{"id":1557,"date":"2019-11-18T13:03:05","date_gmt":"2019-11-18T13:03:05","guid":{"rendered":"https:\/\/www.teal-consulting.de\/sci\/"},"modified":"2026-01-19T21:53:14","modified_gmt":"2026-01-19T20:53:14","slug":"sci","status":"publish","type":"page","link":"https:\/\/www.teal-consulting.de\/en\/sci\/","title":{"rendered":"Secure Core Infrastructure Management"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; el_class=&#8221;header-sci&#8221;][vc_column][vc_empty_space height=&#8221;250&#8243; el_class=&#8221;space-header-mobile&#8221;][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][vc_column_text]\n<h1 style=\"text-align: center;\">Security is operational excellence<\/h1>\n[\/vc_column_text][vc_empty_space height=&#8221;50&#8243; el_class=&#8221;space-header-mobile-20&#8243;][vc_column_text]\n<h2 class=\"p1\" style=\"text-align: center;\"><span class=\"s1\" style=\"color: #ffffff;\">Only those who have their business processes and base infrastructure under control can safely operate their IT.<\/span><\/h2>\n[\/vc_column_text][vc_empty_space height=&#8221;100&#8243; el_class=&#8221;space-header-mobile-20&#8243;]<span data-type=\"normal\" data-hover-icon-color=\"rgba(255,255,255,0.6)\" class=\"qode_icon_shortcode  q_font_awsome_icon fa-lg pull-center \" style=\" \"><a class=\"anchor\" itemprop=\"url\" href=\"#down\" target=\"_self\"><i class=\"qodef-icon-linea-icon icon-arrows-down-double qode_icon_element\" style=\"font-size: 70px;color: #ffffff;\" ><\/i><\/a><\/span>[\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243; el_class=&#8221;space-header-mobile&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; anchor=&#8221;down&#8221;][vc_column][vc_empty_space height=&#8221;100&#8243;][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][vc_column_text]\n<h2 class=\"p1\" style=\"text-align: center;\"><span class=\"s1\">We secure your<\/span><\/h2>\n<h2 class=\"p1\" style=\"text-align: center;\"><span style=\"color: #000000;\"><strong><span class=\"s1\">base infrastructure<\/span><\/strong><\/span><b> <\/b><\/h2>\n[\/vc_column_text][vc_empty_space height=&#8221;50&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]We help you optimize, automate and secure your central infrastructure services, such as patch management, monitoring and software distribution \u2500 independent of an SAE implementation or as part of it.<\/p>\n<p>&nbsp;<\/p>\n<p>With our Secure Core Infrastructure Management (SCI), we ensure the secure operation of basic infrastructure services on the server side. Services may include virtualization, deployment, patch management, backup, restore and recovery, monitoring, logging, and vulnerability scanning.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]We help our customers to implement and operate these basic infrastructure services securely, efficiently and as automatically as possible in heterogeneous Windows and Linux environments, both on-premises and in cloud environments.<\/p>\n<p>&nbsp;<\/p>\n<p>Depending on the customer situation, SCI can be a stand-alone solution or a part of an SAE project for a secure administrative environment.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;100&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; background_image=&#8221;77&#8243;][vc_column][vc_empty_space height=&#8221;100&#8243;][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner el_class=&#8221;box-sae&#8221; width=&#8221;1\/3&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_column_text]\n<h2 class=\"p1\"><span class=\"s1\" style=\"color: #ffffff;\">Our<\/span><\/h2>\n<h2 class=\"p1\"><span class=\"s1\" style=\"color: #ffffff;\"><b>topics<\/b><\/span><\/h2>\n[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][vc_column_text]\n<p class=\"p1\"><span class=\"s1\" style=\"color: #ffffff;\"><b>Base technologies<\/b><\/span><\/p>\n[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;]<div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">DNS<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">File Services<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">WSUS \/ SCCM<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">SCOM<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">Hyper-V \/ VMM<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">PKI<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">...<\/p><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_column_text]\n<p class=\"p1\"><span class=\"s1\" style=\"color: #ffffff;\"><b>Process optimisation<\/b><\/span><\/p>\n[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;]<div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">Monitoring and Alerting<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">Patch management<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">Deployment and Infrastructure as Code<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">Vulnerability Management<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">ITSM<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">...<\/p><\/div>[vc_empty_space height=&#8221;20&#8243; el_class=&#8221;space_50&#8243;][vc_column_text]\n<p class=\"p1\"><span class=\"s1\" style=\"color: #ffffff;\"><b>Migrations and lifecycle updates<\/b><\/span><\/p>\n[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;]<div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">Operating system update<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">Application migrations<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">Active Directory Migrations \/ Mergers &amp; Acquisitions<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">...<\/p><\/div>[\/vc_column_inner][vc_column_inner el_class=&#8221;teaserbox-fabian whitebox-bluebracket-fabian&#8221; width=&#8221;1\/3&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_column_text]\n<h2 class=\"p1\" style=\"text-align: center;\"><span class=\"s1\" style=\"color: #000000;\"><b>Contact<\/b><\/span><\/h2>\n[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][vc_single_image image=&#8221;7267&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221; qode_css_animation=&#8221;&#8221; el_class=&#8221;image-manuel&#8221;][vc_empty_space height=&#8221;30&#8243;][vc_column_text css=&#8221;&#8221;]\n<p style=\"text-align: center;\">Your contact for<\/p>\n<p style=\"text-align: center;\">Secure Core Infrastructure (SCI)<\/p>\n<p style=\"text-align: center;\">is our Managing Director Fabian B\u00f6hm<\/p>\n[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;]<a  itemprop=\"url\" href=\"\/en\/contact\/\" target=\"_self\"  class=\"qbutton  default button-fabian  qode-button-shadow\" style=\"margin: auto; \">CONTACT<\/a>[vc_empty_space height=&#8221;20&#8243; el_class=&#8221;leer-sci-kontakt&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221; el_class=&#8221;box-sci&#8221;][vc_column_inner el_class=&#8221;box-sci&#8221; width=&#8221;1\/3&#8243; offset=&#8221;vc_hidden-lg vc_hidden-md&#8221;][vc_column_text]\n<h2 class=\"p1\"><span class=\"s1\" style=\"color: #ffffff;\">Our<\/span><\/h2>\n<h2 class=\"p1\"><span class=\"s1\" style=\"color: #ffffff;\"><b>topics<\/b><\/span><\/h2>\n[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][vc_column_text]\n<p class=\"p1\"><span class=\"s1\" style=\"color: #ffffff;\"><b>Base technologies<\/b><\/span><\/p>\n[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;]<div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">DNS<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">File Services<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">WSUS \/ SCCM<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">SCOM<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">Hyper-V \/ VMM<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">PKI<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">...<\/p><\/div>[\/vc_column_inner][vc_column_inner el_class=&#8221;sci-box-2-mobile&#8221; width=&#8221;1\/3&#8243; offset=&#8221;vc_hidden-lg vc_hidden-md&#8221;][vc_column_text]\n<p class=\"p1\"><span class=\"s1\" style=\"color: #ffffff;\"><b>Process optimisation<\/b><\/span><\/p>\n[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;]<div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">Monitoring and Alerting<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">Patch management<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">Deployment and Infrastructure as Code<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">Vulnerability Management<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">ITSM<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">...<\/p><\/div>[vc_empty_space height=&#8221;50&#8243; el_class=&#8221;space_50&#8243;][vc_column_text]\n<p class=\"p1\"><span class=\"s1\" style=\"color: #ffffff;\"><b>Migrations and lifecycle updates<\/b><\/span><\/p>\n[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;]<div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">Operating system update<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">Application migrations<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">Active Directory Migrations \/ Mergers &amp; Acquisitions<\/p><\/div><div class=\"q_icon_list\"><i class=\"qode_icon_font_awesome fa fa-chevron-right qode-ili-icon-holder transparent\" style=\"color: #ff2070;\" ><\/i><p style=\"color:#ffffff;font-size: 16px;font-weight: 400;\">...<\/p><\/div>[\/vc_column_inner][vc_column_inner el_class=&#8221;teaserbox-manuel whitebox-bluebracket-manuel&#8221; width=&#8221;1\/3&#8243; offset=&#8221;vc_hidden-lg vc_hidden-md&#8221;][vc_column_text]\n<h2 class=\"p1\" style=\"text-align: center;\"><span class=\"s1\" style=\"color: #000000;\"><b>Contact<\/b><\/span><\/h2>\n[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][vc_single_image image=&#8221;1278&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; qode_css_animation=&#8221;&#8221; el_class=&#8221;image-manuel&#8221;][vc_empty_space height=&#8221;20&#8243;][vc_column_text]\n<p style=\"text-align: center;\">Your contact for<\/p>\n<p style=\"text-align: center;\">Secure Core Infrastructure (SCI)<\/p>\n<p style=\"text-align: center;\">is TEAL Managing Director Manuel Hoffmann<\/p>\n[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;]<a  itemprop=\"url\" href=\"mailto:%20manuel.hoffmann@teal-consulting.de\" target=\"_self\"  class=\"qbutton  default button-fabian  qode-button-shadow\" style=\"margin: auto; \">CONTACT<\/a>[\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;100&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221;][vc_column][vc_empty_space height=&#8221;100&#8243;][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][vc_column_text]\n<h2 class=\"p1\" style=\"text-align: center;\"><span class=\"s1\">Our<\/span><\/h2>\n<h2 class=\"p1\" style=\"text-align: center;\"><span class=\"s1\"><b>References<\/b><\/span><\/h2>\n[\/vc_column_text][vc_empty_space height=&#8221;50&#8243;][vc_column_text]\n<p class=\"p1\" style=\"text-align: center;\"><span class=\"s1\">These are just a few of the best practices where TEAL has helped harden, protect and streamline customers\u2019 systems and IT infrastructure. <\/span><\/p>\n[\/vc_column_text][vc_empty_space height=&#8221;50&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;1092&#8243; img_size=&#8221;full&#8221; onclick=&#8221;custom_link&#8221; qode_css_animation=&#8221;&#8221; link=&#8221;linux-pipeline&#8221; el_class=&#8221;cover_boxes_sae_sci&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_column_text]\n<p class=\"p1\"><span class=\"s1\" style=\"color: #008081;\"><b>Public data centre operator \u2013 Linux RPM build pipeline<\/b><\/span><\/p>\n<p>&nbsp;<\/p>\n<p class=\"p2\"><span class=\"s1\">The development team of a public data centre operator in Austria couldn\u2019t focus its full capacity on the development of new features and products because, with each new build, it had to carry out numerous manual steps until the packages were developed, tested and deployed.<\/span><\/p>\n[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;]<a  itemprop=\"url\" href=\"http:\/\/linux-pipeline\" target=\"_self\"  class=\"qbutton  default\" style=\"\">Learn more<\/a>[vc_empty_space height=&#8221;30px&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;1093&#8243; img_size=&#8221;full&#8221; onclick=&#8221;custom_link&#8221; qode_css_animation=&#8221;&#8221; link=&#8221;telco-group&#8221; el_class=&#8221;cover_boxes_sae_sci&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_column_text]\n<p class=\"p1\"><span class=\"s1\" style=\"color: #008081;\"><b>Telco Group \u2013 Infrastructure modernisation<\/b><\/span><\/p>\n<p>&nbsp;<\/p>\n<p class=\"p2\"><span class=\"s1\">In order to increase the customer functionality of the largest IP TV solution in Germany with nearly 2 million customers even further, the provider decided to implement a new version of the Microsoft IP TV solution.\u00a0<\/span><\/p>\n[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221; el_class=&#8221;leererbereich-mobil&#8221;][vc_empty_space height=&#8221;75px&#8221; el_class=&#8221;leererbereich-desktop&#8221;]<a  itemprop=\"url\" href=\"http:\/\/telco-group\" target=\"_self\"  class=\"qbutton  default\" style=\"\">Learn more<\/a>[\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;center&#8221; css_animation=&#8221;&#8221;][vc_column_inner][vc_empty_space height=&#8221;50&#8243;]<a  itemprop=\"url\" href=\"\/en\/references\/\" target=\"_self\"  class=\"qbutton  default  qode-button-shadow\" style=\"\">ALL REFERENCES<\/a>[\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;100&#8243;][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; el_class=&#8221;header-sci&#8221;][vc_column][vc_empty_space height=&#8221;250&#8243; el_class=&#8221;space-header-mobile&#8221;][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;grid&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][vc_column_text] Security is operational excellence [\/vc_column_text][vc_empty_space height=&#8221;50&#8243; el_class=&#8221;space-header-mobile-20&#8243;][vc_column_text] Only those who have their business processes and base infrastructure under control can safely operate their IT. [\/vc_column_text][vc_empty_space height=&#8221;100&#8243; el_class=&#8221;space-header-mobile-20&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243; el_class=&#8221;space-header-mobile&#8221;][\/vc_column][\/vc_row][vc_row&#8230;<\/p>\n","protected":false},"author":5,"featured_media":1097,"parent":0,"menu_order":22,"comment_status":"closed","ping_status":"open","template":"full_width.php","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1557","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/pages\/1557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/comments?post=1557"}],"version-history":[{"count":12,"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/pages\/1557\/revisions"}],"predecessor-version":[{"id":1007369,"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/pages\/1557\/revisions\/1007369"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/media\/1097"}],"wp:attachment":[{"href":"https:\/\/www.teal-consulting.de\/en\/wp-json\/wp\/v2\/media?parent=1557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}