AURUM Information Security Ontology
The AURUM Information Security Ontology provides unified and machine-readable information security knowledge sharing, enabling users to collaboratively ...
- Avoid using deprecated HTML tags.
Domain : www.xylem-technologies.com/de/aurum-information-security-ontology/
Character length : 66
Error! Using “meta keywords” is meaningless in a while.
Good! The OG (Open Graph) protocol is set on this website.
locale: de_DE
type: article
title: AURUM Information Security Ontology
description: The AURUM Information Security Ontology provides unified and machine-readable information security knowledge sharing, enabling users to collaboratively understand and extend the knowledge body.
url: https://www.xylem-technologies.com/de/aurum-information-security-ontology/
site_name: Energie- und Risikomanagement Software | XYLEM Technologies
https://xylem-technologies.com/robots.txt
User-agent | Disallowed for the search engines |
---|---|
* |
|
No info found.
Character length : 35
Good! The title’s length is between 10 and 70 characters.
Good! The text / code ratio is between 25 and 70 percent.
H1 | H2 | H3 | H4 | H5 | H6 |
---|---|---|---|---|---|
1 | 0 | 0 | 5 | 0 | 8 |
- <H1> AURUM
- <H4>
- <H4> Semantic risk management
- <H6> Share your corporate knowledge
- <H6> Multi-level Architecture
- <H6> Formalize your corporate knowledge
- <H6> Collaborative and web-based
- <H6> Efficient decision making
- <H6> Basis for risk management
- <H6> Automated Reasoning
- <H6> Legal compliance
- <H4> Kontaktieren Sie uns
- <H4> Aktuelle News
- <H4> Menü
- security42
- knowledge34
- threat21
- information18
- vulnerability17
- ontology15
- threats12
- management11
- risk11
- subontology10
- infrastructure9
- controls9
- base9
- windows7
- elements7
- compliance7
- standards7
- physical6
- unauthorized6
- access6
- vulnerabilities6
- exploited5
- standard5
- control5
- aurum5
- between5
- provides5
- occurrence5
- used5
- assets4
- specific4
- availability4
- decision4
- uns4
- machine-readable4
- resources4
- organization4
- services4
- news4
- described4
- der4
- level4
- provide4
- low4
- corresponding4
- automated4
- regarding3
- effective3
- organizations3
- company3
- corporate3
- forisk3
- implemented3
- able3
- rates3
- data3
- building3
- certain3
- doors3
- following3
word | title | descriptions | heading |
---|---|---|---|
security | |||
knowledge | |||
threat | |||
information | |||
vulnerability | |||
ontology |
- information security9
- knowledge base6
- security ontology4
- risk management4
- security knowledge3
- unauthorized access3
- threat gives rise2
Good! Every image has an alternative text attributes set on this website.
- https://www.xylem-technologies.com/wp-content/plugins/jch-optimize/assets/wp-content/plugins/gz/1/0/efdbe1536781ccf1483e2c5800d01e3e.js
- https://www.xylem-technologies.com/wp-content/plugins/jch-optimize/assets/wp-content/plugins/gz/1/0/3c2b3784894dd32d0699938aa91d212a.css
Internal links: 24
External links: 2