{"id":13752,"date":"2026-03-03T16:52:55","date_gmt":"2026-03-03T15:52:55","guid":{"rendered":"https:\/\/dach.tdsynnex.com\/security-hub\/?page_id=13752"},"modified":"2026-03-04T16:44:23","modified_gmt":"2026-03-04T15:44:23","slug":"ibm","status":"publish","type":"page","link":"https:\/\/dach.tdsynnex.com\/security-hub\/ibm\/","title":{"rendered":"IBM"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_section full_width=&#8220;stretch_row_content&#8220; content_placement=&#8220;middle&#8220; pix_bg_grdient=&#8220;bg-gradient-primary&#8220; fade_in_opacity=&#8220;pix-opacity-9&#8243; pix_over_visibility=&#8220;&#8220; pix_overlay_color=&#8220;gradient-primary&#8220; css=&#8220;.vc_custom_1772550909878{padding-top: 50px !important;padding-bottom: 100px !important;}&#8220; fade_in_intro=&#8220;13580&#8243; pix_overlay_opacity=&#8220;1&#8243; b_custom_height=&#8220;150px&#8220;][vc_row pix_particles_check=&#8220;&#8220; css=&#8220;.vc_custom_1771235106527{padding-bottom: 20px !important;}&#8220;][vc_column width=&#8220;3\/4&#8243; css=&#8220;.vc_custom_1589595508057{padding-top: 20px !important;padding-bottom: 20px !important;}&#8220;]<div id=\"sliding-text-bc2dc495d1e43d173ef458028ccb6d14\" class=\"mb-3 text-left  vc_custom_1772550855423\"><div class=\"d-inline-block\" style=\"max-width:500px;\"><h5 class=\"mb-32 pix-sliding-headline-2 animate-in font-weight-bold secondary-font \" data-anim-type=\"pix-sliding-text\" data-class=\"secondary-font text-white\" style=\"\"><span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 0ms;\">Threat&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 150ms;\">Intelligence&#32;<\/span><\/span> <\/h5><\/div><\/div><div id=\"img-85b9a605677fd2425ed4b1b54f5a88c1\" class=\"pix-img-element d-inline-block \"  ><div class=\"pix-img-el     text-left d-inline-block   rounded-0\"  ><img loading=\"lazy\" decoding=\"async\" width=\"1769\" height=\"1000\" src=\"https:\/\/dach.tdsynnex.com\/security-hub\/wp-content\/uploads\/2026\/03\/IBM_Partner_Plus_distributor_mark_pos_wht_RGB.png\" class=\"pix-img-elem rounded-0\" alt=\"Image link\" srcset=\"https:\/\/dach.tdsynnex.com\/security-hub\/wp-content\/uploads\/2026\/03\/IBM_Partner_Plus_distributor_mark_pos_wht_RGB.png 1769w, https:\/\/dach.tdsynnex.com\/security-hub\/wp-content\/uploads\/2026\/03\/IBM_Partner_Plus_distributor_mark_pos_wht_RGB-300x170.png 300w, https:\/\/dach.tdsynnex.com\/security-hub\/wp-content\/uploads\/2026\/03\/IBM_Partner_Plus_distributor_mark_pos_wht_RGB-1024x579.png 1024w, https:\/\/dach.tdsynnex.com\/security-hub\/wp-content\/uploads\/2026\/03\/IBM_Partner_Plus_distributor_mark_pos_wht_RGB-768x434.png 768w, https:\/\/dach.tdsynnex.com\/security-hub\/wp-content\/uploads\/2026\/03\/IBM_Partner_Plus_distributor_mark_pos_wht_RGB-1536x868.png 1536w, https:\/\/dach.tdsynnex.com\/security-hub\/wp-content\/uploads\/2026\/03\/IBM_Partner_Plus_distributor_mark_pos_wht_RGB-600x339.png 600w\" sizes=\"auto, (max-width: 1769px) 100vw, 1769px\" \/><\/div><\/div><div  class=\"pix-heading-el text-left  vc_custom_1772553157901\"><div class=\"d-inline-block\" style=\"max-width:600px;\"><h5 class=\"text-white h5 heading-text el-title_custom_color mb-12\" style=\"font-size:26px;\" data-anim-type=\"\" data-anim-delay=\"0\">IBM Security liefert integrierte Threat-Intelligence- und Zero\u2011Trust-L\u00f6sungen, die Identit\u00e4ten, Daten und Workloads sch\u00fctzen \u2013 mit KI\u2011gest\u00fctzter Erkennung und automatisierter Reaktion<\/h5><\/div><\/div>[\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8220;stretch_row_content&#8220; pix_over_visibility=&#8220;&#8220; css=&#8220;.vc_custom_1771263400466{padding-top: 50px !important;padding-bottom: 50px !important;}&#8220;][vc_row pix_particles_check=&#8220;&#8220;][vc_column][vc_separator color=&#8220;custom&#8220; border_width=&#8220;4&#8243; el_width=&#8220;10&#8243; css=&#8220;&#8220; accent_color=&#8220;#2D9F88&#8243;]<div id=\"el1771260461837-20953fd0-0d01\" class=\"mb-3 text-center  vc_custom_1772553443114\"><div class=\"d-inline-block\" style=\"max-width:500px;\"><h2 class=\"mb-32 pix-sliding-headline-2 animate-in font-weight-bold secondary-font \" data-anim-type=\"pix-sliding-text\" data-class=\"secondary-font text-primary\" style=\"\"><span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 0ms;\">\u00dcber&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 150ms;\">IBM&#32;<\/span><\/span> <\/h2><\/div><\/div>[\/vc_column][\/vc_row][vc_row gap=&#8220;15&#8243; equal_height=&#8220;yes&#8220; pix_particles_check=&#8220;&#8220; css=&#8220;.vc_custom_1771341708002{padding-top: 40px !important;padding-bottom: 20px !important;}&#8220;][vc_column width=&#8220;1\/4&#8243; css=&#8220;.vc_custom_1771341607543{background-color: #003031 !important;border-radius: 10px !important;}&#8220;]<div class=\"pix-content-box card      vc_custom_1771341663508    rounded-0  animate-in bg- w-100  \"  data-anim-type=\"fade-in-up\" data-anim-delay=\"0\" ><div class=\"\" style=\"z-index:30;position:relative;\"><div id=\"duo-icon-120181698\" class=\"pix-feature-el text-center  vc_custom_1772553536342\"><div class=\"pix-feature-icon d-inline-block mw-100 text-green \"   style=\"aspect-ratio:1\/1 !important;position:relative;text-align:center;font-size:70px;line-height:70px;\"><svg class=\"pixfort-icon \" width=\"24\" height=\"24\"  data-name=\"Line\/pixfort-icon-shield-1\" viewBox=\"2 2 20 20\"><path fill=\"none\" stroke=\"var(--pf-icon-color)\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"var(--pf-icon-stroke-width)\" d=\"M10.8375236,20.6696597 L6.25628542,17.3973467 C5.46789705,16.8342122 5,15.9249996 5,14.9561463 L5,6.90943839 C5,6.06421114 5.53134128,5.31023526 6.32732721,5.02595457 L11.3273272,3.24024028 C11.7623209,3.08488538 12.2376791,3.08488538 12.6726728,3.24024028 L17.6726728,5.02595457 C18.4686587,5.31023526 19,6.06421114 19,6.90943839 L19,14.9561463 C19,15.9249996 18.5321029,16.8342122 17.7437146,17.3973467 L13.1624764,20.6696597 C12.4670813,21.1663705 11.5329187,21.1663705 10.8375236,20.6696597 Z\"\/><\/svg><\/div><h4 class=\"pix-feature-title     text-white \" style=\"padding-top:20px;\"  >Durchg\u00e4ngige Sicherheitsarchitektur<\/h4><div class=\"pix-feature-content text-white text-18     \" style=\"padding-top:20px;\"  >IBM verbindet Identit\u00e4ts-, Secrets-, Daten- und Bedrohungsschutz zu einer integrierten Sicherheitsarchitektur. Statt isolierter Einzell\u00f6sungen entsteht ein abgestimmtes Zusammenspiel aller Schutzmechanismen \u2013 von der Zugriffskontrolle bis zur Incident Response und Recovery.<\/div><\/div><\/div><\/div>[\/vc_column][vc_column width=&#8220;1\/4&#8243; css=&#8220;.vc_custom_1771341598331{background-color: #003031 !important;border-radius: 10px !important;}&#8220;]<div class=\"pix-content-box card      vc_custom_1771341671532    rounded-0  animate-in bg- w-100  \"  data-anim-type=\"fade-in-up\" data-anim-delay=\"0\" ><div class=\"\" style=\"z-index:30;position:relative;\"><div id=\"pix-feature-1771260950515-ab382f5e-b3c4\" class=\"pix-feature-el text-center  vc_custom_1772553571452\"><div class=\"pix-feature-icon d-inline-block mw-100 text-green \"   style=\"aspect-ratio:1\/1 !important;position:relative;text-align:center;font-size:70px;line-height:70px;\"><svg class=\"pixfort-icon \" width=\"24\" height=\"24\"  data-name=\"Line\/pixfort-icon-cloud-shield-1\" viewBox=\"2 2 20 20\"><path fill=\"none\" stroke=\"var(--pf-icon-color)\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"var(--pf-icon-stroke-width)\" d=\"M11,18 C10,18 8.5,18 6.5,18 C4.56700338,18 3,16.4329966 3,14.5 C3,13.0635636 3.86532759,11.8292353 5.10313523,11.2898626 C5.03545876,11.0367447 5,10.7719956 5,10.5 C5,8.56700338 6.790861,7 9,7 C9.35777454,7 9.70457829,7.04110008 10.0345809,7.11819866 C10.9800018,6.41876938 12.1862061,6 13.5,6 C15.3181295,6 16.9302122,6.80199201 17.9315432,8.03806243 C18.2301887,8.40671873 18.4745066,8.81398729 18.6537599,9.25010738 M16.9293071,20.6033795 L14.6439607,19.0151078 C14.2405555,18.734749 14,18.2746229 14,17.7833624 L14,13.9273805 C14,13.5016149 14.2695862,13.1225376 14.6717623,12.9827853 L17.1717623,12.1140594 C17.3843527,12.0401863 17.6156473,12.0401863 17.8282377,12.1140594 L20.3282377,12.9827853 C20.7304138,13.1225376 21,13.5016149 21,13.9273805 L21,17.7833624 C21,18.2746229 20.7594445,18.734749 20.3560393,19.0151078 L18.0706929,20.6033795 C17.7275919,20.841828 17.2724081,20.841828 16.9293071,20.6033795 Z\"\/><\/svg><\/div><h4 class=\"pix-feature-title     text-white \" style=\"padding-top:20px;\"  >Zero-Trust- und Hybrid-Cloud-ready<\/h4><div class=\"pix-feature-content text-white text-18     \" style=\"padding-top:20px;\"  >Die IBM-L\u00f6sungen sichern jede Ebene moderner IT-Umgebungen: Benutzeridentit\u00e4ten, privilegierte Konten, Applikationen, Datenbanken, Container-Workloads und Backup-Strukturen. Dadurch wird Sicherheit nicht punktuell umgesetzt, sondern strukturell \u00fcber alle Systeme hinweg verankert.<\/div><\/div><\/div><\/div>[\/vc_column][vc_column width=&#8220;1\/4&#8243; css=&#8220;.vc_custom_1771341614125{background-color: #003031 !important;border-radius: 10px !important;}&#8220;]<div class=\"pix-content-box card      vc_custom_1771341679479    rounded-0  animate-in bg- w-100  \"  data-anim-type=\"fade-in-up\" data-anim-delay=\"0\" ><div class=\"\" style=\"z-index:30;position:relative;\"><div id=\"pix-feature-1771260945653-f9a86a72-2258\" class=\"pix-feature-el text-center  vc_custom_1772553609112\"><div class=\"pix-feature-icon d-inline-block mw-100 text-green \"   style=\"aspect-ratio:1\/1 !important;position:relative;text-align:center;font-size:70px;line-height:70px;\"><svg class=\"pixfort-icon \" width=\"24\" height=\"24\"  data-name=\"Line\/pixfort-icon-gear-settings-1\" viewBox=\"2 2 20 20\"><path fill=\"none\" stroke=\"var(--pf-icon-color)\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"var(--pf-icon-stroke-width)\" d=\"M13,3 C13.5522847,3 14,3.44771525 14,4 L14.0006762,5.29007996 C15.0838528,5.61256888 16.0571291,6.19018802 16.8508137,6.95324602 L17.897835,6.34930062 C18.3761277,6.07315825 18.9877181,6.2370334 19.2638604,6.71532603 L20.2638604,8.44737684 C20.5400028,8.92566946 20.3761277,9.53725986 19.897835,9.81340224 L18.8242363,10.4343148 C18.9392513,10.9376997 19,11.4617555 19,12 C19,12.6407205 18.9139175,13.2613353 18.752687,13.85091 L19.897835,14.5120035 C20.3761277,14.7881459 20.5400028,15.3997363 20.2638604,15.8780289 L19.2638604,17.6100797 C18.9877181,18.0883723 18.3761277,18.2522475 17.897835,17.9761051 L16.6524686,17.2302549 C15.8971594,17.9026069 14.9952455,18.4138118 14.0006762,18.70992 L14,19.9982048 C14,20.5504895 13.5522847,20.9982048 13,20.9982048 L11,20.9982048 C10.4477153,20.9982048 10,20.5504895 10,19.9982048 L9.99995367,18.7101075 C9.01882442,18.4181018 8.12784508,17.9167789 7.37880118,17.2579245 L6.1160254,17.9761051 C5.63773278,18.2522475 5.02614237,18.0883723 4.75,17.6100797 L3.75,15.8780289 C3.47385763,15.3997363 3.63773278,14.7881459 4.1160254,14.5120035 L5.24922515,13.8578877 C5.0867632,13.2662327 5,12.6432487 5,12 C5,11.4589171 5.0613911,10.9321728 5.17758786,10.4263526 L4.1160254,9.81340224 C3.63773278,9.53725986 3.47385763,8.92566946 3.75,8.44737684 L4.75,6.71532603 C5.02614237,6.2370334 5.63773278,6.07315825 6.1160254,6.34930062 L7.15358114,6.94902439 C7.94661662,6.1879097 8.91852303,5.61175016 9.99995367,5.28989247 L10,4 C10,3.44771525 10.4477153,3 11,3 L13,3 Z M12,15 C13.6568542,15 15,13.6568542 15,12 C15,10.3431458 13.6568542,9 12,9 C10.3431458,9 9,10.3431458 9,12 C9,13.6568542 10.3431458,15 12,15 Z\"\/><\/svg><\/div><h4 class=\"pix-feature-title     text-white \" style=\"padding-top:20px;\"  >Automatisierung &amp; Zukunftssicherheit<\/h4><div class=\"pix-feature-content text-white text-18     \" style=\"padding-top:20px;\"  >Durch KI-gest\u00fctzte Analysen, automatisierte Incident-Response und quantensichere Kryptographie reduziert IBM operative Aufw\u00e4nde und bereitet Unternehmen fr\u00fchzeitig auf neue Bedrohungsszenarien wie Post-Quantum-Risiken vor.<\/div><\/div><\/div><\/div>[\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8220;stretch_row_content&#8220; pix_over_visibility=&#8220;&#8220; css=&#8220;.vc_custom_1771262669941{padding-top: 50px !important;background-color: #FFFFFF !important;}&#8220;][vc_row equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; pix_particles_check=&#8220;&#8220; css=&#8220;.vc_custom_1771262873123{padding-top: 50px !important;padding-bottom: 50px !important;}&#8220;][vc_column width=&#8220;3\/4&#8243;]<div class=\"pix-content-box card         rounded-lg  bg- w-100  \"    ><div class=\"\" style=\"z-index:30;position:relative;\">[vc_row_inner equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; gap=&#8220;10&#8243;][vc_column_inner width=&#8220;1\/2&#8243;][vc_separator color=&#8220;custom&#8220; border_width=&#8220;4&#8243; el_width=&#8220;20&#8243; css=&#8220;&#8220; accent_color=&#8220;#2D9F88&#8243;][\/vc_column_inner][vc_column_inner width=&#8220;1\/2&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8220;yes&#8220; gap=&#8220;10&#8243;][vc_column_inner width=&#8220;1\/2&#8243;]<div id=\"el1771341390227-fba40457-a7b3\" class=\"mb-3 text-center  vc_custom_1772553679940\"><div class=\"d-inline-block\" style=\"max-width:500px;\"><h3 class=\"mb-32 pix-sliding-headline-2 animate-in font-weight-bold secondary-font \" data-anim-type=\"pix-sliding-text\" data-class=\"secondary-font text-primary\" style=\"\"><span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 0ms;\">IBM&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 150ms;\">verbindet&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 300ms;\">Identit\u00e4tsschutz&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 450ms;\">und&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 600ms;\">Bedrohungsabwehr&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 750ms;\">in&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 900ms;\">einer&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-primary\" style=\"transition-delay: 1050ms;\">Sicherheitsplattform&#32;<\/span><\/span> <\/h3><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8220;1\/2&#8243;]<div class=\"pix-el-text w-100   vc_custom_1772553621455\" ><div class=\"d-inline-block\" style=\"max-width:800px;\"><p class=\"text-20  text-heading-default  \" ><span class=\"text-heading-default animate-in d-inline-block\" data-anim-delay=\"400\" data-anim-type=\"fade-in-up\">Die Sicherheitsstrategie beginnt bei der Absicherung digitaler Identit\u00e4ten mit IBM Verify und Privileged Access Management. Erg\u00e4nzend sch\u00fctzt HashiCorp Vault sensible Zugangsdaten durch dynamische Secrets. IBM Guardium \u00fcberwacht und klassifiziert gesch\u00e4ftskritische Daten, w\u00e4hrend IBM QRadar Sicherheitsereignisse zentral korreliert und automatisierte Reaktionsprozesse erm\u00f6glicht. So entsteht eine abgestimmte Sicherheitskette \u2013 vom Benutzerzugriff bis zur aktiven Bedrohungsabwehr.<\/span><\/p><\/div><\/div>[\/vc_column_inner][\/vc_row_inner]<\/div><\/div>[\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8220;stretch_row_content&#8220; pix_over_visibility=&#8220;&#8220; css=&#8220;.vc_custom_1771263201064{padding-top: 50px !important;background-color: #003031 !important;}&#8220;][vc_row equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; pix_particles_check=&#8220;&#8220; css=&#8220;.vc_custom_1771262868198{padding-top: 50px !important;padding-bottom: 50px !important;}&#8220;][vc_column width=&#8220;3\/4&#8243;]<div class=\"pix-content-box card         rounded-lg  bg- w-100  \"    ><div class=\"\" style=\"z-index:30;position:relative;\">[vc_row_inner equal_height=&#8220;yes&#8220; content_placement=&#8220;middle&#8220; gap=&#8220;10&#8243;][vc_column_inner width=&#8220;1\/2&#8243;][\/vc_column_inner][vc_column_inner width=&#8220;1\/2&#8243;][vc_separator color=&#8220;custom&#8220; border_width=&#8220;4&#8243; el_width=&#8220;20&#8243; css=&#8220;&#8220; accent_color=&#8220;#2D9F88&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8220;yes&#8220; gap=&#8220;10&#8243;][vc_column_inner width=&#8220;1\/2&#8243;]<div class=\"pix-el-text w-100   vc_custom_1772553703716\" ><div class=\"d-inline-block\" style=\"max-width:800px;\"><p class=\"text-20  text-white  \" ><span class=\"text-white animate-in d-inline-block\" data-anim-delay=\"400\" data-anim-type=\"fade-in-up\">\u00dcber die klassische Bedrohungserkennung hinaus adressiert IBM die langfristige Absicherung der IT-Landschaft. IBM Quantum Safe unterst\u00fctzt Unternehmen bei der Vorbereitung auf quantenbasierte Risiken durch hybride Kryptographie-Modelle. IBM Storage Fusion erg\u00e4nzt diese Strategie durch container-native Datensicherung, isolierte Backup-Architekturen und orchestrierte Wiederherstellung. Damit endet Sicherheit nicht bei der Pr\u00e4vention, sondern schlie\u00dft Resilienz und kontrollierte Recovery konsequent mit ein.<\/span><\/p><\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8220;1\/2&#8243;]<div id=\"el1771341311298-46b36e5a-6003\" class=\"mb-3 text-center  vc_custom_1772553707483\"><div class=\"d-inline-block\" style=\"max-width:500px;\"><h3 class=\"mb-32 pix-sliding-headline-2 animate-in font-weight-bold secondary-font \" data-anim-type=\"pix-sliding-text\" data-class=\"secondary-font text-white\" style=\"\"><span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 0ms;\">IBM&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 150ms;\">erweitert&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 300ms;\">Sicherheit&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 450ms;\">um&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 600ms;\">Quantum&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 750ms;\">Readiness&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 900ms;\">und&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 1050ms;\">resiliente&#32;<\/span><\/span> <span class=\"slide-in-container \"><span class=\"pix-sliding-item secondary-font text-white\" style=\"transition-delay: 1200ms;\">Recovery-Strategien&#32;<\/span><\/span> <\/h3><\/div><\/div>[\/vc_column_inner][\/vc_row_inner]<\/div><\/div>[\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8220;stretch_row&#8220; pix_over_visibility=&#8220;&#8220; b_flip_h=&#8220;true&#8220; b_custom_height=&#8220;400px&#8220; css=&#8220;.vc_custom_1771604781851{padding-top: 0px !important;background-color: #EEF6F7 !important;}&#8220;][vc_row full_width=&#8220;stretch_row_content&#8220; equal_height=&#8220;yes&#8220; pix_particles_check=&#8220;&#8220; css=&#8220;.vc_custom_1770896585230{padding-top: 0px !important;}&#8220;][vc_column css_animation=&#8220;fadeInLeft&#8220; width=&#8220;1\/4&#8243; css=&#8220;.vc_custom_1771514597246{padding-top: 50px !important;}&#8220;]<div class=\"pix-content-box card      vc_custom_1770646751534    rounded-10 shadow shadow-hover animate-in bg- w-100  \"  data-anim-type=\"fade-in-up\" data-anim-delay=\"0\" ><div class=\"\" style=\"z-index:30;position:relative;\"><div  class=\"pix-heading-el text-left  vc_custom_1770914001381\"><h3 class=\"text-primary font-weight-bold h3 heading-text el-title_custom_color mb-12\" style=\"\" data-anim-type=\"\" data-anim-delay=\"0\">Kontakt<\/h3><\/div><div  class=\"pix-heading-el text-left  vc_custom_1772639043080\"><h5 class=\"text-primary h5 heading-text el-title_custom_color mb-12\" style=\"\" data-anim-type=\"\" data-anim-delay=\"0\">F\u00fcr weitere Fragen rund um IBM, schreiben Sie uns oder rufen Sie uns an.<\/h5><\/div>[vc_row_inner][vc_column_inner]<div id=\"accordion-7f69fbabaabfd6ae526146904bb64f8e\" class=\"w-100  \" ><div class=\"py-2 \"  ><div class=\"pix-feature-list        py-2 d-flex align-items-center\" ><div class=\"d-inline-flex align-items-center pix-mr-10 text-primary\" style=\"font-size:1.2em;position:relative;line-height:1em;text-align:center;\"><svg class=\"pixfort-icon \" width=\"24\" height=\"24\"  data-name=\"Line\/pixfort-icon-user-square-1\" viewBox=\"2 2 20 20\"><path fill=\"none\" stroke=\"var(--pf-icon-color)\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"var(--pf-icon-stroke-width)\" d=\"M5.08117917,21 C6.57888558,18.9754961 8,17 12,17 C16,17 17.4106532,18.9826287 18.9085695,21 M12,14 C14.209139,14 16,12.209139 16,10 C16,7.790861 14.209139,6 12,6 C9.790861,6 8,7.790861 8,10 C8,12.209139 9.790861,14 12,14 Z M5,3 L19,3 C20.1045695,3 21,3.8954305 21,5 L21,19 C21,20.1045695 20.1045695,21 19,21 L5,21 C3.8954305,21 3,20.1045695 3,19 L3,5 C3,3.8954305 3.8954305,3 5,3 Z\"\/><\/svg><\/div><span class=\"text-heading-default\">Siegfried Markiefka<\/span><\/div><div class=\"pix-feature-list        py-2 d-flex align-items-center\" ><a class=\"d-flex align-items-center\" href=\"mailto:Siegfried.Markiefka@tdsynnex.com\" target=\"\"><div class=\"d-inline-flex align-items-center pix-mr-10 text-primary\" style=\"font-size:1.2em;position:relative;line-height:1em;text-align:center;\"><svg class=\"pixfort-icon \" width=\"24\" height=\"24\"  data-name=\"Line\/pixfort-icon-mail-closed-1\" viewBox=\"2 2 20 20\"><path fill=\"none\" stroke=\"var(--pf-icon-color)\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"var(--pf-icon-stroke-width)\" d=\"M5,5 L19,5 C20.1045695,5 21,5.8954305 21,7 L21,17 C21,18.1045695 20.1045695,19 19,19 L5,19 C3.8954305,19 3,18.1045695 3,17 L3,7 C3,5.8954305 3.8954305,5 5,5 Z M3.30149167,5.98779765 L10.7448982,11.9882141 C11.4774541,12.5787556 12.5225812,12.5787994 13.2551866,11.9883193 L20.7,5.98779765 L20.7,5.98779765\"\/><\/svg><\/div><span class=\"text-heading-default\">Siegfried.Markiefka@tdsynnex.com<\/span><\/a><\/div><div class=\"pix-feature-list        py-2 d-flex align-items-center\" ><a class=\"d-flex align-items-center\" href=\"tel:0492104148883\" target=\"\"><div class=\"d-inline-flex align-items-center pix-mr-10 text-primary\" style=\"font-size:1.2em;position:relative;line-height:1em;text-align:center;\"><svg class=\"pixfort-icon \" width=\"24\" height=\"24\"  data-name=\"Line\/pixfort-icon-telephone-1\" viewBox=\"2 2 20 20\"><path fill=\"none\" stroke=\"var(--pf-icon-color)\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"var(--pf-icon-stroke-width)\" d=\"M18.8832522,15.2149875 L16.6435199,14.9557395 C16.063686,14.888624 15.4834673,15.0781662 15.0550765,15.474642 L13.9101291,16.5342913 L13.9101291,16.5342913 C11.0247673,15.2272362 8.65046344,13.0476406 7.32012905,9.94429134 L8.40498315,8.93981673 C8.87321964,8.50627302 9.10646531,7.87531619 9.03281655,7.24145388 L8.78582632,5.11571837 C8.65834351,4.01853018 7.6655515,3.23242866 6.56836332,3.35991148 C6.52669972,3.36475239 6.48519872,3.37090276 6.44392189,3.37835345 L4.03181843,3.81375119 C3.42678981,3.92293172 2.99622204,4.46337942 3.02497102,5.07750767 C3.02497102,5.07750767 3.02497102,5.07750767 3.02497102,5.07750767 C3.46000713,14.3706349 9.54976692,20.5603505 18.9740596,20.9775141 C18.9740596,20.9775141 18.9740596,20.9775141 18.9740596,20.9775141 C19.5592738,21.0034184 20.0735032,20.5926686 20.177581,20.0162014 L20.6214816,17.5569921 C20.8176915,16.4699892 20.095561,15.4297396 19.0085581,15.2335297 C18.9669957,15.2260274 18.9252062,15.2198436 18.8832522,15.2149875 Z\"\/><\/svg><\/div><span class=\"text-heading-default\">02104 148883<\/span><\/a><\/div><\/div><\/div>[\/vc_column_inner][\/vc_row_inner]<\/div><\/div>[\/vc_column][vc_column css_animation=&#8220;fadeInRight&#8220; width=&#8220;2\/4&#8243;]<div id=\"img-822636f647a101278b7cf925a72f7b94\" class=\"pix-img-element pix-img-div  text-right \"><div class=\"pix-img-el     text-right d-inline-block  w-100 rounded-0\"  ><img loading=\"lazy\" decoding=\"async\" width=\"845\" height=\"563\" src=\"https:\/\/dach.tdsynnex.com\/security-hub\/wp-content\/uploads\/2026\/02\/serviceman.jpg\" class=\"pix-img-elem rounded-0\" alt=\"Image link\" srcset=\"https:\/\/dach.tdsynnex.com\/security-hub\/wp-content\/uploads\/2026\/02\/serviceman.jpg 845w, https:\/\/dach.tdsynnex.com\/security-hub\/wp-content\/uploads\/2026\/02\/serviceman-300x200.jpg 300w, https:\/\/dach.tdsynnex.com\/security-hub\/wp-content\/uploads\/2026\/02\/serviceman-768x512.jpg 768w, https:\/\/dach.tdsynnex.com\/security-hub\/wp-content\/uploads\/2026\/02\/serviceman-600x400.jpg 600w\" sizes=\"auto, (max-width: 845px) 100vw, 845px\" \/><\/div><\/div>[\/vc_column][\/vc_row][\/vc_section]<\/div>","protected":false},"excerpt":{"rendered":"[vc_section full_width=&#8220;stretch_row_content&#8220; content_placement=&#8220;middle&#8220; pix_bg_grdient=&#8220;bg-gradient-primary&#8220; fade_in_opacity=&#8220;pix-opacity-9&#8243; pix_over_visibility=&#8220;&#8220; pix_overlay_color=&#8220;gradient-primary&#8220; css=&#8220;.vc_custom_1772550909878{padding-top: 50px !important;padding-bottom: 100px !important;}&#8220; fade_in_intro=&#8220;13580&#8243; pix_overlay_opacity=&#8220;1&#8243; b_custom_height=&#8220;150px&#8220;][vc_row pix_particles_check=&#8220;&#8220; css=&#8220;.vc_custom_1771235106527{padding-bottom: 20px !important;}&#8220;][vc_column width=&#8220;3\/4&#8243; css=&#8220;.vc_custom_1589595508057{padding-top: 20px !important;padding-bottom: 20px !important;}&#8220;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8220;stretch_row_content&#8220; pix_over_visibility=&#8220;&#8220; css=&#8220;.vc_custom_1771263400466{padding-top: 50px !important;padding-bottom: 50px !important;}&#8220;][vc_row pix_particles_check=&#8220;&#8220;][vc_column][vc_separator color=&#8220;custom&#8220; border_width=&#8220;4&#8243; el_width=&#8220;10&#8243; css=&#8220;&#8220; accent_color=&#8220;#2D9F88&#8243;][\/vc_column][\/vc_row][vc_row gap=&#8220;15&#8243; equal_height=&#8220;yes&#8220;&#8230;","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-13752","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IBM - Security Hub<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dach.tdsynnex.com\/security-hub\/ibm\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IBM - Security Hub\" \/>\n<meta property=\"og:description\" content=\"[vc_section full_width=&#8220;stretch_row_content&#8220; content_placement=&#8220;middle&#8220; pix_bg_grdient=&#8220;bg-gradient-primary&#8220; fade_in_opacity=&#8220;pix-opacity-9&#8243; pix_over_visibility=&#8220;&#8220; pix_overlay_color=&#8220;gradient-primary&#8220; css=&#8220;.vc_custom_1772550909878{padding-top: 50px !important;padding-bottom: 100px !important;}&#8220; fade_in_intro=&#8220;13580&#8243; pix_overlay_opacity=&#8220;1&#8243; b_custom_height=&#8220;150px&#8220;][vc_row pix_particles_check=&#8220;&#8220; css=&#8220;.vc_custom_1771235106527{padding-bottom: 20px !important;}&#8220;][vc_column width=&#8220;3\/4&#8243; css=&#8220;.vc_custom_1589595508057{padding-top: 20px !important;padding-bottom: 20px !important;}&#8220;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8220;stretch_row_content&#8220; pix_over_visibility=&#8220;&#8220; css=&#8220;.vc_custom_1771263400466{padding-top: 50px !important;padding-bottom: 50px !important;}&#8220;][vc_row pix_particles_check=&#8220;&#8220;][vc_column][vc_separator color=&#8220;custom&#8220; border_width=&#8220;4&#8243; el_width=&#8220;10&#8243; css=&#8220;&#8220; accent_color=&#8220;#2D9F88&#8243;][\/vc_column][\/vc_row][vc_row gap=&#8220;15&#8243; equal_height=&#8220;yes&#8220;...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dach.tdsynnex.com\/security-hub\/ibm\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Hub\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-04T15:44:23+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dach.tdsynnex.com\/security-hub\/ibm\/\",\"url\":\"https:\/\/dach.tdsynnex.com\/security-hub\/ibm\/\",\"name\":\"IBM - Security Hub\",\"isPartOf\":{\"@id\":\"https:\/\/dach.tdsynnex.com\/security-hub\/#website\"},\"datePublished\":\"2026-03-03T15:52:55+00:00\",\"dateModified\":\"2026-03-04T15:44:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/dach.tdsynnex.com\/security-hub\/ibm\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dach.tdsynnex.com\/security-hub\/ibm\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dach.tdsynnex.com\/security-hub\/ibm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Start\",\"item\":\"https:\/\/dach.tdsynnex.com\/security-hub\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IBM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dach.tdsynnex.com\/security-hub\/#website\",\"url\":\"https:\/\/dach.tdsynnex.com\/security-hub\/\",\"name\":\"Security Hub\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dach.tdsynnex.com\/security-hub\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IBM - Security Hub","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dach.tdsynnex.com\/security-hub\/ibm\/","og_locale":"de_DE","og_type":"article","og_title":"IBM - Security Hub","og_description":"[vc_section full_width=&#8220;stretch_row_content&#8220; content_placement=&#8220;middle&#8220; pix_bg_grdient=&#8220;bg-gradient-primary&#8220; fade_in_opacity=&#8220;pix-opacity-9&#8243; pix_over_visibility=&#8220;&#8220; pix_overlay_color=&#8220;gradient-primary&#8220; css=&#8220;.vc_custom_1772550909878{padding-top: 50px !important;padding-bottom: 100px !important;}&#8220; fade_in_intro=&#8220;13580&#8243; pix_overlay_opacity=&#8220;1&#8243; b_custom_height=&#8220;150px&#8220;][vc_row pix_particles_check=&#8220;&#8220; css=&#8220;.vc_custom_1771235106527{padding-bottom: 20px !important;}&#8220;][vc_column width=&#8220;3\/4&#8243; css=&#8220;.vc_custom_1589595508057{padding-top: 20px !important;padding-bottom: 20px !important;}&#8220;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8220;stretch_row_content&#8220; pix_over_visibility=&#8220;&#8220; css=&#8220;.vc_custom_1771263400466{padding-top: 50px !important;padding-bottom: 50px !important;}&#8220;][vc_row pix_particles_check=&#8220;&#8220;][vc_column][vc_separator color=&#8220;custom&#8220; border_width=&#8220;4&#8243; el_width=&#8220;10&#8243; css=&#8220;&#8220; accent_color=&#8220;#2D9F88&#8243;][\/vc_column][\/vc_row][vc_row gap=&#8220;15&#8243; equal_height=&#8220;yes&#8220;...","og_url":"https:\/\/dach.tdsynnex.com\/security-hub\/ibm\/","og_site_name":"Security Hub","article_modified_time":"2026-03-04T15:44:23+00:00","twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dach.tdsynnex.com\/security-hub\/ibm\/","url":"https:\/\/dach.tdsynnex.com\/security-hub\/ibm\/","name":"IBM - Security Hub","isPartOf":{"@id":"https:\/\/dach.tdsynnex.com\/security-hub\/#website"},"datePublished":"2026-03-03T15:52:55+00:00","dateModified":"2026-03-04T15:44:23+00:00","breadcrumb":{"@id":"https:\/\/dach.tdsynnex.com\/security-hub\/ibm\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dach.tdsynnex.com\/security-hub\/ibm\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dach.tdsynnex.com\/security-hub\/ibm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Start","item":"https:\/\/dach.tdsynnex.com\/security-hub\/"},{"@type":"ListItem","position":2,"name":"IBM"}]},{"@type":"WebSite","@id":"https:\/\/dach.tdsynnex.com\/security-hub\/#website","url":"https:\/\/dach.tdsynnex.com\/security-hub\/","name":"Security Hub","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dach.tdsynnex.com\/security-hub\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/dach.tdsynnex.com\/security-hub\/wp-json\/wp\/v2\/pages\/13752","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dach.tdsynnex.com\/security-hub\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dach.tdsynnex.com\/security-hub\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dach.tdsynnex.com\/security-hub\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dach.tdsynnex.com\/security-hub\/wp-json\/wp\/v2\/comments?post=13752"}],"version-history":[{"count":6,"href":"https:\/\/dach.tdsynnex.com\/security-hub\/wp-json\/wp\/v2\/pages\/13752\/revisions"}],"predecessor-version":[{"id":13761,"href":"https:\/\/dach.tdsynnex.com\/security-hub\/wp-json\/wp\/v2\/pages\/13752\/revisions\/13761"}],"wp:attachment":[{"href":"https:\/\/dach.tdsynnex.com\/security-hub\/wp-json\/wp\/v2\/media?parent=13752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}