{"id":135,"date":"2024-06-27T14:42:39","date_gmt":"2024-06-27T14:42:39","guid":{"rendered":"https:\/\/rabbit-it.ch\/it-consulting-copy-copy\/"},"modified":"2024-09-29T18:26:36","modified_gmt":"2024-09-29T18:26:36","slug":"it-audit","status":"publish","type":"page","link":"https:\/\/rabbit-it.ch\/en\/it-audit\/","title":{"rendered":"IT Audit"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"class_list":["post-135","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT Audit - rabbit it<\/title>\n<meta name=\"description\" content=\"rabbit it AG offers professional support for IT security audits, IT licence audits and IT performance audits\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rabbit-it.ch\/en\/it-audit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Audit - rabbit it\" \/>\n<meta property=\"og:description\" content=\"rabbit it AG offers professional support for IT security audits, IT licence audits and IT performance audits\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rabbit-it.ch\/en\/it-audit\/\" \/>\n<meta property=\"og:site_name\" content=\"rabbit it\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-29T18:26:36+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rabbit-it.ch\\\/en\\\/it-audit\\\/\",\"url\":\"https:\\\/\\\/rabbit-it.ch\\\/en\\\/it-audit\\\/\",\"name\":\"IT Audit - rabbit it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rabbit-it.ch\\\/en\\\/#website\"},\"datePublished\":\"2024-06-27T14:42:39+00:00\",\"dateModified\":\"2024-09-29T18:26:36+00:00\",\"description\":\"rabbit it AG offers professional support for IT security audits, IT licence audits and IT performance audits\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rabbit-it.ch\\\/en\\\/it-audit\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[[\"https:\\\/\\\/rabbit-it.ch\\\/en\\\/it-audit\\\/\"]]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rabbit-it.ch\\\/en\\\/it-audit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Start\",\"item\":\"https:\\\/\\\/rabbit-it.ch\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Audit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rabbit-it.ch\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/rabbit-it.ch\\\/en\\\/\",\"name\":\"rabbit it\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rabbit-it.ch\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Audit - rabbit it","description":"rabbit it AG offers professional support for IT security audits, IT licence audits and IT performance audits","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rabbit-it.ch\/en\/it-audit\/","og_locale":"en_US","og_type":"article","og_title":"IT Audit - rabbit it","og_description":"rabbit it AG offers professional support for IT security audits, IT licence audits and IT performance audits","og_url":"https:\/\/rabbit-it.ch\/en\/it-audit\/","og_site_name":"rabbit it","article_modified_time":"2024-09-29T18:26:36+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/rabbit-it.ch\/en\/it-audit\/","url":"https:\/\/rabbit-it.ch\/en\/it-audit\/","name":"IT Audit - rabbit it","isPartOf":{"@id":"https:\/\/rabbit-it.ch\/en\/#website"},"datePublished":"2024-06-27T14:42:39+00:00","dateModified":"2024-09-29T18:26:36+00:00","description":"rabbit it AG offers professional support for IT security audits, IT licence audits and IT performance audits","breadcrumb":{"@id":"https:\/\/rabbit-it.ch\/en\/it-audit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":[["https:\/\/rabbit-it.ch\/en\/it-audit\/"]]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rabbit-it.ch\/en\/it-audit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Start","item":"https:\/\/rabbit-it.ch\/en\/"},{"@type":"ListItem","position":2,"name":"IT Audit"}]},{"@type":"WebSite","@id":"https:\/\/rabbit-it.ch\/en\/#website","url":"https:\/\/rabbit-it.ch\/en\/","name":"rabbit it","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rabbit-it.ch\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"grid":"{\r\n  \"colCount\": 12,\r\n  \"colGutter\": 1,\r\n  \"rowGutters\": [\r\n    4,\r\n    4,\r\n    4,\r\n    4,\r\n    0,\r\n    0,\r\n    0,\r\n    0,\r\n    0,\r\n    0,\r\n    0\r\n  ],\r\n  \"frameMargin\": 5,\r\n  \"leftFrameMargin\": 4,\r\n  \"rightFrameMargin\": 4,\r\n  \"topFrameMargin\": 4,\r\n  \"mus\": {\r\n    \"colGutterMu\": \"%\",\r\n    \"rowGutterMu\": \"%\",\r\n    \"topFrameMu\": \"%\",\r\n    \"bottomFrameMu\": \"%\",\r\n    \"frameMu\": \"%\"\r\n  },\r\n  \"bottomFrameMargin\": 4,\r\n  \"rowAttrs\": [\r\n    {\r\n      \"row100vh\": true,\r\n      \"rowcustomheight\": \"\",\r\n      \"relid\": 1\r\n    },\r\n    {\r\n      \"relid\": 3\r\n    },\r\n    {\r\n      \"relid\": 5\r\n    },\r\n    {\r\n      \"relid\": 11\r\n    },\r\n    {\r\n      \"relid\": 12\r\n    },\r\n    {\r\n      \"collapse\": true,\r\n      \"relid\": 14\r\n    },\r\n    {\r\n      \"relid\": 16\r\n    },\r\n    {\r\n      \"collapse\": true,\r\n      \"relid\": 18\r\n    },\r\n    {\r\n      \"relid\": 20\r\n    },\r\n    {\r\n      \"collapse\": true,\r\n      \"relid\": 22\r\n    },\r\n    {\r\n      \"relid\": 24\r\n    },\r\n    {\r\n      \"collapse\": true,\r\n      \"relid\": 26\r\n    }\r\n  ],\r\n  \"bgColor\": null,\r\n  \"bgImage\": null,\r\n  \"cont\": [\r\n    {\r\n      \"type\": \"text\",\r\n      \"cont\": \"<p class=\\\"_H1\\\">Don't Get Caught<br \/>by Surprise<\/p>\",\r\n      \"align\": \"top\",\r\n      \"row\": 0,\r\n      \"col\": 0,\r\n      \"colspan\": 12,\r\n      \"offsetx\": 0,\r\n      \"offsety\": 0,\r\n      \"spaceabove\": 0,\r\n      \"spacebelow\": 0,\r\n      \"yvel\": 1,\r\n      \"push\": 0,\r\n      \"relid\": 2,\r\n      \"absolute_position\": true,\r\n      \"frameOverflow\": \"\",\r\n      \"pxwidth\": {\r\n        \"desktop\": {\r\n          \"val\": \"950\",\r\n          \"mu\": \"px\"\r\n        },\r\n        \"tablet\": {\r\n          \"val\": 100,\r\n          \"mu\": \"%\"\r\n        },\r\n        \"phone\": {\r\n          \"val\": 100,\r\n          \"mu\": \"%\"\r\n        }\r\n      },\r\n      \"classes\": \"cover-title\"\r\n    },\r\n    {\r\n      \"type\": \"text\",\r\n      \"cont\": \"<h2 class=\\\"_H1\\\"><span class=\\\"_Violett\\\">Asking the Right Questions: From Audit to Strategy<\/span><\/h2><p><span class=\\\"_Violett\\\">Security-<\/span>, <span class=\\\"_Violett\\\">licence-<\/span> or <span class=\\\"_Violett\\\">performance audits<\/span>: We identify and analyse weaknesses and security gaps in your IT infrastructure, create meaningful documentation, develop <span class=\\\"_Violett\\\">strategic recommendations<\/span> and can implement these directly.<\/p><p>\u00a0<\/p>\",\r\n      \"align\": \"middle\",\r\n      \"row\": 1,\r\n      \"col\": 0,\r\n      \"colspan\": 12,\r\n      \"offsetx\": 0,\r\n      \"offsety\": 0,\r\n      \"spaceabove\": 0,\r\n      \"spacebelow\": 0,\r\n      \"yvel\": 1,\r\n      \"push\": 0,\r\n      \"relid\": 4,\r\n      \"absolute_position\": false,\r\n      \"frameOverflow\": \"\",\r\n      \"pxwidth\": {\r\n        \"desktop\": {\r\n          \"val\": \"950\",\r\n          \"mu\": \"px\"\r\n        },\r\n        \"tablet\": {\r\n          \"val\": 100,\r\n          \"mu\": \"%\"\r\n        },\r\n        \"phone\": {\r\n          \"val\": 100,\r\n          \"mu\": \"%\"\r\n        }\r\n      }\r\n    },\r\n    {\r\n      \"type\": \"hr\",\r\n      \"cont\": \"\",\r\n      \"align\": \"middle\",\r\n      \"row\": 2,\r\n      \"col\": 0,\r\n      \"colspan\": 12,\r\n      \"offsetx\": 0,\r\n      \"offsety\": 0,\r\n      \"spaceabove\": 0,\r\n      \"spacebelow\": 0,\r\n      \"yvel\": 1,\r\n      \"push\": 0,\r\n      \"relid\": 7,\r\n      \"absolute_position\": false,\r\n      \"frameOverflow\": \"\"\r\n    },\r\n    {\r\n      \"type\": \"text\",\r\n      \"cont\": \"<h3 class=\\\"_H1\\\"><span class=\\\"_Violett\\\">Our Services Include<\/span><\/h3>\",\r\n      \"align\": \"top\",\r\n      \"row\": 3,\r\n      \"col\": 0,\r\n      \"colspan\": 12,\r\n      \"offsetx\": 0,\r\n      \"offsety\": 0,\r\n      \"spaceabove\": 0,\r\n      \"spacebelow\": 0,\r\n      \"yvel\": 1,\r\n      \"push\": 0,\r\n      \"relid\": 9,\r\n      \"absolute_position\": false,\r\n      \"pxwidth\": {\r\n        \"desktop\": {\r\n          \"val\": \"950\",\r\n          \"mu\": \"px\"\r\n        },\r\n        \"tablet\": {\r\n          \"val\": 100,\r\n          \"mu\": \"%\"\r\n        },\r\n        \"phone\": {\r\n          \"val\": 100,\r\n          \"mu\": \"%\"\r\n        }\r\n      }\r\n    },\r\n    {\r\n      \"type\": \"text\",\r\n      \"cont\": \"<p class=\\\"_Default\\\"><a href=\\\"#expandrow\\\" data-expand=\\\"14\\\" data-animation=\\\"600\\\" data-animationtiming=\\\"cubic-bezier(0.17,0.84,0.44,1)\\\" data-collapseotherrows=\\\"false\\\" data-scrolltoexpandedrow=\\\"false\\\">Security Audit<\/a><\/p>\",\r\n      \"align\": \"top\",\r\n      \"row\": 4,\r\n      \"col\": 0,\r\n      \"colspan\": 12,\r\n      \"offsetx\": 0,\r\n      \"offsety\": 0,\r\n      \"spaceabove\": 0,\r\n      \"spacebelow\": 0,\r\n      \"yvel\": 1,\r\n      \"push\": 0,\r\n      \"relid\": 13,\r\n      \"absolute_position\": false,\r\n      \"classes\": \"dropdown-link\"\r\n    },\r\n    {\r\n      \"type\": \"text\",\r\n      \"cont\": \"<p>To ensure that weak points in the operationally critical areas of your company are identified and addressed early, rabbit it AG conducts a security audit. We align the IT organisation, hardware and software, maintenance, support and planning with the core processes of your business. Our recommendations for action are tailored to your wishes and budget.<\/p>\",\r\n      \"align\": \"top\",\r\n      \"row\": 5,\r\n      \"col\": 0,\r\n      \"colspan\": 12,\r\n      \"offsetx\": 0,\r\n      \"offsety\": 0,\r\n      \"spaceabove\": 0,\r\n      \"spacebelow\": 0,\r\n      \"yvel\": 1,\r\n      \"push\": 0,\r\n      \"relid\": 15,\r\n      \"absolute_position\": false,\r\n      \"classes\": \"dropdown-inhalt\",\r\n      \"pxwidth\": {\r\n        \"desktop\": {\r\n          \"val\": \"950\",\r\n          \"mu\": \"px\"\r\n        },\r\n        \"tablet\": {\r\n          \"val\": 100,\r\n          \"mu\": \"%\"\r\n        },\r\n        \"phone\": {\r\n          \"val\": 100,\r\n          \"mu\": \"%\"\r\n        }\r\n      }\r\n    },\r\n    {\r\n      \"type\": \"text\",\r\n      \"cont\": \"<p><a href=\\\"#expandrow\\\" data-expand=\\\"18\\\" data-animation=\\\"600\\\" data-animationtiming=\\\"cubic-bezier(0.17,0.84,0.44,1)\\\" data-collapseotherrows=\\\"false\\\" data-scrolltoexpandedrow=\\\"false\\\">Security Strategy, Implementation and Operation<\/a><\/p>\",\r\n      \"align\": \"top\",\r\n      \"row\": 6,\r\n      \"col\": 0,\r\n      \"colspan\": 12,\r\n      \"offsetx\": 0,\r\n      \"offsety\": 0,\r\n      \"spaceabove\": 0,\r\n      \"spacebelow\": 0,\r\n      \"yvel\": 1,\r\n      \"push\": 0,\r\n      \"relid\": 17,\r\n      \"absolute_position\": false,\r\n      \"classes\": \"dropdown-link\"\r\n    },\r\n    {\r\n      \"type\": \"text\",\r\n      \"cont\": \"<p>We develop, implement and operate a customised security strategy with anti-virus, firewall and intrusion detection solutions, VPN concepts and SSL certificate solutions to ensure the availability and confidentiality of your end devices and network systems. Our security strategy not only ensures a controlled company network access but provides an overview of activities and protects against manipulation.<\/p>\",\r\n      \"align\": \"top\",\r\n      \"row\": 7,\r\n      \"col\": 0,\r\n      \"colspan\": 12,\r\n      \"offsetx\": 0,\r\n      \"offsety\": 0,\r\n      \"spaceabove\": 0,\r\n      \"spacebelow\": 0,\r\n      \"yvel\": 1,\r\n      \"push\": 0,\r\n      \"relid\": 19,\r\n      \"absolute_position\": false,\r\n      \"classes\": \"dropdown-inhalt\",\r\n      \"pxwidth\": {\r\n        \"desktop\": {\r\n          \"val\": \"950\",\r\n          \"mu\": \"px\"\r\n        },\r\n        \"tablet\": {\r\n          \"val\": 100,\r\n          \"mu\": \"%\"\r\n        },\r\n        \"phone\": {\r\n          \"val\": 100,\r\n          \"mu\": \"%\"\r\n        }\r\n      }\r\n    },\r\n    {\r\n      \"type\": \"text\",\r\n      \"cont\": \"<p><a href=\\\"#expandrow\\\" data-expand=\\\"22\\\" data-animation=\\\"600\\\" data-animationtiming=\\\"cubic-bezier(0.17,0.84,0.44,1)\\\" data-collapseotherrows=\\\"false\\\" data-scrolltoexpandedrow=\\\"false\\\">Performance Audit<\/a><\/p>\",\r\n      \"align\": \"top\",\r\n      \"row\": 8,\r\n      \"col\": 0,\r\n      \"colspan\": 12,\r\n      \"offsetx\": 0,\r\n      \"offsety\": 0,\r\n      \"spaceabove\": 0,\r\n      \"spacebelow\": 0,\r\n      \"yvel\": 1,\r\n      \"push\": 0,\r\n      \"relid\": 21,\r\n      \"absolute_position\": false,\r\n      \"classes\": \"dropdown-link\"\r\n    },\r\n    {\r\n      \"type\": \"text\",\r\n      \"cont\": \"<p>rabbit it AG analyses the performance of your hardware and software, IT organisation, maintenance and support. We visit you on site to obtain data from your server, analyse the topology and data. We perform external attack attempts to test the security of the system. Based on the insights gained, strategic recommendations for action are then provided to you.<\/p>\",\r\n      \"align\": \"top\",\r\n      \"row\": 9,\r\n      \"col\": 0,\r\n      \"colspan\": 12,\r\n      \"offsetx\": 0,\r\n      \"offsety\": 0,\r\n      \"spaceabove\": 0,\r\n      \"spacebelow\": 0,\r\n      \"yvel\": 1,\r\n      \"push\": 0,\r\n      \"relid\": 23,\r\n      \"absolute_position\": false,\r\n      \"classes\": \"dropdown-inhalt\",\r\n      \"pxwidth\": {\r\n        \"desktop\": {\r\n          \"val\": \"950\",\r\n          \"mu\": \"px\"\r\n        },\r\n        \"tablet\": {\r\n          \"val\": 100,\r\n          \"mu\": \"%\"\r\n        },\r\n        \"phone\": {\r\n          \"val\": 100,\r\n          \"mu\": \"%\"\r\n        }\r\n      }\r\n    },\r\n    {\r\n      \"type\": \"text\",\r\n      \"cont\": \"<p><a href=\\\"#expandrow\\\" data-expand=\\\"26\\\" data-animation=\\\"600\\\" data-animationtiming=\\\"cubic-bezier(0.17,0.84,0.44,1)\\\" data-collapseotherrows=\\\"false\\\" data-scrolltoexpandedrow=\\\"false\\\">Licence Audit<\/a><\/p>\",\r\n      \"align\": \"top\",\r\n      \"row\": 10,\r\n      \"col\": 0,\r\n      \"colspan\": 12,\r\n      \"offsetx\": 0,\r\n      \"offsety\": 0,\r\n      \"spaceabove\": 0,\r\n      \"spacebelow\": 0,\r\n      \"yvel\": 1,\r\n      \"push\": 0,\r\n      \"relid\": 25,\r\n      \"absolute_position\": false,\r\n      \"classes\": \"dropdown-link\"\r\n    },\r\n    {\r\n      \"type\": \"text\",\r\n      \"cont\": \"<p>Software contracts offer both opportunities and risks: The rabbit it AG licence audit provides you with an overview of the software and licence inventory as well as any under- and over-licensing and a compliance check. Furthermore, we provide you with improvement recommendations and a proposal for the process regulation of operational licence management.<\/p>\",\r\n      \"align\": \"top\",\r\n      \"row\": 11,\r\n      \"col\": 0,\r\n      \"colspan\": 12,\r\n      \"offsetx\": 0,\r\n      \"offsety\": 0,\r\n      \"spaceabove\": 0,\r\n      \"spacebelow\": 0,\r\n      \"yvel\": 1,\r\n      \"push\": 0,\r\n      \"relid\": 27,\r\n      \"absolute_position\": false,\r\n      \"classes\": \"dropdown-inhalt\",\r\n      \"pxwidth\": {\r\n        \"desktop\": {\r\n          \"val\": \"950\",\r\n          \"mu\": \"px\"\r\n        },\r\n        \"tablet\": {\r\n          \"val\": 100,\r\n          \"mu\": \"%\"\r\n        },\r\n        \"phone\": {\r\n          \"val\": 100,\r\n          \"mu\": \"%\"\r\n        }\r\n      }\r\n    }\r\n  ]\r\n}","phonegrid":"","_links":{"self":[{"href":"https:\/\/rabbit-it.ch\/en\/wp-json\/wp\/v2\/pages\/135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rabbit-it.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rabbit-it.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rabbit-it.ch\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/rabbit-it.ch\/en\/wp-json\/wp\/v2\/comments?post=135"}],"version-history":[{"count":0,"href":"https:\/\/rabbit-it.ch\/en\/wp-json\/wp\/v2\/pages\/135\/revisions"}],"wp:attachment":[{"href":"https:\/\/rabbit-it.ch\/en\/wp-json\/wp\/v2\/media?parent=135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}