{"@context":"https:\/\/schema.org\/","@type":"CollectionPage","@id":"https:\/\/www.iwelt.de\/category\/hosting_domains\/#CollectionPage","headline":"Hosting &amp; Domains Category","description":"","url":"https:\/\/www.iwelt.de\/category\/hosting_domains\/","hasPart":[{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/nis-2-reform-strengere-pruefpflichten-fuer-de-domaininhaber\/","headline":"NIS-2-Reform: Strengere Pr\u00fcfpflichten f\u00fcr .de-Domaininhaber","url":"https:\/\/www.iwelt.de\/nis-2-reform-strengere-pruefpflichten-fuer-de-domaininhaber\/","datePublished":"2026-04-20","dateModified":"2026-04-28","mainEntityOfPage":"https:\/\/www.iwelt.de\/nis-2-reform-strengere-pruefpflichten-fuer-de-domaininhaber\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/domain-denic-nis2.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/domain-denic-nis2.png","height":720,"width":1280},"keywords":null},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/was-ist-eine-domain-der-umfassende-leitfaden-fuer-it-fachkraefte\/","headline":"Was ist eine Domain? Der umfassende Leitfaden f\u00fcr IT-Fachkr\u00e4fte","url":"https:\/\/www.iwelt.de\/was-ist-eine-domain-der-umfassende-leitfaden-fuer-it-fachkraefte\/","datePublished":"2026-03-30","dateModified":"2026-03-30","mainEntityOfPage":"https:\/\/www.iwelt.de\/was-ist-eine-domain-der-umfassende-leitfaden-fuer-it-fachkraefte\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/was-ist-eine-domain.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/was-ist-eine-domain.png","height":720,"width":1280},"keywords":["Domain"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/domain-kaufen-ihr-strategischer-leitfaden-fuer-eine-zukunftssichere-online-praesenz\/","headline":"Domain kaufen: Ihr strategischer Leitfaden f\u00fcr eine zukunftssichere Online-Pr\u00e4senz","url":"https:\/\/www.iwelt.de\/domain-kaufen-ihr-strategischer-leitfaden-fuer-eine-zukunftssichere-online-praesenz\/","datePublished":"2026-03-05","dateModified":"2026-03-05","mainEntityOfPage":"https:\/\/www.iwelt.de\/domain-kaufen-ihr-strategischer-leitfaden-fuer-eine-zukunftssichere-online-praesenz\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/domain-kaufen-leitfaden.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/domain-kaufen-leitfaden.png","height":720,"width":1280},"keywords":["Domain"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/die-zukunft-von-tls-zertifikaten-warum-47-tage-zertifikate-kommen-und-wie-sie-sich-darauf-vorbereiten\/","headline":"Die Zukunft von TLS-Zertifikaten: Warum 47-Tage-Zertifikate kommen und wie Sie sich darauf vorbereiten","url":"https:\/\/www.iwelt.de\/die-zukunft-von-tls-zertifikaten-warum-47-tage-zertifikate-kommen-und-wie-sie-sich-darauf-vorbereiten\/","datePublished":"2026-02-12","dateModified":"2026-02-13","mainEntityOfPage":"https:\/\/www.iwelt.de\/die-zukunft-von-tls-zertifikaten-warum-47-tage-zertifikate-kommen-und-wie-sie-sich-darauf-vorbereiten\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/tls-ssl-zertifikate-neu.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/tls-ssl-zertifikate-neu.png","height":720,"width":1280},"keywords":["Domain"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/premium-dns-warum-sich-ein-upgrade-wirklich-lohnt\/","headline":"Premium DNS \u2013 Warum sich ein Upgrade wirklich lohnt","url":"https:\/\/www.iwelt.de\/premium-dns-warum-sich-ein-upgrade-wirklich-lohnt\/","datePublished":"2025-10-10","dateModified":"2025-10-16","mainEntityOfPage":"https:\/\/www.iwelt.de\/premium-dns-warum-sich-ein-upgrade-wirklich-lohnt\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/#Person","name":"Sophia Sch\u00f6n","url":"https:\/\/www.iwelt.de\/author\/sophia-schoen\/","identifier":36,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/83f510b253ceae005f04583c147b74b937bd136a7e31078fd126a49c856ec9af?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/premium-dns.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/premium-dns.png","height":720,"width":1280},"keywords":["dns"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/vmware-fuer-kmu\/","headline":"Mit VMware zu einer flexiblen, skalierbaren und sicheren IT-Infrastruktur f\u00fcr KMU","url":"https:\/\/www.iwelt.de\/vmware-fuer-kmu\/","datePublished":"2025-02-10","dateModified":"2025-02-10","mainEntityOfPage":"https:\/\/www.iwelt.de\/vmware-fuer-kmu\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/VMware.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/VMware.png","height":800,"width":1200},"keywords":["Hosting","KMU","VMware"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/whois-data-reminder-was-ist-das\/","headline":"WHOIS Data Reminder erkl\u00e4rt: Alles, was Domain-Inhaber wissen m\u00fcssen","url":"https:\/\/www.iwelt.de\/whois-data-reminder-was-ist-das\/","datePublished":"2024-11-26","dateModified":"2024-11-28","mainEntityOfPage":"https:\/\/www.iwelt.de\/whois-data-reminder-was-ist-das\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/whois-data-reminder-1.png","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/whois-data-reminder-1.png","height":800,"width":1200},"keywords":["data reminder","WHOIS"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/virtual-server-wann-und-warum-sich-der-einsatz-auszahlt\/","headline":"Virtual Server: Wann und warum sich der Einsatz f\u00fcr Unternehmen auszahlt","url":"https:\/\/www.iwelt.de\/virtual-server-wann-und-warum-sich-der-einsatz-auszahlt\/","datePublished":"2024-10-07","dateModified":"2024-10-07","mainEntityOfPage":"https:\/\/www.iwelt.de\/virtual-server-wann-und-warum-sich-der-einsatz-auszahlt\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/virtual-server-wann-und-warum-sich-der-einsatz-auszahlt.jpg","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/virtual-server-wann-und-warum-sich-der-einsatz-auszahlt.jpg","height":800,"width":1200},"keywords":["virtual server"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/sicherheit-bei-dedicated-root-servern\/","headline":"Sicherheitsaspekte bei Dedicated Root Servern: Schutz vor DDoS, Malware und anderen Bedrohungen","url":"https:\/\/www.iwelt.de\/sicherheit-bei-dedicated-root-servern\/","datePublished":"2024-09-09","dateModified":"2024-09-06","mainEntityOfPage":"https:\/\/www.iwelt.de\/sicherheit-bei-dedicated-root-servern\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/sicherheitaspekte-dedicated-root-server.jpg","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/sicherheitaspekte-dedicated-root-server.jpg","height":800,"width":1200},"keywords":["Cybersecurity","dedicated root server"]},{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/die-wichtigsten-kriterien-bei-der-auswahl-eines-dedicated-root-servers\/","headline":"Die wichtigsten Kriterien bei der Auswahl eines Dedicated Root Servers","url":"https:\/\/www.iwelt.de\/die-wichtigsten-kriterien-bei-der-auswahl-eines-dedicated-root-servers\/","datePublished":"2024-09-02","dateModified":"2024-09-02","mainEntityOfPage":"https:\/\/www.iwelt.de\/die-wichtigsten-kriterien-bei-der-auswahl-eines-dedicated-root-servers\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/auswahl-dedicated-root-server-wuerzburg.jpg","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/auswahl-dedicated-root-server-wuerzburg.jpg","height":800,"width":1200},"keywords":["dedicated root server"]}]}