{"id":13360,"date":"2020-02-21T09:23:43","date_gmt":"2020-02-21T14:23:43","guid":{"rendered":"https:\/\/telium.io\/sicherheitsdatenbanken\/technologie\/"},"modified":"2020-03-09T19:33:25","modified_gmt":"2020-03-10T00:33:25","slug":"technologie","status":"publish","type":"page","link":"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/technologie\/","title":{"rendered":"Technologie"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-no-small-visibility lazyload headerheight\" style=\"--awb-background-position:left top;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-color:#000000;--awb-background-size:cover;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/banner-honeycomb-circuits.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-padding-top:125px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% ) * 0.33333333333333 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-image-element in-legacy-container\" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"503\" height=\"250\" title=\"Zahnr\u00e4der-Asterisk\" src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/gears-asterisk-1.png\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/gears-asterisk-1.png\" alt class=\"lazyload img-responsive wp-image-8709\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27503%27%20height%3D%27250%27%20viewBox%3D%270%200%20503%20250%27%3E%3Crect%20width%3D%27503%27%20height%3D%27250%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/gears-asterisk-1-200x99.png 200w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/gears-asterisk-1-400x199.png 400w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/gears-asterisk-1.png 503w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-two-third fusion-column-last fusion-animated\" style=\"--awb-padding-top:50px;--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;width:66.666666666667%;width:calc(66.666666666667% - ( ( 4% ) * 0.66666666666667 ) );\" data-animationType=\"zoomIn\" data-animationDuration=\"0.9\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-no-small-visibility fusion-no-medium-visibility fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-bottom:50px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#ffffff;--awb-margin-bottom:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:1.4;\">Sicherheitsdatenbanken<\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-six\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;--awb-font-size:18px;\"><h6 class=\"fusion-title-heading title-heading-right fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:18;--minFontSize:18;line-height:1.5;\">Einfach zu bedienende Hacking- und Betrugsinformationen speziell f\u00fcr Telefonie<\/h6><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling fusion-equal-height-columns fusion-no-medium-visibility fusion-no-large-visibility lazyload\" style=\"--awb-border-color:#ff6600;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:0px;--awb-padding-bottom:0px;--awb-padding-left:0px;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-background-size:cover;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-flex-wrap:wrap;\" data-bg=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/banner-honeycomb-circuits.jpg\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last mobileheader\" style=\"--awb-bg-size:cover;--awb-margin-top:0px;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-column-content-centered\"><div class=\"fusion-column-content\"><div class=\"fusion-title title fusion-title-3 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-one mobilebreadcrumb\" style=\"--awb-text-color:#cfcfcf;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.4;\">SECDATA<\/h1><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-1\"><p><span style=\"color: #cfcfcf;font-size: 150%\">\u00bb<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-no-medium-visibility fusion-no-large-visibility fusion-title-center fusion-title-text fusion-title-size-two mobilebreadcrumb\" style=\"--awb-text-color:#ff6600;--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:1em;--awb-margin-right-small:0px;--awb-margin-bottom-small:1em;--awb-margin-left-small:0px;--awb-font-size:150%;\"><div class=\"title-sep-container title-sep-container-left\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><span class=\"awb-title-spacer\"><\/span><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25.5;line-height:1.5;\">TECHNOLOGIE<\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container title-sep-container-right\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"product-tabs\"><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-1 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/\"><i class=\"fa-book fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Overview<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-2 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/vorteile\/\"><i class=\"fa-life-ring fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Benefits<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-3 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/funktionen\/\"><i class=\"fa-check-double fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Features<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-large button-custom fusion-button-default button-4 fusion-button-span-no fusion-has-button-gradient cursor-default product-tab\" style=\"--button_accent_color:#fff;--button_accent_hover_color:#fff;--button_border_hover_color:#787878;--button_gradient_top_color:#ff6600;--button_gradient_bottom_color:#dd4400;--button_gradient_top_color_hover:#ff6600;--button_gradient_bottom_color_hover:#dd4400;--button_text_transform:none;\" target=\"_self\" href=\"#\"><i class=\"fa-microchip fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Technology<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-5 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/api\/\"><i class=\"fa-plug fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">API<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-6 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/haeufig-gestellte-fragen\/\"><i class=\"fa-question-circle fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">FAQ<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-7 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/preise-kaufen\/\"><i class=\"fa-shopping-cart fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Pricing \/ Buy<\/span><\/a><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-3d button-medium button-default fusion-button-default button-8 fusion-button-span-no product-tab\" style=\"--button_text_transform:none;\" target=\"_self\" href=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/lizenz\/\"><i class=\"fa-gavel fa awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">License<\/span><\/a><\/div><h2 style=\"color: rgba(0,0,0,0);display: inline;font-size: 0em;\">technology<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-5 fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:36;line-height:1.5;\">Entwickelt f\u00fcr Telefoniebetrug und Hacking-Pr\u00e4vention<\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><ul style=\"--awb-size:18px;--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;--awb-circlecolor:#ff6600;--awb-circle-yes-font-size:15.84px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Identifiziert Betrug und Hacking, einzigartig f\u00fcr VoIP-Telefonie<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Echtzeit-Hacker-IP- und Betrugs-Telefonnummerndaten, um Zero-Day-Angriffe zu verhindern<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Weltweite Datenerfassung identifiziert l\u00e4nder\u00fcbergreifende Betrugssysteme<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-check fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Einfache REST-Schnittstelle bietet sofortige Risikobewertung<\/p>\n<\/div><\/li><\/ul><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-padding-bottom:20px;--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:rgba(239,239,239,0.5);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-padding-bottom:20px;--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-6 fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:36;line-height:1.5;\">Wichtige Module<\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep- sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-top:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:20px;--awb-content-font-size:17px;--awb-icon-alignment:right;--awb-hover-color:rgba(0,0,0,0.1);--awb-border-color:#000000;--awb-background-color:#ffffff;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:#ffffff;--awb-title-color:#333333;--awb-content-color:#747474;--awb-icon-box-color:#ff6600;--awb-toggle-hover-accent-color:#ff6600;--awb-title-font-family:Tahoma, Geneva, sans-serif;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Work Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-right fusion-toggle-icon-boxed\" id=\"accordion-13360-1\"><div class=\"fusion-panel panel-default panel-f1e7544e241c02825 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_f1e7544e241c02825\"><a aria-expanded=\"false\" aria-controls=\"f1e7544e241c02825\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-13360-1\" data-target=\"#f1e7544e241c02825\" href=\"#f1e7544e241c02825\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Weltweite Honeypots<\/span><\/a><\/h4><\/div><div id=\"f1e7544e241c02825\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_f1e7544e241c02825\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Die Worldwide Honeypots sind 15 exponierte PBX (und verwandte Dienstleistungen) auf der ganzen Welt. Diese Honigt\u00f6pfe wurden entwickelt, um die Aktivit\u00e4ten von Hackern und Betr\u00fcgern anzuziehen und zu \u00fcberwachen, Verhaltensdaten zu erfassen, ihre IP-Adressen aufzuzeichnen und beliebige Rufnummern zu notieren. Die Rohdaten werden kontinuierlich an das Datenerfassungsmodul gesendet.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-562d6201d8142c92e fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_562d6201d8142c92e\"><a aria-expanded=\"false\" aria-controls=\"562d6201d8142c92e\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-13360-1\" data-target=\"#562d6201d8142c92e\" href=\"#562d6201d8142c92e\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Datenerfassung<\/span><\/a><\/h4><\/div><div id=\"562d6201d8142c92e\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_562d6201d8142c92e\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Das Data Collection-Modul akzeptiert rohen Betrug, Hacking und Intrusion Behavior-Daten von externen Datenerfassungsservern. Das Modul speichert alle Informationen in lokalen Datenbanken f\u00fcr die nachgelagerte Analyse.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-ddc97b54069d2b226 fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_ddc97b54069d2b226\"><a aria-expanded=\"false\" aria-controls=\"ddc97b54069d2b226\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-13360-1\" data-target=\"#ddc97b54069d2b226\" href=\"#ddc97b54069d2b226\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Datenanalyse-Engine<\/span><\/a><\/h4><\/div><div id=\"ddc97b54069d2b226\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_ddc97b54069d2b226\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Die Datenanalyse-Engine durchsucht die Rohinformationen und sucht nach Mustern und Beziehungen zwischen Datenpunkten. Soweit m\u00f6glich, verkn\u00fcpft es verwandte Angriffe mit verwandten Quell-IP-Adressen, um die Erkennung neuer Angriffe zu erleichtern. Nach der Analyse aller Informationen in den Rohdatenbanken werden neue Informationen an die Datenbank Fraud Phone Number, Hacker IP-Adressdatenbank und Hacker Behavior Patterns-Datenbank angeh\u00e4ngt. Au\u00dferdem werden vorhandene Daten abaltt und Regeln f\u00fcr die Berechnung von Risikobewertungen aktualisiert.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-71781e8c895ce013d fusion-toggle-no-divider fusion-toggle-boxed-mode\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_71781e8c895ce013d\"><a aria-expanded=\"false\" aria-controls=\"71781e8c895ce013d\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-13360-1\" data-target=\"#71781e8c895ce013d\" href=\"#71781e8c895ce013d\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">ReST-API<\/span><\/a><\/h4><\/div><div id=\"71781e8c895ce013d\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_71781e8c895ce013d\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Die ReST-API akzeptiert Abfragen von Kundenservern und durchsucht die Sicherheitsdatenbanken nach relevanten \u00dcbereinstimmungen. Es f\u00fchrt eine Reihe von Berechnungen durch, um quantitative Inputs zur Risikoermittlung zu erstellen, und berechnet dann einen Risikowert von 0 (geringes Betrugsrisiko\/Hacking) bis 100 (hohes Betrugs-\/Hackingrisiko). Schlie\u00dflich formatiert das Modul eine Antwort in der angeforderten Struktur und sendet das Ergebnis an die Kunden.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"900\" height=\"1186\" title=\"Technologie2\" src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/technology2.png\" data-orig-src=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/technology2.png\" alt class=\"lazyload img-responsive wp-image-11028\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27900%27%20height%3D%271186%27%20viewBox%3D%270%200%20900%201186%27%3E%3Crect%20width%3D%27900%27%20height%3D%271186%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/technology2-200x264.png 200w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/technology2-400x527.png 400w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/technology2-600x791.png 600w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/technology2-800x1054.png 800w, https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/02\/technology2.png 900w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 1024px) 100vw, 900px\" \/><\/span><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-padding-bottom:20px;--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":13308,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"class_list":["post-13360","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Technologie - Sicherheitsdatenbanken - Telium<\/title>\n<meta name=\"description\" content=\"Die Technologie, die SecData zugrunde liegt, basiert auf einer Vielzahl von Modulen. Zeigen Sie die Rolle und Interaktion der vier Prim\u00e4renmodule an.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/technologie\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Technologie - Sicherheitsdatenbanken - Telium\" \/>\n<meta property=\"og:description\" content=\"Die Technologie, die SecData zugrunde liegt, basiert auf einer Vielzahl von Modulen. Zeigen Sie die Rolle und Interaktion der vier Prim\u00e4renmodule an.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/technologie\/\" \/>\n<meta property=\"og:site_name\" content=\"Telium\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-10T00:33:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@telium_io\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"19 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/telium.io\\\/de\\\/sicherheitsdatenbanken\\\/technologie\\\/\",\"url\":\"https:\\\/\\\/telium.io\\\/de\\\/sicherheitsdatenbanken\\\/technologie\\\/\",\"name\":\"Technologie - Sicherheitsdatenbanken - Telium\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/telium.io\\\/de\\\/#website\"},\"datePublished\":\"2020-02-21T14:23:43+00:00\",\"dateModified\":\"2020-03-10T00:33:25+00:00\",\"description\":\"Die Technologie, die SecData zugrunde liegt, basiert auf einer Vielzahl von Modulen. Zeigen Sie die Rolle und Interaktion der vier Prim\u00e4renmodule an.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/telium.io\\\/de\\\/sicherheitsdatenbanken\\\/technologie\\\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/telium.io\\\/de\\\/sicherheitsdatenbanken\\\/technologie\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/telium.io\\\/de\\\/sicherheitsdatenbanken\\\/technologie\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/telium.io\\\/de\\\/startseite\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sicherheitsdatenbanken\",\"item\":\"https:\\\/\\\/telium.io\\\/de\\\/sicherheitsdatenbanken\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Technologie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/telium.io\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/telium.io\\\/de\\\/\",\"name\":\"Telium\",\"description\":\"Telefonie und Telematik\",\"publisher\":{\"@id\":\"https:\\\/\\\/telium.io\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/telium.io\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/telium.io\\\/de\\\/#organization\",\"name\":\"Telium\",\"url\":\"https:\\\/\\\/telium.io\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/telium.io\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/telium.io\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2020\\\/01\\\/logo_o_800x800.png\",\"contentUrl\":\"https:\\\/\\\/telium.io\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2020\\\/01\\\/logo_o_800x800.png\",\"width\":800,\"height\":800,\"caption\":\"Telium\"},\"image\":{\"@id\":\"https:\\\/\\\/telium.io\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/category\\\/Telecommunication-Company\\\/Telium-1581395458787072\\\/\",\"https:\\\/\\\/x.com\\\/telium_io\",\"https:\\\/\\\/ca.linkedin.com\\\/company\\\/telium\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Technologie - Sicherheitsdatenbanken - Telium","description":"Die Technologie, die SecData zugrunde liegt, basiert auf einer Vielzahl von Modulen. Zeigen Sie die Rolle und Interaktion der vier Prim\u00e4renmodule an.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/technologie\/","og_locale":"de_DE","og_type":"article","og_title":"Technologie - Sicherheitsdatenbanken - Telium","og_description":"Die Technologie, die SecData zugrunde liegt, basiert auf einer Vielzahl von Modulen. Zeigen Sie die Rolle und Interaktion der vier Prim\u00e4renmodule an.","og_url":"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/technologie\/","og_site_name":"Telium","article_publisher":"https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","article_modified_time":"2020-03-10T00:33:25+00:00","twitter_card":"summary_large_image","twitter_site":"@telium_io","twitter_misc":{"Est. reading time":"19 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/technologie\/","url":"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/technologie\/","name":"Technologie - Sicherheitsdatenbanken - Telium","isPartOf":{"@id":"https:\/\/telium.io\/de\/#website"},"datePublished":"2020-02-21T14:23:43+00:00","dateModified":"2020-03-10T00:33:25+00:00","description":"Die Technologie, die SecData zugrunde liegt, basiert auf einer Vielzahl von Modulen. Zeigen Sie die Rolle und Interaktion der vier Prim\u00e4renmodule an.","breadcrumb":{"@id":"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/technologie\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/telium.io\/de\/sicherheitsdatenbanken\/technologie\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/technologie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/telium.io\/de\/startseite\/"},{"@type":"ListItem","position":2,"name":"Sicherheitsdatenbanken","item":"https:\/\/telium.io\/de\/sicherheitsdatenbanken\/"},{"@type":"ListItem","position":3,"name":"Technologie"}]},{"@type":"WebSite","@id":"https:\/\/telium.io\/de\/#website","url":"https:\/\/telium.io\/de\/","name":"Telium","description":"Telefonie und Telematik","publisher":{"@id":"https:\/\/telium.io\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/telium.io\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/telium.io\/de\/#organization","name":"Telium","url":"https:\/\/telium.io\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/telium.io\/de\/#\/schema\/logo\/image\/","url":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","contentUrl":"https:\/\/telium.io\/wp-content\/uploads\/sites\/6\/2020\/01\/logo_o_800x800.png","width":800,"height":800,"caption":"Telium"},"image":{"@id":"https:\/\/telium.io\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/category\/Telecommunication-Company\/Telium-1581395458787072\/","https:\/\/x.com\/telium_io","https:\/\/ca.linkedin.com\/company\/telium"]}]}},"_links":{"self":[{"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/pages\/13360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/comments?post=13360"}],"version-history":[{"count":3,"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/pages\/13360\/revisions"}],"predecessor-version":[{"id":13363,"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/pages\/13360\/revisions\/13363"}],"up":[{"embeddable":true,"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/pages\/13308"}],"wp:attachment":[{"href":"https:\/\/telium.io\/de\/wp-json\/wp\/v2\/media?parent=13360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}