{"@context":"https:\/\/schema.org\/","@type":"CollectionPage","@id":"https:\/\/www.iwelt.de\/tag\/sase\/#CollectionPage","headline":"SASE Tag","description":"","url":"https:\/\/www.iwelt.de\/tag\/sase\/","hasPart":[{"@type":"BlogPosting","@id":"https:\/\/www.iwelt.de\/it-security-trends\/","headline":"Webinar: IT-Security Trends (27.10.2022)","url":"https:\/\/www.iwelt.de\/it-security-trends\/","datePublished":"2022-10-13","dateModified":"2023-02-16","mainEntityOfPage":"https:\/\/www.iwelt.de\/it-security-trends\/","author":{"@type":"Person","@id":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/#Person","name":"Johanna","url":"https:\/\/www.iwelt.de\/author\/johanna-baumgart\/","identifier":32,"description":"Marketing-Managerin bei krick.com","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a07826e4c0329dd425602f91f38f50276a8aedcb54462641d15b01f8458bc0cf?s=96&d=mm&r=g","height":96,"width":96}},"publisher":null,"image":{"@type":"ImageObject","@id":"https:\/\/www.iwelt.de\/wp-content\/uploads\/Webinar_IT_Security_Trends_1664_1109_Blog.jpeg","url":"https:\/\/www.iwelt.de\/wp-content\/uploads\/Webinar_IT_Security_Trends_1664_1109_Blog.jpeg","height":1109,"width":1664},"keywords":["Cybersecurity","IT-Infrastruktur","IT-Security","IT-Sicherheit","IT-Trends","SASE","Secure Access Service Edge\"","Zero Trust","ZTNA"]}]}