[{"id":"ci_52b22b6804e6fb8fcd33cc0f825d8ba3f7ce56a548442ea06f46fd16117a90ef","title":"Sichere Bereitstellung von MyQ X","path":"/de/security/1.0/secure-deployment","children":[{"id":"ci_4c24e75f676bd84a8f882455926cfb07050a826d310a330f5ecad7a2ba6b2390","title":"MyQ X Central Server","path":"/de/security/1.0/myq-central-server","children":[{"id":"ci_582d0dd498185de736dce109622e33a437666a9ecc3e800a08150be9907576c6","title":"Sicherheit der Verbindung","path":"/de/security/1.0/connection-security","children":[]},{"id":"ci_8c308120aedbe5361342d82bafa8af47809b97e3ea6ccf5a5dbdb17c411b1645","title":"Sicherheit der Daten","path":"/de/security/1.0/data-security","children":[]},{"id":"ci_7da5f7f63784bbaf6d9a480e02f7642a96113d7c22df5a133d4b953b74ea97fe","title":"Zusätzliche Empfehlungen","path":"/de/security/1.0/additional-recommendations","children":[]}]},{"id":"ci_f75e185fecc4422f73de4bf4eaf3efc502f9756b2216db8961c6744f57df85f9","title":"MyQ X Print Server","path":"/de/security/1.0/myq-print-server","children":[{"id":"ci_7f2e812a17c234e84d2024ae72cb67223b902792034e646bedc0c4b7c5b58134","title":"PS Sicherheit der Verbindung","path":"/de/security/1.0/ps-connection-security","children":[]},{"id":"ci_dba766a98ac9596599e2e4e6e6d89b98c2333b46ea6ed89884ec8163354f8665","title":"PS Datensicherheit","path":"/de/security/1.0/ps-data-security","children":[]},{"id":"ci_7a3fa776453e555d1f9971aad53b8c5c073fb9daba00d9e6c2aeddcaf036cbe2","title":"PS Zusätzliche Empfehlungen","path":"/de/security/1.0/ps-additional-recommendations","children":[]}]},{"id":"ci_51f549167c057d281b4aeaf561ec98358a7fee8a0df0ef237f3d66bdb20fb3f2","title":"MyQ X Desktop Client","path":"/de/security/1.0/myq-desktop-client","children":[]}]},{"id":"ci_d1dd2c4ae902f23ba5fe70c9e2918470603769e985cc303f64ea883afabcfc3c","title":"Whitepaper zur MyQ X-Sicherheit","path":"/de/security/1.0/security-whitepaper","children":[{"id":"ci_fbcff0e3f2299882567905f48d11050b665a964ac5e928ab068f568d5159f4e7","title":"Wichtige Sicherheitsverbesserungen in 10.2","path":"/de/security/1.0/key-security-improvements-in-10-2","children":[]},{"id":"ci_450f199965374b808fb56b1b071bac93a30f6ea6e515481ddf86049b64c97f9c","title":"Geschäftswert der sicheren Druckverwaltung","path":"/de/security/1.0/business-value-of-secure-print-management","children":[]},{"id":"ci_72ba9d4e57974405bf5706376811118b3626b3a139a4dd81725724c848df3e7a","title":"Einhaltung der Vorschriften","path":"/de/security/1.0/compliance","children":[]},{"id":"ci_c6f7e023fe7655f4fe7a4c7408bcfbffcf0960fac048a38b87641a41c5f4a8f6","title":"Implementierung der Zero-Trust-Architektur","path":"/de/security/1.0/zero-trust-architecture-implementation","children":[]},{"id":"ci_305305574f280ecdb36bdd7bb54957e4d6d8b2703567d44cec7ee18fb13eab1d","title":"Identitäts- und Zugangsmanagement","path":"/de/security/1.0/identity-and-access-management","children":[]},{"id":"ci_d617eebdf951ed502dfe44a5908e46af56cdad1529660ab79dbd7c64a5e89555","title":"Sicherheit der Infrastruktur","path":"/de/security/1.0/infrastructure-security","children":[]},{"id":"ci_235a157e8dff1360e8e49abd3bd5975a8164a4a68d1e8fba108e15eedbef5361","title":"Datenschutz und Verschlüsselung","path":"/de/security/1.0/data-protection-and-encryption","children":[]},{"id":"ci_6d62dcb157f9f589397d955ab0b23a16187f0ed2de137da29d97dbfdb3b3fb77","title":"Sichere Druck-Workflows","path":"/de/security/1.0/secure-printing-workflows","children":[]},{"id":"ci_eefeca214bad4873926a200853156544280bb7be78511d74139bf20b295022c0","title":"Geräte- und Netzwerksicherheit","path":"/de/security/1.0/device-and-network-security","children":[]},{"id":"ci_102c042ba8c4281ab85b3fe48d6a7f9663e848fc0f93edb6ced6506968974d73","title":"Prüfung und Überwachung","path":"/de/security/1.0/audit-and-monitoring","children":[]},{"id":"ci_4d57a680826e764bf5fcc3403640681fe438e7abddf463215cc769bc1076c0e5","title":"Reaktion auf Zwischenfälle und Wiederherstellung","path":"/de/security/1.0/incident-response-and-recovery","children":[]}]},{"id":"ci_74744ffd40a9d0cab8672c7fdfcb786363d48819482236804b8f8610ccd47e9b","title":"MyQ X und NIS2","path":"/de/security/1.0/myq-x-and-nis2","children":[]},{"id":"ci_c7e56465f600e4f4c8a7f0bc08b983da437f6b5cd0019204d8ac7220a2ac2224","title":"Software-Stückliste","path":"/de/security/1.0/software-bill-of-materials","children":[]}]