https:\/\/dev.xoap.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dev.xoap.io\/wp-content\/uploads\/2025\/05\/General-With-image-17.webp\",\"datePublished\":\"2025-05-12T12:27:06+00:00\",\"dateModified\":\"2025-05-12T12:27:32+00:00\",\"description\":\"In Episode 02, we explore how organizations tackle compliance and security challenges using flexible, automation-driven strategies.\",\"breadcrumb\":{\"@id\":\"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/#primaryimage\",\"url\":\"https:\/\/dev.xoap.io\/wp-content\/uploads\/2025\/05\/General-With-image-17.webp\",\"contentUrl\":\"https:\/\/dev.xoap.io\/wp-content\/uploads\/2025\/05\/General-With-image-17.webp\",\"width\":1024,\"height\":600,\"caption\":\"Security and compliance automation | XOAP podcast episode 02 | Automation Talks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dev.xoap.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security and compliance: Insights from our podcast episode 02\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dev.xoap.io\/#website\",\"url\":\"https:\/\/dev.xoap.io\/\",\"name\":\"XOAP\",\"description\":\"Platform for IT infrastructure and workplace automation\",\"publisher\":{\"@id\":\"https:\/\/dev.xoap.io\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dev.xoap.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dev.xoap.io\/#organization\",\"name\":\"XOAP\",\"url\":\"https:\/\/dev.xoap.io\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/dev.xoap.io\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dev.xoap.io\/wp-content\/uploads\/2023\/11\/XOAP-no-lettering-transparent_no-boarder.svg\",\"contentUrl\":\"https:\/\/dev.xoap.io\/wp-content\/uploads\/2023\/11\/XOAP-no-lettering-transparent_no-boarder.svg\",\"width\":250,\"height\":90,\"caption\":\"XOAP\"},\"image\":{\"@id\":\"https:\/\/dev.xoap.io\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/XOAP.io\",\"https:\/\/x.com\/xoap_io\",\"https:\/\/www.linkedin.com\/company\/xoap_io\",\"https:\/\/www.youtube.com\/@xoap_io\",\"https:\/\/github.com\/xoap-io\",\"https:\/\/www.instagram.com\/xoap_io\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dev.xoap.io\/#\/schema\/person\/637e41ef061727bfd6dd9f77c4357c0b\",\"name\":\"Stella\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/dev.xoap.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6b5b41d99b4f061246012c8856a3b58d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6b5b41d99b4f061246012c8856a3b58d?s=96&d=mm&r=g\",\"caption\":\"Stella\"},\"url\":\"https:\/\/dev.xoap.io\/de\/author\/stella\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security and compliance: Insights from our podcast episode 02 | XOAP","description":"In Episode 02 erfahren Sie, wie Unternehmen die Herausforderungen der Compliance und Sicherheit mit flexiblen, automatisierten Strategien bew\u00e4ltigen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dev.xoap.io\/de\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/","og_locale":"de_DE","og_type":"article","og_title":"Security and compliance: Insights from our podcast episode 02 | Security and compliance: Insights from our podcast episode 02","og_description":"In Episode 02, we explore how organizations tackle compliance and security challenges using flexible, automation-driven strategies.","og_url":"https:\/\/dev.xoap.io\/de\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/","og_site_name":"XOAP","article_publisher":"https:\/\/www.facebook.com\/XOAP.io","article_published_time":"2025-05-12T12:27:06+00:00","article_modified_time":"2025-05-12T12:27:32+00:00","og_image":[{"width":1024,"height":600,"url":"https:\/\/dev.xoap.io\/wp-content\/uploads\/2025\/05\/General-With-image-17.webp","type":"image\/webp"}],"author":"Stella","twitter_card":"summary_large_image","twitter_title":"Security and compliance: Insights from our podcast episode 02 | Security and compliance: Insights from our podcast episode 02","twitter_image":"https:\/\/dev.xoap.io\/wp-content\/uploads\/2025\/05\/General-With-image-17.webp","twitter_creator":"@xoap_io","twitter_site":"@xoap_io","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/#article","isPartOf":{"@id":"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/"},"author":{"name":"Stella","@id":"https:\/\/dev.xoap.io\/#\/schema\/person\/637e41ef061727bfd6dd9f77c4357c0b"},"headline":"Security and compliance: Insights from our podcast episode 02","datePublished":"2025-05-12T12:27:06+00:00","dateModified":"2025-05-12T12:27:32+00:00","mainEntityOfPage":{"@id":"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/"},"wordCount":507,"publisher":{"@id":"https:\/\/dev.xoap.io\/#organization"},"image":{"@id":"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/#primaryimage"},"thumbnailUrl":"https:\/\/dev.xoap.io\/wp-content\/uploads\/2025\/05\/General-With-image-17.webp","keywords":["automation talks","podcast","xoap"],"articleSection":["Company &amp; culture"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/","url":"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/","name":"Security and compliance: Insights from our podcast episode 02 | XOAP","isPartOf":{"@id":"https:\/\/dev.xoap.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/#primaryimage"},"image":{"@id":"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/#primaryimage"},"thumbnailUrl":"https:\/\/dev.xoap.io\/wp-content\/uploads\/2025\/05\/General-With-image-17.webp","datePublished":"2025-05-12T12:27:06+00:00","dateModified":"2025-05-12T12:27:32+00:00","description":"In Episode 02 erfahren Sie, wie Unternehmen die Herausforderungen der Compliance und Sicherheit mit flexiblen, automatisierten Strategien bew\u00e4ltigen.","breadcrumb":{"@id":"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/#primaryimage","url":"https:\/\/dev.xoap.io\/wp-content\/uploads\/2025\/05\/General-With-image-17.webp","contentUrl":"https:\/\/dev.xoap.io\/wp-content\/uploads\/2025\/05\/General-With-image-17.webp","width":1024,"height":600,"caption":"Security and compliance automation | XOAP podcast episode 02 | Automation Talks"},{"@type":"BreadcrumbList","@id":"https:\/\/dev.xoap.io\/security-compliance-automation-insights-from-the-second-episode-of-our-podcast\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.xoap.io\/"},{"@type":"ListItem","position":2,"name":"Security and compliance: Insights from our podcast episode 02"}]},{"@type":"WebSite","@id":"https:\/\/dev.xoap.io\/#website","url":"https:\/\/dev.xoap.io\/","name":"XOAP","description":"Plattform f\u00fcr IT-Infrastruktur und Arbeitsplatzautomatisierung","publisher":{"@id":"https:\/\/dev.xoap.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev.xoap.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/dev.xoap.io\/#organization","name":"XOAP","url":"https:\/\/dev.xoap.io\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/dev.xoap.io\/#\/schema\/logo\/image\/","url":"https:\/\/dev.xoap.io\/wp-content\/uploads\/2023\/11\/XOAP-no-lettering-transparent_no-boarder.svg","contentUrl":"https:\/\/dev.xoap.io\/wp-content\/uploads\/2023\/11\/XOAP-no-lettering-transparent_no-boarder.svg","width":250,"height":90,"caption":"XOAP"},"image":{"@id":"https:\/\/dev.xoap.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XOAP.io","https:\/\/x.com\/xoap_io","https:\/\/www.linkedin.com\/company\/xoap_io","https:\/\/www.youtube.com\/@xoap_io","https:\/\/github.com\/xoap-io","https:\/\/www.instagram.com\/xoap_io"]},{"@type":"Person","@id":"https:\/\/dev.xoap.io\/#\/schema\/person\/637e41ef061727bfd6dd9f77c4357c0b","name":"Stella","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/dev.xoap.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6b5b41d99b4f061246012c8856a3b58d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6b5b41d99b4f061246012c8856a3b58d?s=96&d=mm&r=g","caption":"Stella"},"url":"https:\/\/dev.xoap.io\/de\/author\/stella\/"}]}},"_links":{"self":[{"href":"https:\/\/dev.xoap.io\/de\/wp-json\/wp\/v2\/posts\/22507","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.xoap.io\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dev.xoap.io\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dev.xoap.io\/de\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.xoap.io\/de\/wp-json\/wp\/v2\/comments?post=22507"}],"version-history":[{"count":11,"href":"https:\/\/dev.xoap.io\/de\/wp-json\/wp\/v2\/posts\/22507\/revisions"}],"predecessor-version":[{"id":22545,"href":"https:\/\/dev.xoap.io\/de\/wp-json\/wp\/v2\/posts\/22507\/revisions\/22545"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dev.xoap.io\/de\/wp-json\/wp\/v2\/media\/22511"}],"wp:attachment":[{"href":"https:\/\/dev.xoap.io\/de\/wp-json\/wp\/v2\/media?parent=22507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dev.xoap.io\/de\/wp-json\/wp\/v2\/categories?post=22507"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dev.xoap.io\/de\/wp-json\/wp\/v2\/tags?post=22507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}