{"id":10,"date":"2022-11-25T13:34:08","date_gmt":"2022-11-25T13:34:08","guid":{"rendered":"https:\/\/pb-technology.com\/?page_id=10"},"modified":"2025-04-13T18:16:16","modified_gmt":"2025-04-13T16:16:16","slug":"about","status":"publish","type":"page","link":"https:\/\/pb-technology.com\/?page_id=10","title":{"rendered":"Unser Angebot"},"content":{"rendered":"\n<h2 id=\"wp-block-themeisle-blocks-advanced-heading-be81bef4\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-be81bef4\"><strong>UNSER ANGEBOT<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-1 wp-block-group-is-layout-flex\">\n<p><strong>Ihr professioneller Partner f\u00fcr IT-L\u00f6sungen<\/strong><strong><br><\/strong> Wir sind Ihre zuverl\u00e4ssigen Spezialisten f\u00fcr ma\u00dfgeschneiderte IT-L\u00f6sungen und bieten innovative Ans\u00e4tze f\u00fcr den Einsatz von Open Source Software, Netzwerkinfrastruktur, Security, VPN-L\u00f6sungen, Serverl\u00f6sungen sowie Monitoring und Alerting. Unabh\u00e4ngig vom Hersteller stellen wir Ihnen L\u00f6sungen zur Verf\u00fcgung, die Ihre individuellen Anforderungen erf\u00fcllen. Bevorzugt setzen wir auf Open Source Technologien, um Wartungskosten zu senken und den Total Cost of Ownership (TCO) zu reduzieren.<\/p>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-2 wp-block-group-is-layout-flex\">\n<p><\/p>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-349bcf9d63697c8839da8e8408961a9b\" style=\"color:#94c11e\"><strong>Unsere Expertise \u2013 Ihr Vorteil<\/strong><\/p>\n\n\n\n<p> Seit Jahren entwickeln wir ma\u00dfgeschneiderte Business-L\u00f6sungen auf Basis von Open Source Software, FreeBSD und Linux. Ein Auszug aus unserem Portfolio:<\/p>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-cf4d0151\" class=\"wp-block-themeisle-blocks-icon-list\">\n<div id=\"wp-block-themeisle-blocks-icon-list-item-9519a658\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-5.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\"><strong>Absicherung des E-Mail-Verkehrs:<\/strong> Mit Wall und Virenscannern<\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-c108aedb\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-5.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\"><strong>Schutz der Benutzer:<\/strong> Durch HTTP-Proxys und VPN-Server f\u00fcr Home-Office-Arbeitspl\u00e4tze und externe Zug\u00e4nge<\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-3cef9812\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-5.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\"><strong>Netzwerk-Management:<\/strong> Von Monitoring bis VoIP-L\u00f6sungen und Public Hotspots<\/p><\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-2e62464622f2e75d018743cefb141825\" style=\"color:#94c11e\"><strong>Unsere Leistungen im Detail:<\/strong><\/p>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-d203e749\" class=\"wp-block-themeisle-blocks-icon-list\">\n<div id=\"wp-block-themeisle-blocks-icon-list-item-c60dfece\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-6.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\">Consulting, Planung und Beratung<\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-bb74ea7e\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-6.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\">IT-Security: Firewalls, Virenschutz, Mailsicherheit, Appliances<\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-978a7d38\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-6.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\">Dezentralisierte Messaging- und Collaboration-L\u00f6sungen (z. B. Matrix \/ Element)<\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-e3d71b87\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-6.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\">Dezentralisierte Micro-Blogging-L\u00f6sungen (z. B. Mastodon)<\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-3324490b\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-6.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\">Hochverf\u00fcgbare L\u00f6sungen: Server-Spiegelung, Auto Failover<\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-106069e4\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-6.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\">VPN-L\u00f6sungen: IPSec, OpenVPN f\u00fcr Tele- und Home-Arbeitspl\u00e4tze<\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-8c8889b7\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-6.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\">Betriebssystem-Installation und -Betreuung: FreeBSD, Unix, Linux, Windows<\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-cb75afe4\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-6.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\">Vorkonfigurierte Komplettsysteme und All-in-One Server<\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-9d27ebaa\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-6.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\">Asterisk VOIP: Voice over IP-Telefonie-L\u00f6sungen<\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-4782979b\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-6.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\">PC und Serverbetreuung<\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-06a2fcaa\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-6.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\">Netzwerk\u00fcberwachung: Monitoring und Alerting<\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-c16fa976\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-6.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\">Web- und E-Commerce-L\u00f6sungen<\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-9b673899\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-6.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\">Schulung f\u00fcr Netzwerk und System<\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-cc22c13a\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-6.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\">Beratung, Planung, Support und Nachbetreuung<\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-7a4a4bdd\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-6.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\">E-Mail-Server-Alternativen mit Anbindungsm\u00f6glichkeit an Microsoft Outlook<\/p><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-icon-list-item-3992e9cb\" class=\"wp-block-themeisle-blocks-icon-list-item\"><img decoding=\"async\" src=\"https:\/\/pb-technology.com\/wp-content\/uploads\/2025\/04\/hackertl-6.png\"\/><p class=\"wp-block-themeisle-blocks-icon-list-item-content\">Virtualisierung f\u00fcr kleine und gro\u00dfe Unternehmen<\/p><\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-9c92fdc0847bc3b88ed20c2959f98332\" style=\"color:#94c11e\"><strong>Level 2 und Level 3 Unterst\u00fctzung<br><\/strong><\/p>\n\n\n\n<p>Wir bieten auch professionelle Level 2 und Level 3 Support f\u00fcr Ihre Mitarbeiter an, um sicherzustellen, dass Ihre IT reibungslos funktioniert.<\/p>\n\n\n\n<p><strong>Kontaktieren Sie uns, um mehr dar\u00fcber zu erfahren, wie wir Ihre IT-Bed\u00fcrfnisse mit effizienten und nachhaltigen L\u00f6sungen unterst\u00fctzen k\u00f6nnen.<\/strong><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ihr professioneller Partner f\u00fcr IT-L\u00f6sungen Wir sind Ihre zuverl\u00e4ssigen Spezialisten f\u00fcr ma\u00dfgeschneiderte IT-L\u00f6sungen und bieten innovative Ans\u00e4tze f\u00fcr den Einsatz von Open Source Software, Netzwerkinfrastruktur, Security, VPN-L\u00f6sungen, Serverl\u00f6sungen sowie Monitoring und Alerting. Unabh\u00e4ngig vom Hersteller stellen wir Ihnen L\u00f6sungen zur Verf\u00fcgung, die Ihre individuellen Anforderungen erf\u00fcllen. Bevorzugt setzen wir auf Open Source Technologien, um Wartungskosten &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/pb-technology.com\/?page_id=10\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Unser Angebot&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":198,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-10","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/pb-technology.com\/index.php?rest_route=\/wp\/v2\/pages\/10"}],"collection":[{"href":"https:\/\/pb-technology.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pb-technology.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pb-technology.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pb-technology.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10"}],"version-history":[{"count":12,"href":"https:\/\/pb-technology.com\/index.php?rest_route=\/wp\/v2\/pages\/10\/revisions"}],"predecessor-version":[{"id":182,"href":"https:\/\/pb-technology.com\/index.php?rest_route=\/wp\/v2\/pages\/10\/revisions\/182"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pb-technology.com\/index.php?rest_route=\/wp\/v2\/media\/198"}],"wp:attachment":[{"href":"https:\/\/pb-technology.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}