{"id":60159,"date":"2018-03-07T00:49:14","date_gmt":"2018-03-07T00:49:14","guid":{"rendered":"https:\/\/arcticwolf.com\/informationsecurity\/"},"modified":"2023-04-25T14:40:50","modified_gmt":"2023-04-25T19:40:50","slug":"informationsecurity","status":"publish","type":"page","link":"https:\/\/arcticwolf.com\/de\/informationsecurity\/","title":{"rendered":"Informationssicherheit"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"60159\" class=\"elementor elementor-60159\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-402538e5 elementor-section-stretched elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"402538e5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-20e77ce2 elementor-hidden-phone\" data-id=\"20e77ce2\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-22d16ab0 elementor-align-right elementor-tablet-align-right elementor-mobile-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"22d16ab0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:500}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-size-sm\" role=\"button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Terms<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-34814a61\" data-id=\"34814a61\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-534f1bd2 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"534f1bd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\"><h2>Information Security\n<\/h2><\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c2499f7 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"6c2499f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\"><h5>\n<\/h5><\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-53537a9e terms elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53537a9e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2eddacc4\" data-id=\"2eddacc4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a59d821 elementor-widget elementor-widget-global elementor-global-16563 elementor-widget-html\" data-id=\"a59d821\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\nb {font-weight: bold;}\nem {font-decoration: italic;}\nu {text-decoration: underline;}\n.entry-content p {margin-bottom: 13px;}\n.entry-content table {\n\tborder: 1px solid black;\n\tborder-collapse: collapse;\n\tborder-spacing: unset;\n}\n.entry-content th {\n\tfont-weight: bold;\n}\n.entry-content th, .entry-content td {\n\tborder: 1px solid black;\n\tpadding: 10px;\n}\n<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15160fa5 elementor-widget elementor-widget-text-editor\" data-id=\"15160fa5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div style=\"color: #000; font-weight: 400;\">\n<h4 style=\"font-size: 25px; line-height: 32px; font-weight: 600;\">Our Service<\/h4>\n<p>The Arctic Wolf SOC-as-a-service optimizes the integration of machine and human intelligence. The service combines people, process and technology to deliver an elite-level, enterprise-class SOC-as-a-service in minutes. Each customer is assigned a security team, who becomes intimately familiar with the company&#8217;s business and operational requirements. The security team analyzes logs, weeds through alerts to eliminate false positives, and conducts necessary security forensics to definitively identify any breach or attack. The Arctic Wolf cloud, with its proprietary SIEM, expedites the process using its advanced machine learning capabilities and automated user behavioral analytics, and integrates data from external threat feeds to proactively identify suspicious behavior.<\/p>\n<\/div>\n<div style=\"color: #000; font-weight: 400;\">\n<h4 style=\"font-size: 25px; line-height: 32px; font-weight: 600;\">We Obsess Over Data Protection<\/h4>\n<p>Protection of customer information is a crucial element of our business model. It is integrated into our culture in the form of policy and procedure formalizations and supporting controls. To enable our customers to comply with regulatory and standards requirements, we architect production environment and support systems using a secure cloud-computing model. To ensure our secure architecture operates according to performance and security specifications, we have implemented an Information Security and Compliance Program using ISO 27001 and Trust Services Principles as the foundation for our governance, risk and controls program.<\/p>\n<\/div>\n<div style=\"color: #000; font-weight: 400;\">\n<h4 style=\"font-size: 25px; line-height: 32px; font-weight: 600;\">How We Protect Your Data<\/h4>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-28864fc terms elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"28864fc\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-69b35a3\" data-id=\"69b35a3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-37e6fa9 elementor-widget elementor-widget-text-editor\" data-id=\"37e6fa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"font-size: 20px; line-height: 27px; font-weight: 600; color: #000000;\">Assignment of Authority and Responsibility<\/h4>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">A governance structure for information security within Arctic Wolf is established and maintained. Key responsibility of the information security governance structure is to identify and manage risks (threats and vulnerabilities) to the organization, as administered and maintained by the Information Security Officer in partnership with the subject matter experts from various departments. Team members are assigned to implement and maintain the information security program and made aware of their duties and responsibilities. These employees have the appropriate skills and qualifications necessary to manage the information security program.<\/p>\n\n<h4 style=\"font-size: 20px; line-height: 27px; font-weight: 600; color: #000000;\"><strong>HR Policies and Practices<\/strong><\/h4>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">Arctic Wolf\u2019s worker (employees and contractors) onboarding program provides workers with education and resources to make informed business decisions and act on their decisions with integrity. Training and awareness is provided to full-time workers and third parties on a periodic basis to educate them on applicable policies, standards and information security practices.<\/p>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">Arctic Wolf workers are accountable for understanding and adhering to the guidance contained in the Acceptable Use and Security Awareness policies.<\/p>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">For US and Canadian citizens, background checks are required before full-time workers are granted access to production systems and information. Background checks at Arctic Wolf are performed at the time of joining as a condition of employment.<\/p>\n\n<h4 style=\"font-size: 20px; line-height: 27px; font-weight: 600; color: #000000;\">Policies<\/h4>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">All Arctic Wolf staff and contingent staff are accountable for understanding and adhering to the guidance contained in the Arctic Wolf set of Information Security Policies. Policies address areas including asset classification, risk assessment, access control, change control and acceptance, incident response, exceptions, training, and where to go for additional information. Policies are available on the company intranet.<\/p>\n\n<h4 style=\"font-size: 20px; line-height: 27px; font-weight: 600; color: #000000;\"><strong>Access and Identity Access Management<\/strong><\/h4>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">Arctic Wolf utilizes primarily multi-factor identity access management tools used by IT and production support service teams to manage their respective infrastructure and services.<\/p>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">Okta is used for identity management for the majority of the software-as-a-service tools that support the Arctic Wolf platform. Individuals are assigned application access using the tool based on their roles and responsibilities.<\/p>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">Access to the production is controlled via secure VPN tunnel, and an SSH to the bastion hosts is required to access nodes in the production environment. Further access to the production nodes are handled via AWS\u2019s identity access management (IAM) tool. Within the tool, unique accounts are created for individuals, and shared \/ service accounts are created for recurring business purposes. Access within IAM is restricted using permissions or policies that are either internally managed or customized for the specific account.<\/p>\n\n<h4 style=\"font-size: 20px; line-height: 27px; font-weight: 600; color: #000000;\"><strong>R&amp;D Access to Production<\/strong><\/h4>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">R&amp;D has access to the production environment as part of the continuous deployment practice. Access is controlled via SSH login to the bastion host, which is monitored by an internal sensor. Login events are visible to the assigned internal CSE for detection of anomalous activities.<\/p>\n\n<h4 style=\"font-size: 20px; line-height: 27px; font-weight: 600; color: #000000;\"><strong> Authentication<\/strong><\/h4>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">Employees can log into Arctic Wolf internal systems using Okta and all cloud-based application are integrated with Okta. Password requirements are managed through both the LDAP and Okta tool.<\/p>\n\n<h4 style=\"font-size: 20px; line-height: 27px; font-weight: 600; color: #000000;\"><strong>Periodic User Access Review<\/strong><\/h4>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">A manual user access review is performed by technology management on a periodic basis for access to the production environment. This review includes the assessment of custom AWS IAM policies and permissions. Periodic review of user access to Okta and in-scope applications is performed by the internal account management team.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3250a8e\" data-id=\"3250a8e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-99e4222 elementor-widget elementor-widget-text-editor\" data-id=\"99e4222\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"font-size: 20px; line-height: 27px; font-weight: 600; color: #000000;\">Commitment to Competence<\/h4>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">Arctic Wolf Networks (Arctic Wolf) management defines competence as the knowledge and skills necessary to accomplish tasks that define the individual\u2019s job. Commitment to competence starts at the hiring process where potential candidate qualifications are assessed by management and subject matter experts to determine proper job fit, requiring individual training requirements to maintain knowledge relevant to the dynamics of the business, a culture of empowerment and collaboration and lastly, coaching\/mentoring practices to ensure achievement of performance goals.<\/p>\n\n<h4 style=\"font-size: 20px; line-height: 27px; font-weight: 600; color: #000000;\">Risk Assessment<\/h4>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">Arctic Wolf follows an established approach to risk management and conducts an annual corporate-wide risk assessment, led by the ISO. The risk assessment is established to monitor, manage and mitigate strategic, operational, financial, legal and compliance risks, including those related to security and availability of the platform. The risk assessment process identifies and prioritizes risks based on impact, likelihood and vulnerability.<\/p>\n\n<h4 style=\"font-size: 20px; line-height: 27px; font-weight: 600; color: #000000;\">Security and Incident Communication<\/h4>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">Arctic Wolf uses its own product service\u2014as such, several internal sensors are implemented in the production and internal environments\u2014coupled with an established incident response procedure for comprehensive monitoring, analysis and reporting. Incidents are reported to IT where an incident ticket is opened. The ticket escalates to the Computer Security Incident Response Team so that events and incidents can be resolved in a timely manner.<\/p>\n\n<h4 style=\"font-size: 20px; line-height: 27px; font-weight: 600; color: #000000;\"><b>Shared and Service Accounts\n<\/b><\/h4>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">Shared and service accounts are managed using an enterprise security password generator service, and access to the service is restricted to authorized personnel. Passwords and other certificates are rotated on a periodic basis.<\/p>\n\n<h4 style=\"font-size: 20px; line-height: 27px; font-weight: 600; color: #000000;\"><b>New User or Modification of User Access\n<\/b><\/h4>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">The process to request and approve new access is initiated by HR (or any worker) via a Jira ticket, which is routed to the internal accounts management team. Access to the production environment is limited to authorized personnel only.<\/p>\n\n<h4 style=\"font-size: 20px; line-height: 27px; font-weight: 600; color: #000000;\"><b>Termination Access\u00a0Removal\n<\/b><\/h4>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">When individuals leave the company, Arctic Wolf HR initiates a Jira ticket to the internal account management team where the account is disabled without undue delay. The team follows a checklist in order to disable all accounts and access within the environment. Terminated accounts are deleted from the system after 45 days.<\/p>\n\n<h4 style=\"font-size: 20px; line-height: 27px; font-weight: 600; color: #000000;\"><b>Endpoint Protection<\/b><\/h4>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">Arctic Wolf implements appropriate endpoint protection and technology management to administer security policies and configurations.<\/p>\n\n<ul>\n \t<li>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\"><b>Data transmission (Encryption)<\/b><\/p>\nBased on the customer\u2019s data connection request, the encrypted connection is configured through the Arctic Wolf network between the customer and the desired Arctic Wolf application and support platform. Arctic Wolf uses Secure Sockets Layer (SSL) security protocols for transmitting data over unsecured networks.\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">Customer content is stored and processed on AWS databases, which are segregated via logical indices.<\/p>\n<\/li>\n \t<li>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\"><b>Data at rest (Encryption)<\/b><\/p>\nArctic Wolf has a data encryption policy that protects customer data at rest using AWS S3 encryption.<\/li>\n \t<li>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\"><b>Network configuration<\/b><\/p>\nArctic Wolf\u2019s production network is entirely run in Amazon Web Services. VPCs with private and public subnets are used, with the vast majority of EC2 instances running in the private subnets. NACLs are used where applicable, and restrictive Security Groups are applied to each EC2 instance and AWS resource (where applicable).\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\">Sensors running in the customer\u2019s network connect to the Arctic Wolf production network using VPN tunnels. Further restrictions are placed on the VPN servers to ensure the sensors can only contact the required services in the Arctic Wolf production network, using a combination of filter rules, NAT and non-routable networks.<\/p>\n<\/li>\n \t<li>\n<p style=\"color: #000; font-weight: 400; font-size: 14px; line-height: 22px;\"><b>Software development lifecycle (SDLC Process)<\/b><\/p>\nArctic Wolf follows an agile and continuous deployment model for software development. Sprints are performed on a regular basis, and project design documents that establish requirements for product releases are documented and retained.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-7739937 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7739937\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f927af2\" data-id=\"f927af2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a3709e5 elementor-widget elementor-widget-text-editor\" data-id=\"a3709e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div style=\"color: #000; font-weight: 400;\">\n<h4 style=\"font-size: 25px; line-height: 32px; font-weight: 600;\">Regulatory and Compliance Standards<\/h4><br \/>\nArctic Wolf Is SOC 2 Type II Certified<br \/><br \/>\n\n<\/div>\n\n<img decoding=\"async\" class=\"wp-image-12004 alignleft lazyload\" data-src=\"https:\/\/arcticwolf.com\/wp-content\/uploads\/2018\/03\/21972-312_SOC_NonCPA-300x298.png\" alt=\"\" width=\"119\" height=\"117\" data-srcset=\"https:\/\/arcticwolf.com\/wp-content\/uploads\/2018\/03\/21972-312_SOC_NonCPA-300x298.png 300w, https:\/\/arcticwolf.com\/wp-content\/uploads\/2018\/03\/21972-312_SOC_NonCPA.png 359w\" data-sizes=\"(max-width: 119px) 100vw, 119px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 119px; --smush-placeholder-aspect-ratio: 119\/117;\" \/> <img decoding=\"async\" class=\"alignnone size-medium wp-image-13627 lazyload\" data-src=\"https:\/\/arcticwolf.com\/wp-content\/uploads\/2019\/04\/Arctic_Cyberguard.png\" alt=\"\" width=\"300\" height=\"149\" data-srcset=\"https:\/\/arcticwolf.com\/wp-content\/uploads\/2019\/04\/Arctic_Cyberguard.png 600w, https:\/\/arcticwolf.com\/wp-content\/uploads\/2019\/04\/Arctic_Cyberguard-300x149.png 300w, https:\/\/arcticwolf.com\/wp-content\/uploads\/2019\/04\/Arctic_Cyberguard-768x384.png 768w\" data-sizes=\"(max-width: 300px) 100vw, 300px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 300px; --smush-placeholder-aspect-ratio: 300\/149;\" \/>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Terms Information Security Our Service The Arctic Wolf SOC-as-a-service optimizes the integration of machine and human intelligence. The service combines people, process and technology to deliver an elite-level, enterprise-class SOC-as-a-service in minutes. Each customer is assigned a security team, who becomes intimately familiar with the company&#8217;s business and operational requirements. The security team analyzes logs, <a href=\"https:\/\/arcticwolf.com\/de\/informationsecurity\/\" class=\"more-link\">\u2026\u00a0<span class=\"screen-reader-text\">  Informationssicherheit<\/span><\/a><\/p>\n","protected":false},"author":64,"featured_media":32227,"parent":0,"menu_order":41,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-60159","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Informationssicherheit - Arctic Wolf<\/title>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Informationssicherheit - Arctic Wolf\" \/>\n<meta property=\"og:description\" content=\"Terms Information Security Our Service The Arctic Wolf SOC-as-a-service optimizes the integration of machine and human intelligence. The service combines people, process and technology to deliver an elite-level, enterprise-class SOC-as-a-service in minutes. Each customer is assigned a security team, who becomes intimately familiar with the company&#8217;s business and operational requirements. The security team analyzes logs, \u2026\u00a0 Informationssicherheit\" \/>\n<meta property=\"og:url\" content=\"https:\/\/arcticwolf.com\/de\/informationsecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Arctic Wolf\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ArcticWolfNetworks\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-25T19:40:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/arcticwolf.com\/wp-content\/uploads\/2024\/12\/aw-og-generic.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@AWNetworks\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/de\\\/informationsecurity\\\/\",\"url\":\"https:\\\/\\\/arcticwolf.com\\\/de\\\/informationsecurity\\\/\",\"name\":\"Informationssicherheit - Arctic Wolf\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/de\\\/informationsecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/de\\\/informationsecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/arcticwolf.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/aw-og-generic.png\",\"datePublished\":\"2018-03-07T00:49:14+00:00\",\"dateModified\":\"2023-04-25T19:40:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/de\\\/informationsecurity\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/arcticwolf.com\\\/de\\\/informationsecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/de\\\/informationsecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/arcticwolf.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/aw-og-generic.png\",\"contentUrl\":\"https:\\\/\\\/arcticwolf.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/aw-og-generic.png\",\"width\":2560,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/de\\\/informationsecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/arcticwolf.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Informationssicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/arcticwolf.com\\\/de\\\/\",\"name\":\"Arctic Wolf\",\"description\":\"The Leaders in Security Operations\",\"publisher\":{\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/arcticwolf.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/de\\\/#organization\",\"name\":\"Arctic Wolf Networks\",\"alternateName\":\"Arctic Wolf\",\"url\":\"https:\\\/\\\/arcticwolf.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/arcticwolf.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/AW-Logo-Main-AuroraFY25.png\",\"contentUrl\":\"https:\\\/\\\/arcticwolf.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/AW-Logo-Main-AuroraFY25.png\",\"width\":655,\"height\":232,\"caption\":\"Arctic Wolf Networks\"},\"image\":{\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ArcticWolfNetworks\",\"https:\\\/\\\/x.com\\\/AWNetworks\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/arcticwolf\",\"https:\\\/\\\/www.youtube.com\\\/ArcticWolfNetworks\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Informationssicherheit - Arctic Wolf","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"de_DE","og_type":"article","og_title":"Informationssicherheit - Arctic Wolf","og_description":"Terms Information Security Our Service The Arctic Wolf SOC-as-a-service optimizes the integration of machine and human intelligence. The service combines people, process and technology to deliver an elite-level, enterprise-class SOC-as-a-service in minutes. Each customer is assigned a security team, who becomes intimately familiar with the company&#8217;s business and operational requirements. The security team analyzes logs, \u2026\u00a0 Informationssicherheit","og_url":"https:\/\/arcticwolf.com\/de\/informationsecurity\/","og_site_name":"Arctic Wolf","article_publisher":"https:\/\/www.facebook.com\/ArcticWolfNetworks","article_modified_time":"2023-04-25T19:40:50+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/arcticwolf.com\/wp-content\/uploads\/2024\/12\/aw-og-generic.png","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@AWNetworks","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/arcticwolf.com\/de\/informationsecurity\/","url":"https:\/\/arcticwolf.com\/de\/informationsecurity\/","name":"Informationssicherheit - Arctic Wolf","isPartOf":{"@id":"https:\/\/arcticwolf.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/arcticwolf.com\/de\/informationsecurity\/#primaryimage"},"image":{"@id":"https:\/\/arcticwolf.com\/de\/informationsecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/arcticwolf.com\/wp-content\/uploads\/2024\/12\/aw-og-generic.png","datePublished":"2018-03-07T00:49:14+00:00","dateModified":"2023-04-25T19:40:50+00:00","breadcrumb":{"@id":"https:\/\/arcticwolf.com\/de\/informationsecurity\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/arcticwolf.com\/de\/informationsecurity\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/arcticwolf.com\/de\/informationsecurity\/#primaryimage","url":"https:\/\/arcticwolf.com\/wp-content\/uploads\/2024\/12\/aw-og-generic.png","contentUrl":"https:\/\/arcticwolf.com\/wp-content\/uploads\/2024\/12\/aw-og-generic.png","width":2560,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/arcticwolf.com\/de\/informationsecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/arcticwolf.com\/de\/"},{"@type":"ListItem","position":2,"name":"Informationssicherheit"}]},{"@type":"WebSite","@id":"https:\/\/arcticwolf.com\/de\/#website","url":"https:\/\/arcticwolf.com\/de\/","name":"Arctic Wolf","description":"The Leaders in Security Operations","publisher":{"@id":"https:\/\/arcticwolf.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/arcticwolf.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/arcticwolf.com\/de\/#organization","name":"Arctic Wolf Networks","alternateName":"Arctic Wolf","url":"https:\/\/arcticwolf.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/arcticwolf.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/arcticwolf.com\/wp-content\/uploads\/2025\/01\/AW-Logo-Main-AuroraFY25.png","contentUrl":"https:\/\/arcticwolf.com\/wp-content\/uploads\/2025\/01\/AW-Logo-Main-AuroraFY25.png","width":655,"height":232,"caption":"Arctic Wolf Networks"},"image":{"@id":"https:\/\/arcticwolf.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ArcticWolfNetworks","https:\/\/x.com\/AWNetworks","https:\/\/www.linkedin.com\/company\/arcticwolf","https:\/\/www.youtube.com\/ArcticWolfNetworks"]}]}},"_links":{"self":[{"href":"https:\/\/arcticwolf.com\/de\/wp-json\/wp\/v2\/pages\/60159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/arcticwolf.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/arcticwolf.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/arcticwolf.com\/de\/wp-json\/wp\/v2\/users\/64"}],"replies":[{"embeddable":true,"href":"https:\/\/arcticwolf.com\/de\/wp-json\/wp\/v2\/comments?post=60159"}],"version-history":[{"count":0,"href":"https:\/\/arcticwolf.com\/de\/wp-json\/wp\/v2\/pages\/60159\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/arcticwolf.com\/de\/wp-json\/wp\/v2\/media\/32227"}],"wp:attachment":[{"href":"https:\/\/arcticwolf.com\/de\/wp-json\/wp\/v2\/media?parent=60159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}