{"id":2973,"date":"2020-06-29T10:45:39","date_gmt":"2020-06-29T10:45:39","guid":{"rendered":"https:\/\/www.q-sit.de\/?page_id=2973"},"modified":"2020-12-07T05:46:00","modified_gmt":"2020-12-07T05:46:00","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/www.q-sit.de\/en\/services\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: rgba(237,238,239,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 0px;margin-top: 0px;border-width: 0px 0px 0px 0px;border-color:#e7e4e2;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-two-third fusion-column-first\" style=\"width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% ) * 0.66666666666667 ) );margin-right: 4%;margin-top:10px;margin-bottom:60px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><style type=\"text\/css\"><\/style><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"margin-top:0px;margin-bottom:30px;\"><h2 class=\"title-heading-center\" style=\"margin:0;\"><h1 style=\"text-align: left;\"><span style=\"color: #20697c;\"><b><strong>Secure Software. Secure Business.<\/strong><br \/>\n<\/b><\/span><\/h1><\/h2><\/div><div class=\"fusion-text fusion-text-1\"><p style=\"font-size: 21px; text-align: left;\">Secure software is a key prerequisite for the successful digitalization of every company. The security demands of applications and systems are growing daily. The main reasons for this are the increasing complexity and connectivity of business-critical applications, an increase in the quantity, diversity and quality of threats from the internet, and an acceleration in the use of new functionalities as a result of shorter software release cycles (agile software development). Against this backdrop, it is especially important for every company to reliably protect critical data and business processes from attacks via the internet.<\/p>\n<p style=\"font-size: 21px; text-align: left;\">With the help of our cyber security testing services, we examine the security of your applications throughout all phases of the software lifecycle \u2013 from scanning the source code for vulnerabilities to investigating the application in regular operation under real-life conditions to simulation of hacker attacks. With each of our cyber security services, you receive detailed documentation of the vulnerabilities identified and recommendations for successfully resolving them.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_6 1_6 fusion-one-sixth fusion-column-last fusion-no-small-visibility\" style=\"width:16.666666666667%;width:calc(16.666666666667% - ( ( 4% ) * 0.16666666666667 ) );margin-top:10px;margin-bottom:10px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: #ededed;background-position: left top;background-repeat: no-repeat;padding-top:2%;padding-right:0px;padding-bottom:2%;padding-left:0px;margin-bottom: 0px;margin-top: 0px;border-width: 0px 0px 0px 0px;border-color:#e7e4e2;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last position\" style=\"margin-top:50px;margin-bottom:25px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 0px 0px 0px 0px;\"><div class=\"fusion-tabs fusion-tabs-1 clean position vertical-tabs icon-position-left\" id=\"itlast\"><style type=\"text\/css\">#wrapper .fusion-tabs.fusion-tabs-1.clean .nav-tabs li a.tab-link{border-color:rgba(245,245,245,0);}.fusion-tabs.fusion-tabs-1 .nav-tabs li a.tab-link{background-color:#ffffff;}.fusion-tabs.fusion-tabs-1 .nav-tabs li.active a.tab-link,.fusion-tabs.fusion-tabs-1 .nav-tabs li.active a.tab-link:hover,.fusion-tabs.fusion-tabs-1 .nav-tabs li.active a.tab-link:focus{background-color:#e66a27;}.fusion-tabs.fusion-tabs-1 .nav-tabs li a:hover{background-color:#e66a27;border-top-color:#e66a27;}.fusion-tabs.fusion-tabs-1 .tab-pane{background-color:#e66a27;}.fusion-tabs.fusion-tabs-1 .nav,.fusion-tabs.fusion-tabs-1 .nav-tabs,.fusion-tabs.fusion-tabs-1 .tab-content .tab-pane{border-color:rgba(245,245,245,0);}<\/style><div class=\"nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li class=\"active\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-787354ae44c2ab9c1a0\" aria-selected=\"true\" id=\"fusion-tab-staticapplicationsecuritytesting(sast)\" href=\"#tab-787354ae44c2ab9c1a0\"><h4 class=\"fusion-tab-heading\">Static Application Security Testing (SAST)<\/h4><\/a><\/li><li><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-de296447f9e6de84e14\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-dynamicapplicationsecuritytesting(dast)\" href=\"#tab-de296447f9e6de84e14\"><h4 class=\"fusion-tab-heading\">Dynamic Application Security Testing (DAST)<\/h4><\/a><\/li><li><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-b2823d5bdd4c327cdbd\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-penetrationtesting\" href=\"#tab-b2823d5bdd4c327cdbd\"><h4 class=\"fusion-tab-heading\">Penetration Testing<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-content\"><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\"><li class=\"active\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-787354ae44c2ab9c1a0\" aria-selected=\"true\" id=\"mobile-fusion-tab-staticapplicationsecuritytesting(sast)\" href=\"#tab-787354ae44c2ab9c1a0\"><h4 class=\"fusion-tab-heading\">Static Application Security Testing (SAST)<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix in active\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-staticapplicationsecuritytesting(sast)\" id=\"tab-787354ae44c2ab9c1a0\">\n<h2>Static Application Security Testing (SAST)<\/h2>\n<p><span style=\"font-size: 14pt;\">The security of your applications begins with the first line of the source code. Using automated procedures, we localize security vulnerabilities and provide your development teams with the information necessary to resolve them early on in the development process. We minimize the rate of false positives and save on time-consuming error analysis.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Our tests address security aspects that include the following:<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 14pt;\">Authentication &#038; authorization<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">SQL injection<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Insecure deserialization<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Cross-site scripting<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Input and output validation<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: 14pt;\">Be it Java, JavaScript, Python, C++ or PHP \u2013 QSIT covers more than 20 of the programming languages most commonly used for web applications. Following detailed analysis, we provide you with documentation on the type and severity of the security vulnerabilities we uncover as well as recommendations for resolving them. We offer the optional service of advising you on the integration of static application security testing into your software development process (DevSecOps) and will also implement it if required.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Your benefits:<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 14pt;\">Identify security vulnerabilities early on<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Analysis options for 20+ programming languages<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Minimize false positives<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Ready-to-act results reporting<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Advice on the implementation of measures and DevSecOps integration<\/span><\/li>\n<\/ul>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\"><li><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-de296447f9e6de84e14\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-dynamicapplicationsecuritytesting(dast)\" href=\"#tab-de296447f9e6de84e14\"><h4 class=\"fusion-tab-heading\">Dynamic Application Security Testing (DAST)<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-dynamicapplicationsecuritytesting(dast)\" id=\"tab-de296447f9e6de84e14\">\n<h2>Dynamic Application Security Testing (DAST)<\/h2>\n<p><span style=\"font-size: 14pt;\">We use DAST to identify security problems in your web applications during ongoing operations. This also identifies security vulnerabilities resulting from defective configurations in the application environment. Under real-life conditions, we scan your web applications with specialist tools and check compliance with the latest security standards. Our tests enable us to minimize the rate of false positives and spare your development teams time-consuming error analysis. If required, we will also use automatic scheduling to carry out the tests at the times most suitable for your organization. We compile the test results and our recommendations in a detailed report.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Your benefits:<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 14pt;\">Identify security vulnerabilities in ongoing operations<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Minimize of false positives<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Ready-to-act results reporting<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Advice on implementing rectifications<\/span><\/li>\n<\/ul>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\"><li><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-b2823d5bdd4c327cdbd\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-penetrationtesting\" href=\"#tab-b2823d5bdd4c327cdbd\"><h4 class=\"fusion-tab-heading\">Penetration Testing<\/h4><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-penetrationtesting\" id=\"tab-b2823d5bdd4c327cdbd\">\n<h2>Penetration Testing<\/h2>\n<p><span style=\"font-size: 14pt;\">To ensure your entire system landscape is secure from cyber attacks, we offer penetration tests tailored to your specific requirements and your individual system environment. We check the security of the applications and system components in your productive network environment, applying the same methods that hackers would use to attack your systems.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">We work closely in advance with your own security team to optimize the tests for your system environment. For a black-box penetration test, you provide us with the URL for the application to be tested. Using manual and automated processes, we then examine your application in operation for security vulnerabilities. For a white-box penetration test, we need additional information on the mapped business process. We use this to identify vulnerabilities specific to the application. Following a detailed analysis, you receive documentation on the type and severity of the security vulnerabilities uncovered as well as recommendations for resolving them.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Your benefits:<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 14pt;\">Close coordination with your security team<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Targeted test design for your individual system environment<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Ready-to-act results reporting<\/span><\/li>\n<li><span style=\"font-size: 14pt;\">Minimized risk of cyber attack<\/span><\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"background-color: #e66a27;background-position: right center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;margin-bottom: 0px;margin-top: 0px;border-width: 0px 0px 0px 0px;border-color:#e7e4e2;border-style:solid;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"margin-top:10px;margin-bottom:10px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;padding: 7% 0px 6% 0px;\"><div class=\"fusion-text fusion-text-2 fusion-no-small-visibility\"><h2 style=\"text-align: center;\"><span style=\"color: #ffffff; font-size: 36pt;\">We can do even more.<br \/>\n<\/span><\/h2>\n<\/div><div class=\"fusion-text fusion-text-3 fusion-no-small-visibility\" style=\"color:rgba(255,255,255,0.8);\"><p style=\"text-align: center;\"><span style=\"font-size: 24pt; color: #ffffff;\">To provide you with further support in IT quality assurance, we can also assist with load and <u><a style=\"color: #ffffff;\" href=\"https:\/\/www.q-sit.de\/en\/services\/it-load-tests-performance-tests\/\">performance testing<\/a> <\/u>. Plus, our <a style=\"color: #ffffff;\" href=\"https:\/\/www.q-sit.de\/en\/services\/test-management\/\"><u>penetration testing<\/u><\/a> could also be a key to optimizing the performance of your system environment and uncover vulnerabilities before they become problems. And we can also help resolve security vulnerabilities with our <a style=\"color: #ffffff;\" href=\"https:\/\/www.q-sit.de\/en\/services\/cyber-security\/\"><u>cyber security service<\/u><\/a>. Take a look at our portfolio and let us know what we can do for you.<\/span><\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-no-small-visibility fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:20px;margin-bottom:20px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-4 fusion-no-medium-visibility fusion-no-large-visibility\"><h2 style=\"text-align: center;\"><span style=\"color: #ffffff; font-size: 28pt;\">We can do even more.<br \/>\n<\/span><\/h2>\n<\/div><div class=\"fusion-text fusion-text-5 fusion-no-medium-visibility fusion-no-large-visibility\" style=\"color:#ffffff;\"><p style=\"text-align: center;\"><span style=\"font-size: 18px; color: #ffffff;\">To provide you with further support in IT quality assurance, we can also assist with load and <u><a style=\"color: #ffffff;\" href=\"https:\/\/www.q-sit.de\/en\/services\/it-load-tests-performance-tests\/\">performance testing<\/a> <\/u>. Plus, our <a style=\"color: #ffffff;\" href=\"https:\/\/www.q-sit.de\/en\/services\/test-management\/\"><u>penetration testing<\/u><\/a> could also be a key to optimizing the performance of your system environment and uncover vulnerabilities before they become problems. And we can also help resolve security vulnerabilities with our <a style=\"color: #ffffff;\" href=\"https:\/\/www.q-sit.de\/en\/services\/cyber-security\/\"><u>cyber security service<\/u><\/a>. Take a look at our portfolio and let us know what we can do for you.<\/span><\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:20px;margin-bottom:20px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-aligncenter\"><style type=\"text\/css\">.fusion-button.button-1 .fusion-button-text, .fusion-button.button-1 i {color:#ffffff;}.fusion-button.button-1 .fusion-button-icon-divider{border-color:#ffffff;}.fusion-button.button-1:hover .fusion-button-text, .fusion-button.button-1:hover i,.fusion-button.button-1:focus .fusion-button-text, .fusion-button.button-1:focus i,.fusion-button.button-1:active .fusion-button-text, .fusion-button.button-1:active{color:#ffffff;}.fusion-button.button-1:hover .fusion-button-icon-divider, .fusion-button.button-1:hover .fusion-button-icon-divider, .fusion-button.button-1:active .fusion-button-icon-divider{border-color:#ffffff;}.fusion-button.button-1:hover, .fusion-button.button-1:focus, .fusion-button.button-1:active{border-color:#ffffff;border-width:2px;}.fusion-button.button-1 {border-color:#ffffff;border-width:2px;border-radius:0px;}.fusion-button.button-1{background: rgba(221,104,19,0);}.fusion-button.button-1:hover,.button-1:focus,.fusion-button.button-1:active{background: rgba(240,154,62,0);}<\/style><a class=\"fusion-button button-flat fusion-button-default-size button-custom button-1 fusion-button-span-no fusion-button-default-type\" target=\"_self\" href=\"\/en\/services\/\"><span class=\"fusion-button-text\">SERVICE OVERVIEW<\/span><\/a><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-no-medium-visibility fusion-no-large-visibility fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:30px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><style type=\"text\/css\">.fusion-fullwidth.fusion-builder-row-3 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-view-cart):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover, .fusion-fullwidth.fusion-builder-row-3 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-view-cart):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover:before, .fusion-fullwidth.fusion-builder-row-3 a:not(.fusion-button):not(.fusion-builder-module-control):not(.fusion-social-network-icon):not(.fb-icon-element):not(.fusion-countdown-link):not(.fusion-rollover-link):not(.fusion-rollover-gallery):not(.fusion-button-bar):not(.add_to_cart_button):not(.show_details_button):not(.product_type_external):not(.fusion-view-cart):not(.fusion-quick-view):not(.fusion-rollover-title-link):not(.fusion-breadcrumb-link):hover:after {color: #ff9800;}.fusion-fullwidth.fusion-builder-row-3 .pagination a.inactive:hover, .fusion-fullwidth.fusion-builder-row-3 .fusion-filters .fusion-filter.fusion-active a {border-color: #ff9800;}.fusion-fullwidth.fusion-builder-row-3 .pagination .current {border-color: #ff9800; background-color: #ff9800;}.fusion-fullwidth.fusion-builder-row-3 .fusion-filters .fusion-filter.fusion-active a, .fusion-fullwidth.fusion-builder-row-3 .fusion-date-and-formats .fusion-format-box, .fusion-fullwidth.fusion-builder-row-3 .fusion-popover, .fusion-fullwidth.fusion-builder-row-3 .tooltip-shortcode {color: #ff9800;}#wrapper .fusion-fullwidth.fusion-builder-row-3 .fusion-widget-area .fusion-vertical-menu-widget .menu li.current_page_ancestor > a, #wrapper .fusion-fullwidth.fusion-builder-row-3 .fusion-widget-area .fusion-vertical-menu-widget .menu li.current_page_ancestor > a:before, #wrapper .fusion-fullwidth.fusion-builder-row-3 .fusion-widget-area .fusion-vertical-menu-widget .current-menu-item > a, #wrapper .fusion-fullwidth.fusion-builder-row-3 .fusion-widget-area .fusion-vertical-menu-widget .current-menu-item > a:before, #wrapper .fusion-fullwidth.fusion-builder-row-3 .fusion-widget-area .fusion-vertical-menu-widget .current_page_item > a, #wrapper .fusion-fullwidth.fusion-builder-row-3 .fusion-widget-area .fusion-vertical-menu-widget .current_page_item > a:before {color: #ff9800;}#wrapper .fusion-fullwidth.fusion-builder-row-3 .fusion-widget-area .widget_nav_menu .menu li.current_page_ancestor > a, #wrapper .fusion-fullwidth.fusion-builder-row-3 .fusion-widget-area .widget_nav_menu .menu li.current_page_ancestor > a:before, #wrapper .fusion-fullwidth.fusion-builder-row-3 .fusion-widget-area .widget_nav_menu .current-menu-item > a, #wrapper .fusion-fullwidth.fusion-builder-row-3 .fusion-widget-area .widget_nav_menu .current-menu-item > a:before, #wrapper .fusion-fullwidth.fusion-builder-row-3 .fusion-widget-area .widget_nav_menu .current_page_item > a, #wrapper .fusion-fullwidth.fusion-builder-row-3 .fusion-widget-area .widget_nav_menu .current_page_item > a:before {color: #ff9800;}#wrapper .fusion-fullwidth.fusion-builder-row-3 .fusion-vertical-menu-widget .menu li.current_page_item > a { border-right-color:#ff9800;border-left-color:#ff9800;}#wrapper .fusion-fullwidth.fusion-builder-row-3 .fusion-widget-area .tagcloud a:hover { color: #fff; background-color: #ff9800;border-color: #ff9800;}#main .fusion-fullwidth.fusion-builder-row-3 .post .blog-shortcode-post-title a:hover {color: #ff9800;}<\/style><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":2969,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":[],"_links":{"self":[{"href":"https:\/\/www.q-sit.de\/en\/wp-json\/wp\/v2\/pages\/2973"}],"collection":[{"href":"https:\/\/www.q-sit.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.q-sit.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.q-sit.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.q-sit.de\/en\/wp-json\/wp\/v2\/comments?post=2973"}],"version-history":[{"count":11,"href":"https:\/\/www.q-sit.de\/en\/wp-json\/wp\/v2\/pages\/2973\/revisions"}],"predecessor-version":[{"id":3925,"href":"https:\/\/www.q-sit.de\/en\/wp-json\/wp\/v2\/pages\/2973\/revisions\/3925"}],"up":[{"embeddable":true,"href":"https:\/\/www.q-sit.de\/en\/wp-json\/wp\/v2\/pages\/2969"}],"wp:attachment":[{"href":"https:\/\/www.q-sit.de\/en\/wp-json\/wp\/v2\/media?parent=2973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}