{"id":19267,"date":"2020-11-26T10:51:15","date_gmt":"2020-11-26T09:51:15","guid":{"rendered":"https:\/\/smartprofile.io\/?page_id=19267"},"modified":"2020-11-26T11:20:57","modified_gmt":"2020-11-26T10:20:57","slug":"security-onderzoek-2020","status":"publish","type":"page","link":"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/","title":{"rendered":"Security onderzoek 2020"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-khyms5vk-0658c38f145bd6297f38584e3c5224f1\">\n#top .hr.hr-invisible.av-khyms5vk-0658c38f145bd6297f38584e3c5224f1{\nheight:40px;\n}\n<\/style>\n<div  class='hr av-khyms5vk-0658c38f145bd6297f38584e3c5224f1 hr-invisible  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2k69bn-438d450f5e394e100dd81b3247621806\">\n.flex_column.av-2k69bn-438d450f5e394e100dd81b3247621806{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-2k69bn-438d450f5e394e100dd81b3247621806 av_one_full  avia-builder-el-1  el_after_av_hr  el_before_av_one_half  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-k8serk4p-9ff9ffda3c75e78c244ac55824788020 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 style=\"text-align: center;\">Security onderzoek 2020<\/h1>\n<\/div><\/section><\/div>\n<div class='flex_column_table av-1b04f9v-03cd939d825135d0b236dbf093f80eb0 sc-av_one_half av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1b04f9v-03cd939d825135d0b236dbf093f80eb0\">\n.flex_column.av-1b04f9v-03cd939d825135d0b236dbf093f80eb0{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-1b04f9v-03cd939d825135d0b236dbf093f80eb0 av_one_half  avia-builder-el-3  el_after_av_one_full  el_before_av_one_half  first flex_column_table_cell av-equal-height-column av-align-middle av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-k8sf5z8h-6c6e3990bd63095b4b40a93c6448f01b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>INHOUDSOPGAVE<\/h3>\n<p>1. Dutch IT Security Survey 2020<br \/>\n2. Inzichten uit de Smart Profile MarketBase<br \/>\n3. Conclusies onderzoek<\/p>\n<\/div><\/section><\/div>\n<div class='av-flex-placeholder'><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-qkjddf-fe256e133ecd05f52ae590121c7bc6c9\">\n.flex_column.av-qkjddf-fe256e133ecd05f52ae590121c7bc6c9{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-qkjddf-fe256e133ecd05f52ae590121c7bc6c9 av_one_half  avia-builder-el-5  el_after_av_one_half  el_before_av_hr  flex_column_table_cell av-equal-height-column av-align-middle av-zero-column-padding  column-top-margin'     ><div  class='avia-video av-khyorvso-7feab0a446ba4ed2db09756ab4721040 avia-video-16-9 av-no-preview-image avia-video-load-always av-lazyload-immediate av-lazyload-video-embed'  itemprop=\"video\" itemtype=\"https:\/\/schema.org\/VideoObject\"  data-original_url='https:\/\/youtu.be\/sz0Kzq_oEiM'><script type='text\/html' class='av-video-tmpl'><div class='avia-iframe-wrap'><iframe loading=\"lazy\" title=\"Dutch IT Security Onderzoek: Trends voor Channel Partners\" width=\"1500\" height=\"844\" src=\"https:\/\/www.youtube.com\/embed\/sz0Kzq_oEiM?wmode=transparent&amp;rel=0&amp;feature=oembed&autoplay=0&loop=0&controls=1&mute=0\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div><\/script><div class='av-click-to-play-overlay'><div class=\"avia_playpause_icon\"><\/div><\/div><\/div><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-k8sjbbsm-5780cfd05ace0795465222f13da48c40\">\n#top .hr.hr-invisible.av-k8sjbbsm-5780cfd05ace0795465222f13da48c40{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-k8sjbbsm-5780cfd05ace0795465222f13da48c40 hr-invisible  avia-builder-el-7  el_after_av_one_half  el_before_av_button '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p>\n<div  class='avia-button-wrap av-k8sg611j-b7340854fba4be54132b970901d8541d-wrap avia-button-center  avia-builder-el-8  el_after_av_hr  el_before_av_section  avia-builder-el-last '><a href='#download'  class='avia-button av-k8sg611j-b7340854fba4be54132b970901d8541d av-link-btn avia-icon_select-no avia-size-large avia-position-center avia-color-theme-color'   aria-label=\"Download het hele onderzoek\"><span class='avia_iconbox_title' >Download het hele onderzoek<\/span><\/a><\/div>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='cloudinnederland'  class='avia-section av-k8sgc3n0-fe2b3bc510c4d4accb337240473e22d7 main_color avia-section-default avia-no-border-styling  avia-builder-el-9  el_after_av_button  el_before_av_section  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-19267'><div class='entry-content-wrapper clearfix'>\n<section  class='av_textblock_section av-k8sgba48-dba6e789c38554a135b4c5db0bbe4aac '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>IT security in Nederland<\/h2>\n<\/div><\/section>\n<section  class='av_textblock_section av-k8sgaf07-b93e49473300a4d6a48620c2abfb24f2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p>IT-security staat vandaag de dag hoog op de agenda van elke IT-beslisser die zijn of haar data, processen en business koestert. De IT-beslisser moet vaak complexe omgevingen beheren, iets wat vaak door experts, zoals IT-professionals en ITdienstverleners, wordt uitgevoerd. Ze moeten cybergevaren tegenhouden, zoals phishing en ransomware aanvallen, die de digitale weerbaarheid van organisaties op de proef stellen. Verder moeten IT-beslissers inspelen en budget vrijmaken voor nieuwe situaties, zoals de vele thuiswerkplekken die na de COVID-19 zijn ontstaan.<\/p>\n<p>Genoeg redenen voor platformen Dutch IT-channel, Executive People en markt intelligentiebureau Smart Profile om onderzoek te doen naar de actuele staat van IT-security in Nederland en de trends van dit moment. Het onderzoek Dutch IT Security presenteert de actuele stand van zaken rond het<br \/>\ngebruik en adoptie van cybersecurity toepassingen bij IT-beslissers en het aanbod van IT-industrie in Nederland. Het geeft tevens een interessante blik hoe betrokken stakeholders de komende tijd hun IT-security omgeving verder optimaliseren om de digitale weerbaarheid te verstevigen. Dat doen ze niet alleen met technologie, maar ook met advies zoals security awareness.<\/p>\n<\/div><\/section>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-khym5bdq-8561f2ac7b4a739c467d4e6f0e58e6b1\">\n#top .hr.hr-invisible.av-khym5bdq-8561f2ac7b4a739c467d4e6f0e58e6b1{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-khym5bdq-8561f2ac7b4a739c467d4e6f0e58e6b1 hr-invisible  avia-builder-el-12  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<section  class='av_textblock_section av-k8sgaf07-b93e49473300a4d6a48620c2abfb24f2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 style=\"text-align: center;\">HET ONDERZOEKSTEAM<\/h3>\n<p><a href=\"https:\/\/smartprofile.io\/wp-content\/uploads\/2020\/09\/mob-3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-18387 aligncenter\" src=\"https:\/\/smartprofile.io\/wp-content\/uploads\/2020\/09\/mob-3-1030x414.jpg\" alt=\"\" width=\"1030\" height=\"414\" srcset=\"https:\/\/smartprofile.io\/wp-content\/uploads\/2020\/09\/mob-3-1030x414.jpg 1030w, https:\/\/smartprofile.io\/wp-content\/uploads\/2020\/09\/mob-3-300x121.jpg 300w, https:\/\/smartprofile.io\/wp-content\/uploads\/2020\/09\/mob-3-768x309.jpg 768w, https:\/\/smartprofile.io\/wp-content\/uploads\/2020\/09\/mob-3-1536x617.jpg 1536w, https:\/\/smartprofile.io\/wp-content\/uploads\/2020\/09\/mob-3-1500x603.jpg 1500w, https:\/\/smartprofile.io\/wp-content\/uploads\/2020\/09\/mob-3-705x283.jpg 705w, https:\/\/smartprofile.io\/wp-content\/uploads\/2020\/09\/mob-3.jpg 1707w\" sizes=\"auto, (max-width: 1030px) 100vw, 1030px\" \/><\/a><\/p>\n<\/div><\/section>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='executivesummary'  class='avia-section av-k8sgmqin-371d43d27f8d73ce498633e692c12c99 main_color avia-section-default avia-no-border-styling  avia-builder-el-14  el_after_av_section  el_before_av_section  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-19267'><div class='entry-content-wrapper clearfix'>\n<section  class='av_textblock_section av-k8sgechk-b026f38b45044d1619fc407aa5092815 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Over de tot standkoming van het onderzoek<\/h2>\n<\/div><\/section>\n<section  class='av_textblock_section av-k8sglm7h-b7971abe28a6401095e1ea63b8c3d8de '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><strong>IT Security in Nederland: de stand van zaken<\/strong><\/p>\n<p>Welk percentage van het IT-budget wordt toegekend aan security? Wat zijn de belangrijkste elementen in het totale securityplan? Wie is er in de lead omtrent security? Is er sprake van een single-vendor of multi-vendor strategie? Markt intelligentiebureau Smart Profile en Dutch IT-channel stelden onder andere deze vragen aan Nederlandse IT-beslissers en Channel partners. Het resultaat is gebundeld in de eerste editie van het Dutch IT Security onderzoek.<\/p>\n<p>Het onderzoek laat duidelijk zien dat de budgetten toenemen, er vele belangrijke onderdelen worden gekenmerkt en dat er meer aandacht is voor security awareness. Channel partners, zoals IT-dienstverleners, managed service providers en systeem integratoren, spelen hier ook sterker een rol door meer in de lead en\/of meer adviserend werk te verrichten. Tevens wordt er rondom het thema security veelal gekozen voor een multi-vendor strategie. Rond servicelevel agreements (sla) is de maximale geaccepteerde downtime van core systemen vaak vastgesteld op enkele uren.<\/p>\n<p>Het blijkt echter lastig om tot een consensus te komen omtrent de belangrijkste onderdelen van een totaal security plan, zo blijkt uit het Dutch IT Security onderzoek. Zo zijn er bij de Nederlandse organisaties wisselende rollen in de lead als het gaat om security en de handhaving van de AVG-richtlijnen. Dergelijke zaken wisselen sterk per organisatie. Een vervolgonderzoek is daarom nodig om hier meer duidelijkheid te kunnen geven. Feit is dat een security-strategie met de nodige technologie en betrokkenheid van mensen hand in hand gaat. IT-beslissers geven aan meer te investeren in het beveiligen van werkplekken, zoals van de vele thuiswerkers. Maar ook in zaken zoals security van het netwerk, security awareness, multi-factor authenticatie, cloud en applicaties.<\/p>\n<p>Met dit eerste Dutch IT Security onderzoek krijgt u een actueel inzicht waar de prioriteiten van IT-beslissers liggen als het om beveiliging gaat. Tevens is het interessant te lezen hoe channel partners inspelen op de toenemende vraag met multi-vendor toepassingen en consultancy zoals security awareness. Met dit onderzoek hopen we dat alle spelers in de Nederlandse ICTbranche bedrijven en overheden kunnen voorzien van krachtige cybersecurity toepassingen.<\/p>\n<p>Doe er uw voordeel mee!<\/p>\n<\/div><\/section>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='download'  class='avia-section av-k8sg6cin-05ed5fce41e28abda12fb0a5a20d1155 main_color avia-section-default avia-no-border-styling  avia-builder-el-17  el_after_av_section  avia-builder-el-last  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-19267'><div class='entry-content-wrapper clearfix'>\n<section  class='av_textblock_section av-k8sf9jyj-2bc6c00fabe2c69926cff152e7892487 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Download nu gratis<\/h2>\n\n<\/div><\/section>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='after_section_3'  class='main_color av_default_container_wrap container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-19267'><div class='entry-content-wrapper clearfix'>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":29,"featured_media":0,"parent":10876,"menu_order":110,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-19267","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security onderzoek 2020 - Smart Profile<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security onderzoek 2020 - Smart Profile\" \/>\n<meta property=\"og:url\" content=\"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"Smart Profile\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-26T10:20:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/smartprofile.io\/wp-content\/uploads\/2020\/09\/mob-3-1030x414.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Smart_Profile_\" \/>\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/\",\"url\":\"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/\",\"name\":\"Security onderzoek 2020 - Smart Profile\",\"isPartOf\":{\"@id\":\"https:\/\/smartprofile.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/smartprofile.io\/wp-content\/uploads\/2020\/09\/mob-3-1030x414.jpg\",\"datePublished\":\"2020-11-26T09:51:15+00:00\",\"dateModified\":\"2020-11-26T10:20:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/#primaryimage\",\"url\":\"https:\/\/smartprofile.io\/wp-content\/uploads\/2020\/09\/mob-3-1030x414.jpg\",\"contentUrl\":\"https:\/\/smartprofile.io\/wp-content\/uploads\/2020\/09\/mob-3-1030x414.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/smartprofile.io\/nl\/smart-profile-b2b-inzicht-analyse-and-activatie\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Knowledge base\",\"item\":\"https:\/\/smartprofile.io\/nl\/knowledge-base\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security onderzoek 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/smartprofile.io\/#website\",\"url\":\"https:\/\/smartprofile.io\/\",\"name\":\"Smart Profile\",\"description\":\"Smart Profile - B2B Market Intelligence and Demand Generation\",\"publisher\":{\"@id\":\"https:\/\/smartprofile.io\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/smartprofile.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/smartprofile.io\/#organization\",\"name\":\"Smart Profile\",\"url\":\"https:\/\/smartprofile.io\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/smartprofile.io\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/smartprofile.io\/wp-content\/uploads\/2018\/11\/logo.png\",\"contentUrl\":\"https:\/\/smartprofile.io\/wp-content\/uploads\/2018\/11\/logo.png\",\"width\":844,\"height\":200,\"caption\":\"Smart Profile\"},\"image\":{\"@id\":\"https:\/\/smartprofile.io\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/Smart_Profile_\",\"https:\/\/www.instagram.com\/smartprofilebenelux\/\",\"https:\/\/www.linkedin.com\/company\/smart-profile\",\"https:\/\/www.youtube.com\/channel\/UC_BzkIURcAGYNsMKJ6AsBIQ\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security onderzoek 2020 - Smart Profile","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/","og_locale":"nl_NL","og_type":"article","og_title":"Security onderzoek 2020 - Smart Profile","og_url":"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/","og_site_name":"Smart Profile","article_modified_time":"2020-11-26T10:20:57+00:00","og_image":[{"url":"https:\/\/smartprofile.io\/wp-content\/uploads\/2020\/09\/mob-3-1030x414.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@Smart_Profile_","twitter_misc":{"Geschatte leestijd":"9 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/","url":"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/","name":"Security onderzoek 2020 - Smart Profile","isPartOf":{"@id":"https:\/\/smartprofile.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/#primaryimage"},"image":{"@id":"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/smartprofile.io\/wp-content\/uploads\/2020\/09\/mob-3-1030x414.jpg","datePublished":"2020-11-26T09:51:15+00:00","dateModified":"2020-11-26T10:20:57+00:00","breadcrumb":{"@id":"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/#primaryimage","url":"https:\/\/smartprofile.io\/wp-content\/uploads\/2020\/09\/mob-3-1030x414.jpg","contentUrl":"https:\/\/smartprofile.io\/wp-content\/uploads\/2020\/09\/mob-3-1030x414.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/smartprofile.io\/nl\/knowledge-base\/security-onderzoek-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/smartprofile.io\/nl\/smart-profile-b2b-inzicht-analyse-and-activatie\/"},{"@type":"ListItem","position":2,"name":"Knowledge base","item":"https:\/\/smartprofile.io\/nl\/knowledge-base\/"},{"@type":"ListItem","position":3,"name":"Security onderzoek 2020"}]},{"@type":"WebSite","@id":"https:\/\/smartprofile.io\/#website","url":"https:\/\/smartprofile.io\/","name":"Smart Profile","description":"Smart Profile - B2B Market Intelligence and Demand Generation","publisher":{"@id":"https:\/\/smartprofile.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/smartprofile.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/smartprofile.io\/#organization","name":"Smart Profile","url":"https:\/\/smartprofile.io\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/smartprofile.io\/#\/schema\/logo\/image\/","url":"https:\/\/smartprofile.io\/wp-content\/uploads\/2018\/11\/logo.png","contentUrl":"https:\/\/smartprofile.io\/wp-content\/uploads\/2018\/11\/logo.png","width":844,"height":200,"caption":"Smart Profile"},"image":{"@id":"https:\/\/smartprofile.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/Smart_Profile_","https:\/\/www.instagram.com\/smartprofilebenelux\/","https:\/\/www.linkedin.com\/company\/smart-profile","https:\/\/www.youtube.com\/channel\/UC_BzkIURcAGYNsMKJ6AsBIQ\/"]}]}},"_links":{"self":[{"href":"https:\/\/smartprofile.io\/nl\/wp-json\/wp\/v2\/pages\/19267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smartprofile.io\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/smartprofile.io\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/smartprofile.io\/nl\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/smartprofile.io\/nl\/wp-json\/wp\/v2\/comments?post=19267"}],"version-history":[{"count":9,"href":"https:\/\/smartprofile.io\/nl\/wp-json\/wp\/v2\/pages\/19267\/revisions"}],"predecessor-version":[{"id":19290,"href":"https:\/\/smartprofile.io\/nl\/wp-json\/wp\/v2\/pages\/19267\/revisions\/19290"}],"up":[{"embeddable":true,"href":"https:\/\/smartprofile.io\/nl\/wp-json\/wp\/v2\/pages\/10876"}],"wp:attachment":[{"href":"https:\/\/smartprofile.io\/nl\/wp-json\/wp\/v2\/media?parent=19267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}