{"id":2546,"date":"2025-09-04T13:10:12","date_gmt":"2025-09-04T11:10:12","guid":{"rendered":"https:\/\/datagerry.com\/?p=2546"},"modified":"2026-02-11T11:16:59","modified_gmt":"2026-02-11T10:16:59","slug":"it-sa-2025","status":"publish","type":"post","link":"https:\/\/datagerry.com\/en\/it-sa-2025\/","title":{"rendered":"DataGerry at it-sa 2025: NIS2, ISMS, CMDB, and attack detection"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;dc6c2638-a4a4-4460-9b46-2b1224b41ec0&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>The <strong>it-sa Expo&amp;Congress <\/strong>in Nuremberg is Europe&#8217;s largest trade fair for IT security and has established itself as the industry&#8217;s central meeting place. From <strong>October 7 to 9, 2025<\/strong>, IT security experts, decision-makers, and innovators will come together here to discuss current challenges, solutions, and trends in the field of cybersecurity.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;dc6c2638-a4a4-4460-9b46-2b1224b41ec0&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; custom_margin=&#8221;||3px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<h2>Overcoming cyber threats and regulatory requirements<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;dc6c2638-a4a4-4460-9b46-2b1224b41ec0&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<p>Cyberattacks are becoming increasingly sophisticated and putting companies under enormous pressure. Ransomware, data loss, and production downtime threaten not only business operations but also the trust of customers and partners. At the same time, the new NIS2 directive is increasing regulatory pressure to implement compliance requirements transparently. The growing complexity of modern IT landscapes and the shortage of skilled workers make it even more difficult to identify threats in time and take appropriate action.   <\/p>\n<p><strong>This is exactly where it-sa 2025 comes in:<\/strong> it offers insights into current threats, presents concrete solutions, software, and best practices, and facilitates direct exchange with experts.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||4px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_divider _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; color=&#8221;#E94D18&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;dc6c2638-a4a4-4460-9b46-2b1224b41ec0&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<h2>Meet us at it-sa 2025<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;dc6c2638-a4a4-4460-9b46-2b1224b41ec0&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<p>You can find us in <strong>Hall 7, Booth 7-550<\/strong>. Take this opportunity to talk directly to our experts and developers and learn more about how we can support you in implementing your <strong>cybersecurity and compliance strategy.<\/strong> <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/it-sa-logo.png&#8221; title_text=&#8221;it-sa-logo&#8221; url=&#8221;https:\/\/www.itsa365.de\/de-de\/it-sa-expo-congress&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;50%&#8221; max_width_tablet=&#8221;35%&#8221; max_width_phone=&#8221;45%&#8221; max_width_last_edited=&#8221;on|desktop&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf3ff;||fa||900&#8243; icon_color=&#8221;#E94D18&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;29px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;13e1249a-1555-412b-8dc7-416ecae63cad&#8221; header_level=&#8221;h3&#8243; header_font=&#8221;Open Sans|500|||||||&#8221; header_text_color=&#8221;#4d4d4d&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;||||||||&#8221; body_text_align=&#8221;left&#8221; body_text_color=&#8221;#4d4d4d&#8221; body_line_height=&#8221;2em&#8221; width=&#8221;100%&#8221; min_height=&#8221;34px&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; custom_css_main_element=&#8221;display: inline-block;||text-align: left;||&#8221; border_color_all_image=&#8221;#&#8221; icon_font_size=&#8221;29px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><strong>Request your free ticket now<\/strong><br \/>We will send you a free visitor ticket for it-sa 2025. Simply fill out the form and we will send you your personal admission code.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||4px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_divider _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; color=&#8221;#E94D18&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;dc6c2638-a4a4-4460-9b46-2b1224b41ec0&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<h2>becon GmbH \u2013 Your partner for IT security<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;dc6c2638-a4a4-4460-9b46-2b1224b41ec0&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<p>As an <strong>IT service provider with many years of expertise in cybersecurity, infrastructure, and open-source solutions<\/strong>, we support companies in implementing security and compliance requirements. Our services range from <strong>individual consulting on NIS2 and ISO 27001 compliance<\/strong> to the <strong>introduction of ISMS solutions<\/strong>, <strong>automated attack detection, and IT documentation.<\/strong> <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/Security.png&#8221; title_text=&#8221;Security&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;80%&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;8px|||||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;dc6c2638-a4a4-4460-9b46-2b1224b41ec0&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<p>With <strong>DataGerry<\/strong>, we offer a solution that combines <strong>CMDB, ISMS<\/strong>, and <strong>attack detection<\/strong> in an integrated open-source platform\u2014practical, scalable, and flexibly adaptable. In addition, we advise companies on the integration of existing systems, the development of secure IT infrastructures, and the implementation of holistic security strategies. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||4px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_divider _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; color=&#8221;#E94D18&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||6px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;dc6c2638-a4a4-4460-9b46-2b1224b41ec0&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<h2>Our presentation: \u201cImplementing NIS 2 with DataGerry \u2013 CMDB, ISMS, and attack detection in a one-stop solution\u201d<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf272;||fa||900&#8243; icon_color=&#8221;#E94D18&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;29px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;13e1249a-1555-412b-8dc7-416ecae63cad&#8221; header_level=&#8221;h3&#8243; header_font=&#8221;Open Sans|500|||||||&#8221; header_text_color=&#8221;#4d4d4d&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;||||||||&#8221; body_text_align=&#8221;left&#8221; body_text_color=&#8221;#4d4d4d&#8221; body_line_height=&#8221;2em&#8221; width=&#8221;100%&#8221; min_height=&#8221;34px&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; custom_css_main_element=&#8221;display: inline-block;||text-align: left;||&#8221; border_color_all_image=&#8221;#&#8221; icon_font_size=&#8221;29px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><strong>Wednesday, October 8, 12:00 p.m.<\/strong><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;&#xf3c5;||fa||900&#8243; icon_color=&#8221;#E94D18&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;29px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;13e1249a-1555-412b-8dc7-416ecae63cad&#8221; header_level=&#8221;h3&#8243; header_font=&#8221;Open Sans|500|||||||&#8221; header_text_color=&#8221;#4d4d4d&#8221; header_font_size=&#8221;18px&#8221; header_line_height=&#8221;1.8em&#8221; body_font=&#8221;||||||||&#8221; body_text_align=&#8221;left&#8221; body_text_color=&#8221;#4d4d4d&#8221; body_line_height=&#8221;2em&#8221; width=&#8221;100%&#8221; min_height=&#8221;34px&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; custom_css_main_element=&#8221;display: inline-block;||text-align: left;||&#8221; border_color_all_image=&#8221;#&#8221; icon_font_size=&#8221;29px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"flex flex-col items-center gap-1\">\n<p class=\"text-copy-l\"><strong>Forum, Booth 7-742<\/strong><\/p>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;dc6c2638-a4a4-4460-9b46-2b1224b41ec0&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<p>With the NIS2 directive, many companies are faced with the challenge of documenting IT assets, risks, vulnerabilities, and security measures in a traceable manner. This is exactly where our open source CMDB and asset management tool <strong>DataGerry<\/strong> comes in. <\/p>\n<ul>\n<li><strong>CMDB &amp; ISMS integrated:<\/strong> Structured IT documentation in accordance with NIS2 and ISO 27001 in a flexible system.<\/li>\n<li><strong>Automated attack detection:<\/strong> Security-related events flow directly into the platform via the <strong>Wazuh<\/strong> connection.<\/li>\n<li><strong>Seamless API integration:<\/strong> With <strong>OpenCelium<\/strong>, any application can be easily connected\u2014for data enrichment or further processing.<\/li>\n<\/ul>\n<p>Datagerry combines the four disciplines of <strong>CMDB, ISMS, XDR, and API integration<\/strong> in a one-stop solution for IT security and compliance.<\/p>\n<p>We look forward to seeing you there!<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/it-sa-vortragsmotiv-mobile-becon-gmbh.png&#8221; title_text=&#8221;it-sa-vortragsmotiv-mobile-becon-gmbh&#8221; url=&#8221;https:\/\/www.itsa365.de\/de-DE\/actions-events\/2025\/it-sa-expo\/knowledge-d\/nis2-umsetzen-mit-datagerry-cmdb-isms-angriffserkennung-als-one-stop-loesung-becon&#8221; url_new_window=&#8221;on&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; border_radii=&#8221;on|8px|8px|8px|8px&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_button button_url=&#8221;https:\/\/www.itsa365.de\/de-DE\/actions-events\/2025\/it-sa-expo\/knowledge-d\/nis2-umsetzen-mit-datagerry-cmdb-isms-angriffserkennung-als-one-stop-loesung-becon&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Bookmark this lecture now&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_bg_color=&#8221;#E94D18&#8243; button_border_width=&#8221;12px&#8221; button_border_color=&#8221;#E94D18&#8243; button_border_radius=&#8221;6px&#8221; button_font=&#8221;|700|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;30px||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; theme_builder_area=&#8221;post_content&#8221; button_bg_enable_color=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||4px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_divider _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; color=&#8221;#E94D18&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;dc6c2638-a4a4-4460-9b46-2b1224b41ec0&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<h2>DataGerry \u2013 flexible data management for individual requirements<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;dc6c2638-a4a4-4460-9b46-2b1224b41ec0&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<p><a href=\"https:\/\/datagerry.com\/\">DataGerry<\/a> is an open source CMDB and asset management tool for the structured management of any object types and data models. Unlike rigid CMDBs, DataGerry can be flexibly customized, seamlessly integrated into existing systems, and is therefore ideal for complex or individual IT landscapes. <\/p>\n<p><strong>DataGerry offers full control over security-related information<\/strong>, dependencies, and processes for the implementation of the NIS2 Directive. The open architecture enables automated workflows, detailed risk assessments, and a documented basis for your compliance in line with your requirements. <\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/datagerry.com\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Learn more&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_bg_color=&#8221;#E94D18&#8243; button_border_width=&#8221;12px&#8221; button_border_color=&#8221;#E94D18&#8243; button_border_radius=&#8221;6px&#8221; button_font=&#8221;|700|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;30px||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; theme_builder_area=&#8221;post_content&#8221; button_bg_enable_color=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/DataGerry-OpenSource-2.png&#8221; title_text=&#8221;DataGerry-OpenSource&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||4px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_divider _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; color=&#8221;#E94D18&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;dc6c2638-a4a4-4460-9b46-2b1224b41ec0&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<h2>OpenCelium \u2013 The control center for your IT integration<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;dc6c2638-a4a4-4460-9b46-2b1224b41ec0&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<p><em>OpenCelium<\/em> is a modern <a href=\"https:\/\/www.opencelium.io\/\">API integration platform<\/a> that automates and centrally controls data exchange between your applications. Instead of connecting each application individually, OpenCelium provides a clear structure based on the hub-and-spoke principle. This reduces complexity, creates transparency, and gives you full control over your interfaces at all times.  <\/p>\n<p>At the same time, you benefit from a low-maintenance integration architecture, ready-made connectors for numerous systems, and integrated functions such as error handling, logging, and monitoring. This increases the operational reliability and efficiency of your IT landscape\u2014and allows you to get more out of your existing systems without having to delve deep into the code. <\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.opencelium.io\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Learn more&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_bg_color=&#8221;#E94D18&#8243; button_border_width=&#8221;12px&#8221; button_border_color=&#8221;#E94D18&#8243; button_border_radius=&#8221;6px&#8221; button_font=&#8221;|700|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;30px||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; theme_builder_area=&#8221;post_content&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_enable_color=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/API-Management-OpenCelium-becon-gmbh.png&#8221; title_text=&#8221;API-Management-OpenCelium-becon-gmbh&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; border_radii=&#8221;on|8px|8px|8px|8px&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||4px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_divider _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; color=&#8221;#E94D18&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;dc6c2638-a4a4-4460-9b46-2b1224b41ec0&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<h2>Wazuh \u2013 the open-source platform for comprehensive security<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;dc6c2638-a4a4-4460-9b46-2b1224b41ec0&#8243; header_2_text_color=&#8221;#4d4d4d&#8221; header_2_font_size=&#8221;22px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; text_text_color=&#8221;#4D4D4D&#8221;]<\/p>\n<p><a href=\"https:\/\/www.becon.de\/wazuh\/?lang=en\">Wazuh<\/a> is an open-source solution for <strong>SIEM, XDR<\/strong>, and <strong>compliance management<\/strong> that enables companies to monitor security centrally in real time. The platform supports Windows, Linux, macOS, cloud environments, and containers, detects threats early on, and helps companies comply with standards such as <strong>GDPR, ISO 27001<\/strong>, and <strong>PCI DSS.<\/strong> <\/p>\n<p>As an official <strong>Wazuh partner<\/strong>, we support companies in implementing and optimizing this flexible and scalable solution. This means you not only benefit from the advantages of a cost-efficient open-source platform, but also from our expertise in integration, customization, and operation\u2014for sustainably enhanced cybersecurity. <\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.becon.de\/wazuh\/?lang=en&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Learn more&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_bg_color=&#8221;#E94D18&#8243; button_border_width=&#8221;12px&#8221; button_border_color=&#8221;#E94D18&#8243; button_border_radius=&#8221;6px&#8221; button_font=&#8221;|700|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;30px||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; theme_builder_area=&#8221;post_content&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_enable_color=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/datagerry.com\/wp-content\/uploads\/2026\/02\/Cyberversicherung-SIEM-Loesung-becon-gmbh.png&#8221; title_text=&#8221;Cyber insurance SIEM solution becon GmbH&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; border_radii=&#8221;on|8px|8px|8px|8px&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The it-sa Expo&#038;Congress in Nuremberg is Europe&#8217;s largest trade fair for IT security. Meet our team on site in Hall 7, Booth 7-550, or at our presentation \u201cImplementing NIS 2 with DataGerry \u2013 CMDB, ISMS, and attack detection in a one-stop solution.\u201d<\/p>\n","protected":false},"author":9,"featured_media":2776,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<img width=\"850\" height=\"513\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/DataGerry-it-sa-englisch.png\" alt=\"\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/DataGerry-it-sa-englisch.png 850w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/DataGerry-it-sa-englisch-300x181.png 300w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/DataGerry-it-sa-englisch-768x464.png 768w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t<p>The <strong>it-sa Expo&amp;Congress<\/strong> in Nuremberg is Europe's largest trade fair for IT security and has established itself as the industry's central meeting place. From <strong>October 7 to 9, 2025<\/strong>, IT security experts, decision-makers, and innovators will come together here to discuss current challenges, solutions, and trends in the field of cybersecurity.<\/p>\t\t\n\t\t<h2>Overcoming cyber threats and regulatory requirements<\/h2><p>Cyber attacks are becoming increasingly sophisticated and putting companies under enormous pressure. Ransomware, data loss, and production downtime not only threaten business operations, but also the trust of customers and partners. At the same time, the new NIS2 directive is increasing regulatory pressure to implement compliance requirements transparently. The growing complexity of modern IT landscapes and the shortage of skilled workers make it even more difficult to identify threats in time and take appropriate action. <br \/>This is exactly where it-sa 2025 comes in: it offers insights into current threats, presents concrete solutions, software, and best practices, and enables direct exchange with experts.<\/p>\t\t\n\t\t<h2>becon GmbH \u2013 Your partner for IT security<\/h2><p>As an IT service provider with many years of expertise in cybersecurity, infrastructure, and open-source solutions, we support companies in implementing security and compliance requirements. Our services range from individual consulting on NIS2 and ISO 27001 compliance to the introduction of ISMS solutions to automated attack detection and IT documentation.<\/p>\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"850\" height=\"513\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/Security.png\" alt=\"\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/Security.png 850w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/Security-300x181.png 300w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/Security-768x464.png 768w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t<p>With <strong>DataGerry<\/strong>, we offer a solution that combines CMDB, ISMS, and attack detection in an integrated open-source platform \u2013 practical, scalable, and flexibly adaptable. In addition, we advise companies on the integration of existing systems, the development of secure IT infrastructures, and the implementation of holistic security strategies.<\/p>\t\t\n\t\t<h2>Meet us at it-sa 2025<\/h2><p>You will find us in Hall 7, Booth 7-550. Take the opportunity to talk with our experts and developers and learn more about how we can support you in implementing your cybersecurity and compliance strategy.<\/p>\t\t\n\t\t\t\t\t\t\t\t\t<h3>\n\t\t\t\t\t\t\tSecure your free ticket now\t\t\t\t\t\t\n\t\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t<p>\n\t\t\t\t\t\tWe will send you a free visitor ticket for it-sa 2025. Simply fill out the form and we will send you your personal admission code:\t\t\t\t\t<\/p>\n\t\t<h2>Our presentation: \u201cImplementing NIS2 with DataGerry \u2013 CMDB, ISMS, and attack detection in a one-stop solution\u201d<\/h2><p>With the NIS2 directive, many companies are faced with the challenge of documenting IT assets, risks, vulnerabilities, and security measures in a traceable manner. This is exactly where our open source CMDB and asset management tool DataGerry comes in.<\/p><p>Language: German<\/p>\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.itsa365.de\/en\/actions-events\/2025\/it-sa-expo\/knowledge-d\/nis2-umsetzen-mit-datagerry-cmdb-isms-angriffserkennung-als-one-stop-loesung-becon\" target=\"_blank\">\n\t\t\t\t\t\t\t<img width=\"850\" height=\"557\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/it-sa-vortragsmotiv-mobile-becon-gmbh.png\" alt=\"\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/it-sa-vortragsmotiv-mobile-becon-gmbh.png 850w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/it-sa-vortragsmotiv-mobile-becon-gmbh-300x197.png 300w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/it-sa-vortragsmotiv-mobile-becon-gmbh-768x503.png 768w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<a href=\"https:\/\/www.itsa365.de\/en\/actions-events\/2025\/it-sa-expo\/knowledge-d\/nis2-umsetzen-mit-datagerry-cmdb-isms-angriffserkennung-als-one-stop-loesung-becon\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\tSave the date for the presentation\n\t\t\t\t\t<\/a>\n\t\t<ul><li><strong>CMDB &amp; ISMS integrated:<\/strong> Structured IT documentation according to NIS2 and ISO 27001 in a flexible system.<\/li><li><strong>Automated attack detection:<\/strong> Security-related events flow directly into the platform via the Wazuh connection.<\/li><li><strong>Seamless API integration:<\/strong> With OpenCelium, any application can be easily connected \u2013 for data enrichment or further processing.<br \/>Datagerry thus combines the four disciplines of CMDB, ISMS, XDR, and API integration in a one-stop solution for IT security and compliance.<\/li><\/ul><p>We look forward to seeing you there!<\/p>\t\t\n\t\t<h2>DataGerry \u2013 flexible data management for individual requirements<\/h2><p><a href=\"https:\/\/datagerry.com\/\" target=\"_blank\" rel=\"noopener\"><strong>DataGerry<\/strong><\/a> is an open source CMDB and asset management tool for the structured management of any object types and data models. Unlike rigid CMDBs, DataGerry can be flexibly adapted, seamlessly integrated into existing systems, and is therefore ideal for complex or individual IT landscapes.<br \/>For the <strong>implementation of the NIS2 directive<\/strong>, DataGerry offers full control over security-related information, dependencies, and processes. The open architecture enables automated workflows, detailed risk assessments, and a documented basis for your compliance according to your requirements.<\/p>\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"850\" height=\"513\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/02\/DataGerry-OpenSource.png\" alt=\"\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/02\/DataGerry-OpenSource.png 850w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/02\/DataGerry-OpenSource-300x181.png 300w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/02\/DataGerry-OpenSource-768x464.png 768w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<a href=\"https:\/\/datagerry.com\/\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\tLearn more\n\t\t\t\t\t<\/a>\n\t\t<h2>OpenCelium \u2013 The control center for your IT integration<\/h2><p><a href=\"https:\/\/www.opencelium.io\/\" target=\"_blank\" rel=\"noopener\">OpenCelium<\/a> is a modern <em>API integration platform<\/em> that automates and centrally controls data exchange between your applications. Instead of connecting each application individually, OpenCelium provides a clear structure based on the hub-and-spoke principle. This reduces complexity, creates transparency, and gives you full control over your interfaces at all times.<br \/>At the same time, you benefit from a low-maintenance integration architecture, ready-made connectors for numerous systems, and integrated functions such as error handling, logging, and monitoring. This increases the operational reliability and efficiency of your IT landscape \u2013 and allows you to get more out of your existing systems without having to delve deep into the code.<\/p>\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"850\" height=\"513\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/API-Management-OpenCelium-becon-gmbh.png\" alt=\"\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/API-Management-OpenCelium-becon-gmbh.png 850w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/API-Management-OpenCelium-becon-gmbh-300x181.png 300w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/API-Management-OpenCelium-becon-gmbh-768x464.png 768w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<a href=\"https:\/\/www.opencelium.io\/\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\tLearn more\n\t\t\t\t\t<\/a>\n\t\t<h2>Wazuh \u2013 the open-source platform for comprehensive security<\/h2><p><a href=\"https:\/\/www.becon.de\/wazuh\/\" target=\"_blank\" rel=\"noopener\">Wazuh<\/a> is an open-source solution for <strong>SIEM, XDR<\/strong>, and <strong>compliance management<\/strong> that enables companies to monitor security centrally in real time. The platform supports Windows, Linux, macOS, cloud environments, and containers, detects threats early on, and helps companies comply with standards such as <strong>GDPR, ISO 27001<\/strong>, and <strong>PCI DSS<\/strong>.<\/p><p>As an official <strong>Wazuh partner,<\/strong> we support companies in implementing and optimizing this flexible and scalable solution. This means you not only benefit from the advantages of a cost-efficient open-source platform, but also from our expertise in integration, customization, and operation \u2013 for sustainably enhanced cybersecurity.<\/p>\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"850\" height=\"513\" src=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/Cyberversicherung-SIEM-Loesung-becon-gmbh.png\" alt=\"\" srcset=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/Cyberversicherung-SIEM-Loesung-becon-gmbh.png 850w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/Cyberversicherung-SIEM-Loesung-becon-gmbh-300x181.png 300w, https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/Cyberversicherung-SIEM-Loesung-becon-gmbh-768x464.png 768w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<a href=\"https:\/\/www.becon.de\/wazuh\/\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\tLearn more\n\t\t\t\t\t<\/a>\n\t\t\t\t\t<h2>Instant contact<\/h2>","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-2546","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DataGerry at it-sa 2025: NIS2, ISMS, CMDB, and attack detection<\/title>\n<meta name=\"description\" content=\"it-sa Expo&amp;Congress \u27a5 Meet our team in Hall 7, Booth 7-550, or at our presentation \u201cImplementing NIS 2 with DataGerry.\u201d\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/datagerry.com\/en\/it-sa-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DataGerry at it-sa 2025: NIS2, ISMS, CMDB, and attack detection\" \/>\n<meta property=\"og:description\" content=\"it-sa Expo&amp;Congress \u27a5 Meet our team in Hall 7, Booth 7-550, or at our presentation \u201cImplementing NIS 2 with DataGerry.\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/datagerry.com\/en\/it-sa-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"DataGerry\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-04T11:10:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-11T10:16:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/DataGerry-it-sa-englisch.png\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"513\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Melina Rother\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DATAGERRY\" \/>\n<meta name=\"twitter:site\" content=\"@DATAGERRY\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Melina Rother\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/it-sa-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/it-sa-2025\\\/\"},\"author\":{\"name\":\"Melina Rother\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#\\\/schema\\\/person\\\/4c268fa52a381d91e25e47fbfeb11f81\"},\"headline\":\"DataGerry at it-sa 2025: NIS2, ISMS, CMDB, and attack detection\",\"datePublished\":\"2025-09-04T11:10:12+00:00\",\"dateModified\":\"2026-02-11T10:16:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/it-sa-2025\\\/\"},\"wordCount\":4206,\"publisher\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/it-sa-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datagerry.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/DataGerry-it-sa-englisch.png\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/it-sa-2025\\\/\",\"url\":\"https:\\\/\\\/datagerry.com\\\/en\\\/it-sa-2025\\\/\",\"name\":\"DataGerry at it-sa 2025: NIS2, ISMS, CMDB, and attack detection\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/it-sa-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/it-sa-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/datagerry.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/DataGerry-it-sa-englisch.png\",\"datePublished\":\"2025-09-04T11:10:12+00:00\",\"dateModified\":\"2026-02-11T10:16:59+00:00\",\"description\":\"it-sa Expo&Congress \u27a5 Meet our team in Hall 7, Booth 7-550, or at our presentation \u201cImplementing NIS 2 with DataGerry.\u201d\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/it-sa-2025\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/datagerry.com\\\/en\\\/it-sa-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/it-sa-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/datagerry.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/DataGerry-it-sa-englisch.png\",\"contentUrl\":\"https:\\\/\\\/datagerry.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/DataGerry-it-sa-englisch.png\",\"width\":850,\"height\":513},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/it-sa-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/datagerry.com\\\/en\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DataGerry at it-sa 2025: NIS2, ISMS, CMDB, and attack detection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/datagerry.com\\\/en\\\/\",\"name\":\"DataGerry\",\"description\":\"Your IT is driving you nuts?\",\"publisher\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/datagerry.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#organization\",\"name\":\"DataGerry\",\"url\":\"https:\\\/\\\/datagerry.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/datagerry.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Datagerry.png\",\"contentUrl\":\"https:\\\/\\\/datagerry.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Datagerry.png\",\"width\":359,\"height\":108,\"caption\":\"DataGerry\"},\"image\":{\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/DATAGERRY\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/datagerry\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/datagerry.com\\\/en\\\/#\\\/schema\\\/person\\\/4c268fa52a381d91e25e47fbfeb11f81\",\"name\":\"Melina Rother\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a586590524458bd6067e26b9e6e30791bb656f98fbc6eeb7724daeac9f535ff?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a586590524458bd6067e26b9e6e30791bb656f98fbc6eeb7724daeac9f535ff?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a586590524458bd6067e26b9e6e30791bb656f98fbc6eeb7724daeac9f535ff?s=96&d=mm&r=g\",\"caption\":\"Melina Rother\"},\"url\":\"https:\\\/\\\/datagerry.com\\\/en\\\/author\\\/rother\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DataGerry at it-sa 2025: NIS2, ISMS, CMDB, and attack detection","description":"it-sa Expo&Congress \u27a5 Meet our team in Hall 7, Booth 7-550, or at our presentation \u201cImplementing NIS 2 with DataGerry.\u201d","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/datagerry.com\/en\/it-sa-2025\/","og_locale":"en_US","og_type":"article","og_title":"DataGerry at it-sa 2025: NIS2, ISMS, CMDB, and attack detection","og_description":"it-sa Expo&Congress \u27a5 Meet our team in Hall 7, Booth 7-550, or at our presentation \u201cImplementing NIS 2 with DataGerry.\u201d","og_url":"https:\/\/datagerry.com\/en\/it-sa-2025\/","og_site_name":"DataGerry","article_published_time":"2025-09-04T11:10:12+00:00","article_modified_time":"2026-02-11T10:16:59+00:00","og_image":[{"width":850,"height":513,"url":"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/DataGerry-it-sa-englisch.png","type":"image\/png"}],"author":"Melina Rother","twitter_card":"summary_large_image","twitter_creator":"@DATAGERRY","twitter_site":"@DATAGERRY","twitter_misc":{"Written by":"Melina Rother","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/datagerry.com\/en\/it-sa-2025\/#article","isPartOf":{"@id":"https:\/\/datagerry.com\/en\/it-sa-2025\/"},"author":{"name":"Melina Rother","@id":"https:\/\/datagerry.com\/en\/#\/schema\/person\/4c268fa52a381d91e25e47fbfeb11f81"},"headline":"DataGerry at it-sa 2025: NIS2, ISMS, CMDB, and attack detection","datePublished":"2025-09-04T11:10:12+00:00","dateModified":"2026-02-11T10:16:59+00:00","mainEntityOfPage":{"@id":"https:\/\/datagerry.com\/en\/it-sa-2025\/"},"wordCount":4206,"publisher":{"@id":"https:\/\/datagerry.com\/en\/#organization"},"image":{"@id":"https:\/\/datagerry.com\/en\/it-sa-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/DataGerry-it-sa-englisch.png","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/datagerry.com\/en\/it-sa-2025\/","url":"https:\/\/datagerry.com\/en\/it-sa-2025\/","name":"DataGerry at it-sa 2025: NIS2, ISMS, CMDB, and attack detection","isPartOf":{"@id":"https:\/\/datagerry.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/datagerry.com\/en\/it-sa-2025\/#primaryimage"},"image":{"@id":"https:\/\/datagerry.com\/en\/it-sa-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/DataGerry-it-sa-englisch.png","datePublished":"2025-09-04T11:10:12+00:00","dateModified":"2026-02-11T10:16:59+00:00","description":"it-sa Expo&Congress \u27a5 Meet our team in Hall 7, Booth 7-550, or at our presentation \u201cImplementing NIS 2 with DataGerry.\u201d","breadcrumb":{"@id":"https:\/\/datagerry.com\/en\/it-sa-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/datagerry.com\/en\/it-sa-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datagerry.com\/en\/it-sa-2025\/#primaryimage","url":"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/DataGerry-it-sa-englisch.png","contentUrl":"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/09\/DataGerry-it-sa-englisch.png","width":850,"height":513},{"@type":"BreadcrumbList","@id":"https:\/\/datagerry.com\/en\/it-sa-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/datagerry.com\/en\/home\/"},{"@type":"ListItem","position":2,"name":"DataGerry at it-sa 2025: NIS2, ISMS, CMDB, and attack detection"}]},{"@type":"WebSite","@id":"https:\/\/datagerry.com\/en\/#website","url":"https:\/\/datagerry.com\/en\/","name":"DataGerry","description":"Your IT is driving you nuts?","publisher":{"@id":"https:\/\/datagerry.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/datagerry.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/datagerry.com\/en\/#organization","name":"DataGerry","url":"https:\/\/datagerry.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/datagerry.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/Datagerry.png","contentUrl":"https:\/\/datagerry.com\/wp-content\/uploads\/2025\/10\/Datagerry.png","width":359,"height":108,"caption":"DataGerry"},"image":{"@id":"https:\/\/datagerry.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/DATAGERRY","https:\/\/www.linkedin.com\/company\/datagerry\/"]},{"@type":"Person","@id":"https:\/\/datagerry.com\/en\/#\/schema\/person\/4c268fa52a381d91e25e47fbfeb11f81","name":"Melina Rother","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8a586590524458bd6067e26b9e6e30791bb656f98fbc6eeb7724daeac9f535ff?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8a586590524458bd6067e26b9e6e30791bb656f98fbc6eeb7724daeac9f535ff?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8a586590524458bd6067e26b9e6e30791bb656f98fbc6eeb7724daeac9f535ff?s=96&d=mm&r=g","caption":"Melina Rother"},"url":"https:\/\/datagerry.com\/en\/author\/rother\/"}]}},"_links":{"self":[{"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/posts\/2546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/comments?post=2546"}],"version-history":[{"count":46,"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/posts\/2546\/revisions"}],"predecessor-version":[{"id":27254134,"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/posts\/2546\/revisions\/27254134"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/media\/2776"}],"wp:attachment":[{"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/media?parent=2546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/categories?post=2546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/datagerry.com\/en\/wp-json\/wp\/v2\/tags?post=2546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}