{"id":14785,"date":"2026-04-12T17:59:45","date_gmt":"2026-04-12T16:59:45","guid":{"rendered":"https:\/\/nextgen-workforce.ch\/cyber-security-soc\/"},"modified":"2026-04-13T10:44:50","modified_gmt":"2026-04-13T09:44:50","slug":"cyber-security-soc","status":"publish","type":"page","link":"https:\/\/nextgen-workforce.ch\/en\/cyber-security-soc\/","title":{"rendered":"Cyber Security &amp; SOC"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"14785\" class=\"elementor elementor-14785 elementor-14720\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65aa253 e-con-full e-flex e-con e-parent\" data-id=\"65aa253\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d300109 e-con-full e-flex e-con e-child\" data-id=\"d300109\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4aae492 e-con-full e-flex e-con e-child\" data-id=\"4aae492\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-a493ab8 e-con-full e-flex e-con e-child\" data-id=\"a493ab8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-fb39b14 e-con-full e-flex e-con e-child\" data-id=\"fb39b14\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-86f231a e-con-full e-flex e-con e-child\" data-id=\"86f231a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41dace5 elementor-widget-widescreen__width-initial elementor-invisible elementor-widget elementor-widget-aigency_heading\" data-id=\"41dace5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"aigency_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"aigency-heading-widget\"><h1 class=\"aigency-heading\"><span class=\"aigency-heading-content has_gradient_color_text\"><del>Cyber Security &amp; SOC<\/del> \u2013 Control, protection, and clear responsibility for your IT<\/span><\/h1><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07d6ae5 elementor-widget elementor-widget-text-editor\" data-id=\"07d6ae5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1263\" data-end=\"1482\"><a href=\"https:\/\/www.ncsc.admin.ch\">Cyber Security<\/a> &amp; SOC Switzerland is business-critical today \u2013 not optional.<br data-start=\"1323\" data-end=\"1326\">The decisive factor is not the number of tools used, but stable, controlled security operations with clear responsibility in everyday operations.<\/p><p data-start=\"1484\" data-end=\"1669\">We provide companies with <a href=\"https:\/\/nextgen-workforce.ch\/en\/model\/\">dedicated specialists<\/a> for Cyber Security &amp; SOC who integrate into existing teams and processes and actively support security operations.<\/p><p data-start=\"1671\" data-end=\"1859\">This does not create an external service, but a resilient security structure within your own company \u2013 with clear responsibilities, continuous control, and transparent processes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36bbf25 aigency-button-border-style-solid aigency-button-bakground-style-gradient elementor-widget__width-auto elementor-widget elementor-widget-aigency_button\" data-id=\"36bbf25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"button-widget\">\n            <div class=\"button-container\">\n                                <a class=\"aigency-button\" href=\"https:\/\/nextgen-workforce.ch\/en\/consulting\/\">Strengthen Cyber Security Targetedly                    <span class=\"icon-button-icon\"><\/span><span class=\"button-inner\"><\/span>\n                <\/a>\n                            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-09e7d2a e-con-full elementor-hidden-mobile_extra elementor-hidden-mobile e-flex elementor-invisible e-con e-child\" data-id=\"09e7d2a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;animation_delay&quot;:600}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d19cb9 aigency-video-button-alignment-right aigency-video-button-decoration-on elementor-absolute elementor-widget elementor-widget-aigency_video_button\" data-id=\"0d19cb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"aigency_video_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"aigency_video_button_container\">\n            <div class=\"aigency_video_button_widget\">\n                            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b67534b e-con-full e-flex e-con e-parent\" data-id=\"b67534b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-57c7c42 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"57c7c42\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c52b00e elementor-widget elementor-widget-aigency_heading\" data-id=\"c52b00e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"aigency-heading-widget\"><h3 class=\"aigency-heading\"><span class=\"aigency-heading-content has_gradient_color_text\">Operations &amp; Protection<\/span><\/h3><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b7b142 elementor-view-stacked elementor-shape-rounded aigency-icon-decoration-on aigency-icon-alignment-right elementor-absolute elementor-widget elementor-widget-icon\" data-id=\"4b7b142\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon elementor-animation-slide-aslant\" href=\"#\">\n\t\t\t<i aria-hidden=\"true\" class=\"fontello icon-button-icon\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c76ba64 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"c76ba64\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;animation_delay&quot;:600}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1cf61c4 elementor-widget elementor-widget-image\" data-id=\"1cf61c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"236\" height=\"172\" src=\"https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/Lines_blue.png\" class=\"attachment-large size-large wp-image-14675\" alt=\"Abstract blue tech pattern with lines \u2013 background for cloud and infrastructure design\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae22db9 elementor-widget elementor-widget-aigency_heading\" data-id=\"ae22db9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"aigency-heading-widget\"><h5 class=\"aigency-heading\"><span class=\"aigency-heading-content has_gradient_color_text\">Control &amp; Transparency<\/span><\/h5><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2b50ec elementor-widget elementor-widget-text-editor\" data-id=\"d2b50ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Continuous monitoring and clear visibility<br data-start=\"561\" data-end=\"564\">over your entire IT security situation<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c915174 elementor-view-stacked elementor-shape-rounded aigency-icon-decoration-on aigency-icon-alignment-right elementor-absolute elementor-widget elementor-widget-icon\" data-id=\"c915174\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon elementor-animation-slide-aslant\" href=\"#\">\n\t\t\t<i aria-hidden=\"true\" class=\"fontello icon-button-icon\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ff017c4 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"ff017c4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInDown&quot;,&quot;animation_delay&quot;:900}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b0de6c elementor-absolute elementor-view-default aigency-icon-alignment-center elementor-widget elementor-widget-icon\" data-id=\"1b0de6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 162 162\"><path d=\"M155.754 75.836H130.15C125.92 75.836 122.491 72.4302 122.491 68.2265V42.2098C122.491 38.1961 119.368 35.2566 115.403 34.9699C115.215 34.9526 115.024 34.9457 114.829 34.9457L88.7244 34.849C88.5435 34.849 87.2498 34.8525 86.7942 34.8421C83.4867 34.7834 80.9617 31.0045 80.9617 27.5538V7.26409C80.9617 5.53356 80.3775 3.93774 79.3967 2.6597C77.9986 0.832452 75.7867 0 73.3 0C59.131 0 45.4351 0.0207254 32.6608 6.68725C22.6132 11.9272 13.8489 19.7509 8.03392 29.4743C2.57364 38.6037 0 49.1147 0 59.6982C0 85.8807 16.7078 108.402 41.5538 116.844C52.2101 120.464 63.4749 119.849 74.5555 119.849C78.2699 119.849 80.9583 115.866 80.9583 112.284V90.6371C80.9583 85.2693 78.009 83.0276 73.2965 83.0276H60.6405C56.3835 83.0276 52.3944 81.8635 48.9652 79.836C42.0581 75.7635 37.4186 68.2127 37.4186 59.7017C37.4186 46.9662 47.8175 36.9837 60.6439 36.9837H73.2965C76.83 36.9837 80.6731 40.4931 80.6731 43.7296C80.6731 50.821 80.6627 63.9054 80.6627 70.6306C80.6627 76.7272 84.3666 78.2263 88.3488 78.2298H113.619C117.427 78.2298 120.544 81.3247 120.544 85.107V110.768C120.544 114.968 116.767 118.377 112.534 118.377H88.6166C84.384 118.377 80.7913 121.227 80.7913 125.987V155.8C80.7913 159.226 83.5876 162.003 87.0376 162.003H116.342C119.792 162.003 122.585 159.226 122.585 155.803V127.072C122.585 122.868 126.018 119.117 130.247 119.117H155.743C159.193 119.117 161.99 116.34 161.99 112.913V82.0466C161.99 78.6201 159.193 75.8429 155.743 75.8429L155.754 75.836Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d434c94 elementor-widget elementor-widget-aigency_heading\" data-id=\"d434c94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"aigency-heading-widget\"><h5 class=\"aigency-heading\"><span class=\"aigency-heading-content has_gradient_color_text\">Stability &amp; Availability<\/span><\/h5><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87f6c02 elementor-widget elementor-widget-text-editor\" data-id=\"87f6c02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Reliable operation with defined processes<br data-start=\"715\" data-end=\"718\">for maximum stability and availability<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-03b8afa e-flex e-con-boxed e-con e-child\" data-id=\"03b8afa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-adef224 e-con-full e-flex e-con e-child\" data-id=\"adef224\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-43fd10a elementor-widget-widescreen__width-initial elementor-invisible elementor-widget elementor-widget-aigency_heading\" data-id=\"43fd10a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"aigency_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"aigency-heading-widget\"><h1 class=\"aigency-heading\"><span class=\"aigency-heading-content has_gradient_color_text\"><del>Cyber Security<\/del> &amp; SOC Expertise<\/span><\/h1><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f65c474 elementor-widget-widescreen__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"f65c474\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1617\" data-end=\"1943\">We provide companies with dedicated specialists for <a href=\"https:\/\/www.ncsc.admin.ch\">Cyber Security<\/a> &amp; SOC who integrate into existing teams, processes, and security structures.<br data-start=\"1782\" data-end=\"1785\">The focus is not on an outsourced <a href=\"https:\/\/nextgen-workforce.ch\/en\/model\/\">security service<\/a>, but on qualified operational reinforcement with clear responsibilities in day-to-day business.<\/p><p data-start=\"1945\" data-end=\"2135\">This results in resilient security structures, greater continuity in operations, and additional capacity in areas such as monitoring, incident handling, identity security, and security platforms.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4de4b59 e-con-full e-grid e-con e-child\" data-id=\"4de4b59\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b83671b icon-position-bottom alignment-left elementor-invisible elementor-widget elementor-widget-aigency_icon_box\" data-id=\"b83671b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"aigency_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"aigency-icon-box-widget\">\n                        <div class=\"icon-box-item\">\n\n                <div class=\"icon-container background-type-none\">\n                    <span class=\"icon\"><\/span>                <\/div>\n\n                <div class=\"content-container\">\n                    <h5 class=\"icon-box-title\">Security Operations &amp; Monitoring<\/h5>\n\n                    <div class=\"icon-box-info\"><ul><li data-section-id=\"1xx5hg7\" data-start=\"2215\" data-end=\"2286\">Support in monitoring systems, identities, and access<\/li><li data-section-id=\"1g8pvq2\" data-start=\"2287\" data-end=\"2344\">Collaboration in existing SOC and security structures<\/li><li data-section-id=\"1pwzug\" data-start=\"2345\" data-end=\"2411\">Analysis of security-relevant events in operational business<\/li><li data-section-id=\"12x0ejy\" data-start=\"2412\" data-end=\"2474\">Reinforcement of internal teams for ongoing security tasks<\/li><\/ul><\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f53ca80 icon-position-bottom alignment-left elementor-invisible elementor-widget elementor-widget-aigency_icon_box\" data-id=\"f53ca80\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:500}\" data-widget_type=\"aigency_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"aigency-icon-box-widget\">\n                        <div class=\"icon-box-item\">\n\n                <div class=\"icon-container background-type-none\">\n                    <span class=\"icon\"><\/span>                <\/div>\n\n                <div class=\"content-container\">\n                    <h5 class=\"icon-box-title\">Incident Handling &amp; Analysis<\/h5>\n\n                    <div class=\"icon-box-info\"><ul><li data-section-id=\"yawlg2\" data-start=\"2508\" data-end=\"2578\">Support in the detection and assessment of security incidents<\/li><li data-section-id=\"a3nchg\" data-start=\"2579\" data-end=\"2641\">Collaboration in prioritization, escalation, and follow-up<\/li><li data-section-id=\"189mkm5\" data-start=\"2642\" data-end=\"2699\">Structured analysis of anomalies and risks<\/li><li data-section-id=\"6pfhdl\" data-start=\"2700\" data-end=\"2763\">Traceable documentation within the existing process model<\/li><\/ul><\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90938db icon-position-bottom alignment-left elementor-invisible elementor-widget elementor-widget-aigency_icon_box\" data-id=\"90938db\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:700}\" data-widget_type=\"aigency_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"aigency-icon-box-widget\">\n                        <div class=\"icon-box-item\">\n\n                <div class=\"icon-container background-type-none\">\n                    <span class=\"icon\"><\/span>                <\/div>\n\n                <div class=\"content-container\">\n                    <h5 class=\"icon-box-title\">Identity &amp; Access Security<\/h5>\n\n                    <div class=\"icon-box-info\"><ul><li data-section-id=\"fwwmcw\" data-start=\"2796\" data-end=\"2862\">Support in Identity &amp; Access Management (IAM \/ Entra ID)<\/li><li data-section-id=\"1j70nq2\" data-start=\"2863\" data-end=\"2918\">Collaboration on Zero Trust-related security concepts<\/li><li data-section-id=\"11wd90s\" data-start=\"2919\" data-end=\"2968\">Securing user and system access<\/li><li data-section-id=\"1vfxzrz\" data-start=\"2969\" data-end=\"3030\">Reduction of attack surfaces through clear access models<\/li><\/ul><\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d1050f icon-position-bottom alignment-left elementor-invisible elementor-widget elementor-widget-aigency_icon_box\" data-id=\"1d1050f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:900}\" data-widget_type=\"aigency_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"aigency-icon-box-widget\">\n                        <div class=\"icon-box-item\">\n\n                <div class=\"icon-container background-type-none\">\n                    <span class=\"icon\"><\/span>                <\/div>\n\n                <div class=\"content-container\">\n                    <h5 class=\"icon-box-title\">Security Platforms &amp; Technologies<\/h5>\n\n                    <div class=\"icon-box-info\"><ul><li data-section-id=\"lwncgl\" data-start=\"3072\" data-end=\"3131\">Experience with Microsoft Defender, Sentinel, and Entra ID<\/li><li data-section-id=\"11lz030\" data-start=\"3132\" data-end=\"3190\">Collaboration in existing security and IT landscapes<\/li><li data-section-id=\"1lop985\" data-start=\"3191\" data-end=\"3253\">Support for further development and operational use<\/li><li data-section-id=\"19q034\" data-start=\"3254\" data-end=\"3322\">Integration into existing security and governance structures<\/li><\/ul><\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-20c04cb e-con-full e-flex e-con e-parent\" data-id=\"20c04cb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-964d92a e-con-full e-flex e-con e-child\" data-id=\"964d92a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-01bc8f4 elementor-widget elementor-widget-aigency_special_text\" data-id=\"01bc8f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_special_text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"special-text-wrapper\"><div class=\"special-text special-text-effect-fill\"> Cyber<br>Security<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4fa8bce e-con-full e-flex e-con e-parent\" data-id=\"4fa8bce\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0141abc e-con-full e-flex e-con e-child\" data-id=\"0141abc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5190ea5 e-con-full e-flex e-con e-child\" data-id=\"5190ea5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-f7a01f2 e-con-full e-flex e-con e-child\" data-id=\"f7a01f2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-a095bde e-con-full e-flex e-con e-child\" data-id=\"a095bde\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5e92f39 e-con-full e-flex e-con e-child\" data-id=\"5e92f39\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b3b5ce0 elementor-widget-widescreen__width-initial elementor-invisible elementor-widget elementor-widget-aigency_heading\" data-id=\"b3b5ce0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"aigency_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"aigency-heading-widget\"><h1 class=\"aigency-heading\"><span class=\"aigency-heading-content has_gradient_color_text\"><del>Results<\/del> for your company<\/span><\/h1><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-127ba57 elementor-widget elementor-widget-text-editor\" data-id=\"127ba57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1216\" data-end=\"1416\">Cyber Security &amp; SOC unfold their full value not through individual tools or isolated measures, but through stable, continuously operated security operations in everyday business.<\/p><p data-start=\"1418\" data-end=\"1673\">Through dedicated, <a href=\"https:\/\/nextgen-workforce.ch\/en\/your-services\/\">integrated security specialists<\/a>, clear responsibilities, structured processes, and a resilient security organization are created within your company \u2013 not as an external service, but as an integral part of your IT.<\/p><p data-start=\"1675\" data-end=\"1849\">Risks are identified early, incidents are managed in a targeted manner, and decisions are made based on transparent data \u2013 instead of reacting reactively to security problems.<\/p><p data-start=\"1851\" data-end=\"1981\">The result is a controllable security situation, higher transparency, and stable Cyber Security &amp; SOC operations for companies in Switzerland at an enterprise level.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1200f7f icon-position-left alignment-left elementor-widget-mobile__width-initial v-alignment-top elementor-widget elementor-widget-aigency_icon_box\" data-id=\"1200f7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"aigency-icon-box-widget\">\n                        <div class=\"icon-box-item\">\n\n                <div class=\"icon-container background-type-none\">\n                    <span class=\"icon\"><svg viewBox=\"0 0 20 20\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M5.67 0H14.34C17.73 0 20 2.38 20 5.92V14.091C20 17.62 17.73 20 14.34 20H5.67C2.28 20 0 17.62 0 14.091V5.92C0 2.38 2.28 0 5.67 0ZM9.43 12.99L14.18 8.24C14.52 7.9 14.52 7.35 14.18 7C13.84 6.66 13.28 6.66 12.94 7L8.81 11.13L7.06 9.38C6.72 9.04 6.16 9.04 5.82 9.38C5.48 9.72 5.48 10.27 5.82 10.62L8.2 12.99C8.37 13.16 8.59 13.24 8.81 13.24C9.04 13.24 9.26 13.16 9.43 12.99Z\"\/>\n<\/svg><\/span>                <\/div>\n\n                <div class=\"content-container\">\n                    <h5 class=\"icon-box-title\">Reduced risk of security incidents and operational downtime<\/h5>\n\n                    \n                <\/div>\n            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8dd345a icon-position-left alignment-left elementor-widget-mobile__width-initial v-alignment-top elementor-widget elementor-widget-aigency_icon_box\" data-id=\"8dd345a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"aigency-icon-box-widget\">\n                        <div class=\"icon-box-item\">\n\n                <div class=\"icon-container background-type-none\">\n                    <span class=\"icon\"><svg viewBox=\"0 0 20 20\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M5.67 0H14.34C17.73 0 20 2.38 20 5.92V14.091C20 17.62 17.73 20 14.34 20H5.67C2.28 20 0 17.62 0 14.091V5.92C0 2.38 2.28 0 5.67 0ZM9.43 12.99L14.18 8.24C14.52 7.9 14.52 7.35 14.18 7C13.84 6.66 13.28 6.66 12.94 7L8.81 11.13L7.06 9.38C6.72 9.04 6.16 9.04 5.82 9.38C5.48 9.72 5.48 10.27 5.82 10.62L8.2 12.99C8.37 13.16 8.59 13.24 8.81 13.24C9.04 13.24 9.26 13.16 9.43 12.99Z\"\/>\n<\/svg><\/span>                <\/div>\n\n                <div class=\"content-container\">\n                    <h5 class=\"icon-box-title\">Early detection of attacks and targeted, structured response<\/h5>\n\n                    \n                <\/div>\n            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bb7681 icon-position-left alignment-left elementor-widget-mobile__width-initial v-alignment-top elementor-widget elementor-widget-aigency_icon_box\" data-id=\"0bb7681\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"aigency-icon-box-widget\">\n                        <div class=\"icon-box-item\">\n\n                <div class=\"icon-container background-type-none\">\n                    <span class=\"icon\"><svg viewBox=\"0 0 20 20\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M5.67 0H14.34C17.73 0 20 2.38 20 5.92V14.091C20 17.62 17.73 20 14.34 20H5.67C2.28 20 0 17.62 0 14.091V5.92C0 2.38 2.28 0 5.67 0ZM9.43 12.99L14.18 8.24C14.52 7.9 14.52 7.35 14.18 7C13.84 6.66 13.28 6.66 12.94 7L8.81 11.13L7.06 9.38C6.72 9.04 6.16 9.04 5.82 9.38C5.48 9.72 5.48 10.27 5.82 10.62L8.2 12.99C8.37 13.16 8.59 13.24 8.81 13.24C9.04 13.24 9.26 13.16 9.43 12.99Z\"\/>\n<\/svg><\/span>                <\/div>\n\n                <div class=\"content-container\">\n                    <h5 class=\"icon-box-title\">Transparency over the entire IT security situation and relevant risks<\/h5>\n\n                    \n                <\/div>\n            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a96186 icon-position-left alignment-left elementor-widget-mobile__width-initial v-alignment-top elementor-widget elementor-widget-aigency_icon_box\" data-id=\"0a96186\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"aigency-icon-box-widget\">\n                        <div class=\"icon-box-item\">\n\n                <div class=\"icon-container background-type-none\">\n                    <span class=\"icon\"><svg viewBox=\"0 0 20 20\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M5.67 0H14.34C17.73 0 20 2.38 20 5.92V14.091C20 17.62 17.73 20 14.34 20H5.67C2.28 20 0 17.62 0 14.091V5.92C0 2.38 2.28 0 5.67 0ZM9.43 12.99L14.18 8.24C14.52 7.9 14.52 7.35 14.18 7C13.84 6.66 13.28 6.66 12.94 7L8.81 11.13L7.06 9.38C6.72 9.04 6.16 9.04 5.82 9.38C5.48 9.72 5.48 10.27 5.82 10.62L8.2 12.99C8.37 13.16 8.59 13.24 8.81 13.24C9.04 13.24 9.26 13.16 9.43 12.99Z\"\/>\n<\/svg><\/span>                <\/div>\n\n                <div class=\"content-container\">\n                    <h5 class=\"icon-box-title\">Clear responsibilities in ongoing security operations<\/h5>\n\n                    \n                <\/div>\n            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8116a7a icon-position-left alignment-left elementor-widget-mobile__width-initial v-alignment-top elementor-widget elementor-widget-aigency_icon_box\" data-id=\"8116a7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"aigency-icon-box-widget\">\n                        <div class=\"icon-box-item\">\n\n                <div class=\"icon-container background-type-none\">\n                    <span class=\"icon\"><svg viewBox=\"0 0 20 20\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M5.67 0H14.34C17.73 0 20 2.38 20 5.92V14.091C20 17.62 17.73 20 14.34 20H5.67C2.28 20 0 17.62 0 14.091V5.92C0 2.38 2.28 0 5.67 0ZM9.43 12.99L14.18 8.24C14.52 7.9 14.52 7.35 14.18 7C13.84 6.66 13.28 6.66 12.94 7L8.81 11.13L7.06 9.38C6.72 9.04 6.16 9.04 5.82 9.38C5.48 9.72 5.48 10.27 5.82 10.62L8.2 12.99C8.37 13.16 8.59 13.24 8.81 13.24C9.04 13.24 9.26 13.16 9.43 12.99Z\"\/>\n<\/svg><\/span>                <\/div>\n\n                <div class=\"content-container\">\n                    <h5 class=\"icon-box-title\">Traceable processes instead of isolated individual measures<\/h5>\n\n                    \n                <\/div>\n            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99bc2f1 icon-position-left alignment-left elementor-widget-mobile__width-initial v-alignment-top elementor-widget elementor-widget-aigency_icon_box\" data-id=\"99bc2f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"aigency-icon-box-widget\">\n                        <div class=\"icon-box-item\">\n\n                <div class=\"icon-container background-type-none\">\n                    <span class=\"icon\"><svg viewBox=\"0 0 20 20\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M5.67 0H14.34C17.73 0 20 2.38 20 5.92V14.091C20 17.62 17.73 20 14.34 20H5.67C2.28 20 0 17.62 0 14.091V5.92C0 2.38 2.28 0 5.67 0ZM9.43 12.99L14.18 8.24C14.52 7.9 14.52 7.35 14.18 7C13.84 6.66 13.28 6.66 12.94 7L8.81 11.13L7.06 9.38C6.72 9.04 6.16 9.04 5.82 9.38C5.48 9.72 5.48 10.27 5.82 10.62L8.2 12.99C8.37 13.16 8.59 13.24 8.81 13.24C9.04 13.24 9.26 13.16 9.43 12.99Z\"\/>\n<\/svg><\/span>                <\/div>\n\n                <div class=\"content-container\">\n                    <h5 class=\"icon-box-title\">Stable, continuous security operations at an enterprise level<\/h5>\n\n                    \n                <\/div>\n            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-09fb5f7 e-con-full elementor-hidden-mobile_extra elementor-hidden-mobile e-flex elementor-invisible e-con e-child\" data-id=\"09fb5f7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;,&quot;animation_delay&quot;:600}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b4c29b9 aigency-video-button-alignment-right aigency-video-button-decoration-on elementor-absolute elementor-widget elementor-widget-aigency_video_button\" data-id=\"b4c29b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"aigency_video_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"aigency_video_button_container\">\n            <div class=\"aigency_video_button_widget\">\n                            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c7ab526 e-flex e-con-boxed e-con e-parent\" data-id=\"c7ab526\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5801dcf e-con-full e-flex e-con e-child\" data-id=\"5801dcf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-015539a e-con-full e-flex e-con e-child\" data-id=\"015539a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-bca21fd e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"bca21fd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-110a006 elementor-widget elementor-widget-image\" data-id=\"110a006\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/cyber-threat-detection-analyse.png\" class=\"attachment-large size-large wp-image-14791\" alt=\"Digital identity verification with access control and multi-factor authentication\" srcset=\"https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/cyber-threat-detection-analyse.png 1024w, https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/cyber-threat-detection-analyse-300x300.png 300w, https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/cyber-threat-detection-analyse-150x150.png 150w, https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/cyber-threat-detection-analyse-768x768.png 768w, https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/cyber-threat-detection-analyse-960x960.png 960w, https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/cyber-threat-detection-analyse-640x640.png 640w, https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/cyber-threat-detection-analyse-500x500.png 500w, https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/cyber-threat-detection-analyse-384x384.png 384w, https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/cyber-threat-detection-analyse-320x320.png 320w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0b41aa aigency-video-button-alignment-right aigency-video-button-decoration-on elementor-absolute elementor-widget elementor-widget-aigency_video_button\" data-id=\"e0b41aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"aigency_video_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"aigency_video_button_container\">\n            <div class=\"aigency_video_button_widget\">\n                            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e419ddd e-con-full e-flex e-con e-child\" data-id=\"e419ddd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6839dc elementor-invisible elementor-widget elementor-widget-aigency_heading\" data-id=\"e6839dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;aigency_heading_animation&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"aigency_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"aigency-heading-widget\"><h2 class=\"aigency-heading\"><span class=\"aigency-subheading\">Services<\/span><span class=\"aigency-heading-content has_gradient_color_text\">For which companies Cyber Security &amp; SOC Switzerland is relevant<\/span><\/h2><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33dda64 elementor-widget elementor-widget-heading\" data-id=\"33dda64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Cyber Security &amp; SOC Switzerland becomes critical when security can no longer be treated selectively but must function as a stable, continuous part of operational IT operations.\n\nCompanies in this environment face a clear challenge:\nEither security remains fragmented and reactive \u2013 or it is operated structurally, with clear responsibilities and dedicated specialists in your own team.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d3e0c9e e-con-full e-flex e-con e-child\" data-id=\"d3e0c9e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-30484b6 icon-position-left alignment-left v-alignment-top elementor-widget elementor-widget-aigency_icon_box\" data-id=\"30484b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"aigency-icon-box-widget\">\n                        <div class=\"icon-box-item\">\n\n                <div class=\"icon-container background-type-none\">\n                    <span class=\"icon\"><svg viewBox=\"0 0 20 20\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M5.67 0H14.34C17.73 0 20 2.38 20 5.92V14.091C20 17.62 17.73 20 14.34 20H5.67C2.28 20 0 17.62 0 14.091V5.92C0 2.38 2.28 0 5.67 0ZM9.43 12.99L14.18 8.24C14.52 7.9 14.52 7.35 14.18 7C13.84 6.66 13.28 6.66 12.94 7L8.81 11.13L7.06 9.38C6.72 9.04 6.16 9.04 5.82 9.38C5.48 9.72 5.48 10.27 5.82 10.62L8.2 12.99C8.37 13.16 8.59 13.24 8.81 13.24C9.04 13.24 9.26 13.16 9.43 12.99Z\"\/>\n<\/svg><\/span>                <\/div>\n\n                <div class=\"content-container\">\n                    <h5 class=\"icon-box-title\">Companies with increasing requirements for Cyber Security and Compliance (ISO 27001, NIST, FINMA)<\/h5>\n\n                    \n                <\/div>\n            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c00ec1 icon-position-left alignment-left v-alignment-top elementor-widget elementor-widget-aigency_icon_box\" data-id=\"2c00ec1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"aigency-icon-box-widget\">\n                        <div class=\"icon-box-item\">\n\n                <div class=\"icon-container background-type-none\">\n                    <span class=\"icon\"><svg viewBox=\"0 0 20 20\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M5.67 0H14.34C17.73 0 20 2.38 20 5.92V14.091C20 17.62 17.73 20 14.34 20H5.67C2.28 20 0 17.62 0 14.091V5.92C0 2.38 2.28 0 5.67 0ZM9.43 12.99L14.18 8.24C14.52 7.9 14.52 7.35 14.18 7C13.84 6.66 13.28 6.66 12.94 7L8.81 11.13L7.06 9.38C6.72 9.04 6.16 9.04 5.82 9.38C5.48 9.72 5.48 10.27 5.82 10.62L8.2 12.99C8.37 13.16 8.59 13.24 8.81 13.24C9.04 13.24 9.26 13.16 9.43 12.99Z\"\/>\n<\/svg><\/span>                <\/div>\n\n                <div class=\"content-container\">\n                    <h5 class=\"icon-box-title\">Organizations with Microsoft Cloud (M365, Azure, Entra ID) and growing complexity<\/h5>\n\n                    \n                <\/div>\n            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b6a9aa icon-position-left alignment-left v-alignment-top elementor-widget elementor-widget-aigency_icon_box\" data-id=\"0b6a9aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"aigency-icon-box-widget\">\n                        <div class=\"icon-box-item\">\n\n                <div class=\"icon-container background-type-none\">\n                    <span class=\"icon\"><svg viewBox=\"0 0 20 20\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M5.67 0H14.34C17.73 0 20 2.38 20 5.92V14.091C20 17.62 17.73 20 14.34 20H5.67C2.28 20 0 17.62 0 14.091V5.92C0 2.38 2.28 0 5.67 0ZM9.43 12.99L14.18 8.24C14.52 7.9 14.52 7.35 14.18 7C13.84 6.66 13.28 6.66 12.94 7L8.81 11.13L7.06 9.38C6.72 9.04 6.16 9.04 5.82 9.38C5.48 9.72 5.48 10.27 5.82 10.62L8.2 12.99C8.37 13.16 8.59 13.24 8.81 13.24C9.04 13.24 9.26 13.16 9.43 12.99Z\"\/>\n<\/svg><\/span>                <\/div>\n\n                <div class=\"content-container\">\n                    <h5 class=\"icon-box-title\">Companies without continuous transparency over their IT security situation<\/h5>\n\n                    \n                <\/div>\n            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12d1962 icon-position-left alignment-left v-alignment-top elementor-widget elementor-widget-aigency_icon_box\" data-id=\"12d1962\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"aigency-icon-box-widget\">\n                        <div class=\"icon-box-item\">\n\n                <div class=\"icon-container background-type-none\">\n                    <span class=\"icon\"><svg viewBox=\"0 0 20 20\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M5.67 0H14.34C17.73 0 20 2.38 20 5.92V14.091C20 17.62 17.73 20 14.34 20H5.67C2.28 20 0 17.62 0 14.091V5.92C0 2.38 2.28 0 5.67 0ZM9.43 12.99L14.18 8.24C14.52 7.9 14.52 7.35 14.18 7C13.84 6.66 13.28 6.66 12.94 7L8.81 11.13L7.06 9.38C6.72 9.04 6.16 9.04 5.82 9.38C5.48 9.72 5.48 10.27 5.82 10.62L8.2 12.99C8.37 13.16 8.59 13.24 8.81 13.24C9.04 13.24 9.26 13.16 9.43 12.99Z\"\/>\n<\/svg><\/span>                <\/div>\n\n                <div class=\"content-container\">\n                    <h5 class=\"icon-box-title\">Companies with increased risk due to distributed systems, users, and access<\/h5>\n\n                    \n                <\/div>\n            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bda4881 icon-position-left alignment-left v-alignment-top elementor-widget elementor-widget-aigency_icon_box\" data-id=\"bda4881\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"aigency-icon-box-widget\">\n                        <div class=\"icon-box-item\">\n\n                <div class=\"icon-container background-type-none\">\n                    <span class=\"icon\"><svg viewBox=\"0 0 20 20\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M5.67 0H14.34C17.73 0 20 2.38 20 5.92V14.091C20 17.62 17.73 20 14.34 20H5.67C2.28 20 0 17.62 0 14.091V5.92C0 2.38 2.28 0 5.67 0ZM9.43 12.99L14.18 8.24C14.52 7.9 14.52 7.35 14.18 7C13.84 6.66 13.28 6.66 12.94 7L8.81 11.13L7.06 9.38C6.72 9.04 6.16 9.04 5.82 9.38C5.48 9.72 5.48 10.27 5.82 10.62L8.2 12.99C8.37 13.16 8.59 13.24 8.81 13.24C9.04 13.24 9.26 13.16 9.43 12.99Z\"\/>\n<\/svg><\/span>                <\/div>\n\n                <div class=\"content-container\">\n                    <h5 class=\"icon-box-title\">IT departments in need of operational relief and clear security structures<\/h5>\n\n                    \n                <\/div>\n            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05f3c5c icon-position-left alignment-left v-alignment-top elementor-widget elementor-widget-aigency_icon_box\" data-id=\"05f3c5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"aigency-icon-box-widget\">\n                        <div class=\"icon-box-item\">\n\n                <div class=\"icon-container background-type-none\">\n                    <span class=\"icon\"><svg viewBox=\"0 0 20 20\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M5.67 0H14.34C17.73 0 20 2.38 20 5.92V14.091C20 17.62 17.73 20 14.34 20H5.67C2.28 20 0 17.62 0 14.091V5.92C0 2.38 2.28 0 5.67 0ZM9.43 12.99L14.18 8.24C14.52 7.9 14.52 7.35 14.18 7C13.84 6.66 13.28 6.66 12.94 7L8.81 11.13L7.06 9.38C6.72 9.04 6.16 9.04 5.82 9.38C5.48 9.72 5.48 10.27 5.82 10.62L8.2 12.99C8.37 13.16 8.59 13.24 8.81 13.24C9.04 13.24 9.26 13.16 9.43 12.99Z\"\/>\n<\/svg><\/span>                <\/div>\n\n                <div class=\"content-container\">\n                    <h5 class=\"icon-box-title\">Organizations that want to evolve security from a side task to a clear responsibility function<\/h5>\n\n                    \n                <\/div>\n            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-090d9a8 elementor-widget elementor-widget-heading\" data-id=\"090d9a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">The decisive difference lies not in further tools or external individual services, but in the ability to operate Cyber Security &amp; SOC structurally within your own company.\n\nWith dedicated specialists, clearly defined responsibilities, and integrated processes, stable security operations are created that make risks controllable and are sustainable in the long term.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91ce67d aigency-button-bakground-style-gradient aigency-button-border-style-gradient elementor-widget elementor-widget-aigency_button\" data-id=\"91ce67d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aigency_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"button-widget\">\n            <div class=\"button-container\">\n                                <a class=\"aigency-button\" href=\"https:\/\/nextgen-workforce.ch\/en\/model\/\">Build Security Structure                    <span class=\"icon-button-icon\"><\/span><span class=\"button-inner\"><\/span>\n                <\/a>\n                            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Security &amp; SOC Switzerland is business-critical today \u2013 not optional.The decisive factor is not the number of tools used, but stable, controlled security operations with clear responsibility in everyday operations. We provide companies with dedicated specialists for Cyber Security &amp;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":14787,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-14785","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security &amp; SOC Switzerland \u2013 Dedicated Specialists<\/title>\n<meta name=\"description\" content=\"Cyber Security &amp; SOC Switzerland with integrated specialists instead of external services. Stable security operations for companies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nextgen-workforce.ch\/en\/cyber-security-soc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security &amp; SOC Switzerland \u2013 Dedicated Specialists\" \/>\n<meta property=\"og:description\" content=\"Cyber Security &amp; SOC Switzerland with integrated specialists instead of external services. Stable security operations for companies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nextgen-workforce.ch\/en\/cyber-security-soc\/\" \/>\n<meta property=\"og:site_name\" content=\"NextGen WorkForce\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T09:44:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/cyber-security-governance-control-core-300x300.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cyber Security &amp; SOC Switzerland \u2013 Dedicated Specialists\" \/>\n<meta name=\"twitter:description\" content=\"Cyber Security &amp; SOC Switzerland with integrated specialists instead of external services. Stable security operations for companies.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/cyber-security-governance-control-core.png\" \/>\n<meta name=\"twitter:site\" content=\"@nextgenWor\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/cyber-security-soc\\\/\",\"url\":\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/cyber-security-soc\\\/\",\"name\":\"Cyber Security & SOC Switzerland \u2013 Dedicated Specialists\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/cyber-security-soc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/cyber-security-soc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nextgen-workforce.ch\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/cyber-security-governance-control-core.png\",\"datePublished\":\"2026-04-12T16:59:45+00:00\",\"dateModified\":\"2026-04-13T09:44:50+00:00\",\"description\":\"Cyber Security & SOC Switzerland with integrated specialists instead of external services. Stable security operations for companies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/cyber-security-soc\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/cyber-security-soc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/cyber-security-soc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nextgen-workforce.ch\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/cyber-security-governance-control-core.png\",\"contentUrl\":\"https:\\\/\\\/nextgen-workforce.ch\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/cyber-security-governance-control-core.png\",\"width\":1024,\"height\":1024,\"caption\":\"Zero Trust architecture with secure access controls and network segmentation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/cyber-security-soc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Start\",\"item\":\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/home-3\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security &amp; SOC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/\",\"name\":\"NextGen Workforce\",\"description\":\"Nearshoring f\u00fcr Schweizer Unternehmen \u2013 dedizierte IT-Teams aus Portugal unter Schweizer F\u00fchrung\",\"publisher\":{\"@id\":\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/#organization\"},\"alternateName\":\"NextGen\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/#organization\",\"name\":\"NextGen Workforce\",\"alternateName\":\"NextGen\",\"url\":\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nextgen-workforce.ch\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/nextgen-workforce-logo.png\",\"contentUrl\":\"https:\\\/\\\/nextgen-workforce.ch\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/nextgen-workforce-logo.png\",\"width\":1024,\"height\":1024,\"caption\":\"NextGen Workforce\"},\"image\":{\"@id\":\"https:\\\/\\\/nextgen-workforce.ch\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/nextgenWor\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/nextgen-workforce\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security & SOC Switzerland \u2013 Dedicated Specialists","description":"Cyber Security & SOC Switzerland with integrated specialists instead of external services. Stable security operations for companies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nextgen-workforce.ch\/en\/cyber-security-soc\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security & SOC Switzerland \u2013 Dedicated Specialists","og_description":"Cyber Security & SOC Switzerland with integrated specialists instead of external services. Stable security operations for companies.","og_url":"https:\/\/nextgen-workforce.ch\/en\/cyber-security-soc\/","og_site_name":"NextGen WorkForce","article_modified_time":"2026-04-13T09:44:50+00:00","og_image":[{"url":"https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/cyber-security-governance-control-core-300x300.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_title":"Cyber Security & SOC Switzerland \u2013 Dedicated Specialists","twitter_description":"Cyber Security & SOC Switzerland with integrated specialists instead of external services. Stable security operations for companies.","twitter_image":"https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/cyber-security-governance-control-core.png","twitter_site":"@nextgenWor","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/nextgen-workforce.ch\/en\/cyber-security-soc\/","url":"https:\/\/nextgen-workforce.ch\/en\/cyber-security-soc\/","name":"Cyber Security & SOC Switzerland \u2013 Dedicated Specialists","isPartOf":{"@id":"https:\/\/nextgen-workforce.ch\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nextgen-workforce.ch\/en\/cyber-security-soc\/#primaryimage"},"image":{"@id":"https:\/\/nextgen-workforce.ch\/en\/cyber-security-soc\/#primaryimage"},"thumbnailUrl":"https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/cyber-security-governance-control-core.png","datePublished":"2026-04-12T16:59:45+00:00","dateModified":"2026-04-13T09:44:50+00:00","description":"Cyber Security & SOC Switzerland with integrated specialists instead of external services. Stable security operations for companies.","breadcrumb":{"@id":"https:\/\/nextgen-workforce.ch\/en\/cyber-security-soc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nextgen-workforce.ch\/en\/cyber-security-soc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nextgen-workforce.ch\/en\/cyber-security-soc\/#primaryimage","url":"https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/cyber-security-governance-control-core.png","contentUrl":"https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/04\/cyber-security-governance-control-core.png","width":1024,"height":1024,"caption":"Zero Trust architecture with secure access controls and network segmentation"},{"@type":"BreadcrumbList","@id":"https:\/\/nextgen-workforce.ch\/en\/cyber-security-soc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Start","item":"https:\/\/nextgen-workforce.ch\/en\/home-3\/"},{"@type":"ListItem","position":2,"name":"Cyber Security &amp; SOC"}]},{"@type":"WebSite","@id":"https:\/\/nextgen-workforce.ch\/en\/#website","url":"https:\/\/nextgen-workforce.ch\/en\/","name":"NextGen Workforce","description":"Nearshoring f\u00fcr Schweizer Unternehmen \u2013 dedizierte IT-Teams aus Portugal unter Schweizer F\u00fchrung","publisher":{"@id":"https:\/\/nextgen-workforce.ch\/en\/#organization"},"alternateName":"NextGen","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nextgen-workforce.ch\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nextgen-workforce.ch\/en\/#organization","name":"NextGen Workforce","alternateName":"NextGen","url":"https:\/\/nextgen-workforce.ch\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nextgen-workforce.ch\/en\/#\/schema\/logo\/image\/","url":"https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/03\/nextgen-workforce-logo.png","contentUrl":"https:\/\/nextgen-workforce.ch\/wp-content\/uploads\/2026\/03\/nextgen-workforce-logo.png","width":1024,"height":1024,"caption":"NextGen Workforce"},"image":{"@id":"https:\/\/nextgen-workforce.ch\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/nextgenWor","https:\/\/www.linkedin.com\/in\/nextgen-workforce\/"]}]}},"_links":{"self":[{"href":"https:\/\/nextgen-workforce.ch\/en\/wp-json\/wp\/v2\/pages\/14785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nextgen-workforce.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nextgen-workforce.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nextgen-workforce.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nextgen-workforce.ch\/en\/wp-json\/wp\/v2\/comments?post=14785"}],"version-history":[{"count":2,"href":"https:\/\/nextgen-workforce.ch\/en\/wp-json\/wp\/v2\/pages\/14785\/revisions"}],"predecessor-version":[{"id":14793,"href":"https:\/\/nextgen-workforce.ch\/en\/wp-json\/wp\/v2\/pages\/14785\/revisions\/14793"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nextgen-workforce.ch\/en\/wp-json\/wp\/v2\/media\/14787"}],"wp:attachment":[{"href":"https:\/\/nextgen-workforce.ch\/en\/wp-json\/wp\/v2\/media?parent=14785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}