{"id":19686,"date":"2026-04-20T16:48:05","date_gmt":"2026-04-20T14:48:05","guid":{"rendered":"https:\/\/www.open-systems.com\/?p=19686"},"modified":"2026-04-20T16:51:21","modified_gmt":"2026-04-20T14:51:21","slug":"blockieren-oder-nicht-blockieren","status":"publish","type":"post","link":"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/","title":{"rendered":"Blockieren oder nicht blockieren"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":60,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[77],"tags":[166,88],"class_list":["post-19686","post","type-post","status-publish","format-standard","hentry","category-unkategorisiert","tag-datenflut","tag-network-transformation-de"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Blockieren oder nicht blockieren - Open Systems<\/title>\n<meta name=\"description\" content=\"Wie baut man ein Intrusion Prevention System, das in der Praxis funktioniert? Ein Blick hinter die Kulissen: Wie Geschwindigkeit, Pr\u00e4zision und Stabilit\u00e4t zusammenspielen, um Angriffe zu stoppen, bevor sie Schaden anrichten.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blockieren oder nicht blockieren Was ein IPS in der Praxis leisten muss\" \/>\n<meta property=\"og:description\" content=\"Bedrohungen zu stoppen klingt einfach. In der Realit\u00e4t ist es ein st\u00e4ndiger Balanceakt zwischen Geschwindigkeit, Pr\u00e4zision und m\u00f6glichst wenigen Fehlalarmen.Dieser Blick hinter die Kulissen zeigt, wie wir ein IPS gebaut haben, das nicht nur erkennt, sondern Angriffe stoppt, ohne den Betrieb zu st\u00f6ren.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/\" \/>\n<meta property=\"og:site_name\" content=\"Open Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/opensystemsag\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-20T14:48:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-20T14:51:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.open-systems.com\/wp-content\/uploads\/2026\/04\/Technical-Blog-Image_Building-an-IPS-for-Real-World-DE.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"626\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Barbara J\u00e4ggi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Blockieren oder nicht blockieren\" \/>\n<meta name=\"twitter:creator\" content=\"@securesdwan\" \/>\n<meta name=\"twitter:site\" content=\"@securesdwan\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/\"},\"author\":{\"name\":\"Barbara J\u00e4ggi\",\"@id\":\"https:\/\/www.open-systems.com\/de\/#\/schema\/person\/96ee72dbc191e2a801ed0e0dd1c5ab10\"},\"headline\":\"Blockieren oder nicht blockieren\",\"datePublished\":\"2026-04-20T14:48:05+00:00\",\"dateModified\":\"2026-04-20T14:51:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/\"},\"wordCount\":4,\"publisher\":{\"@id\":\"https:\/\/www.open-systems.com\/de\/#organization\"},\"keywords\":[\"Datenflut\",\"Network Transformation\"],\"articleSection\":[\"Unkategorisiert\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/\",\"url\":\"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/\",\"name\":\"Blockieren oder nicht blockieren - Open Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.open-systems.com\/de\/#website\"},\"datePublished\":\"2026-04-20T14:48:05+00:00\",\"dateModified\":\"2026-04-20T14:51:21+00:00\",\"description\":\"Wie baut man ein Intrusion Prevention System, das in der Praxis funktioniert? Ein Blick hinter die Kulissen: Wie Geschwindigkeit, Pr\u00e4zision und Stabilit\u00e4t zusammenspielen, um Angriffe zu stoppen, bevor sie Schaden anrichten.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.open-systems.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blockieren oder nicht blockieren\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.open-systems.com\/de\/#website\",\"url\":\"https:\/\/www.open-systems.com\/de\/\",\"name\":\"Open Systems\",\"description\":\"Secure Connectivity Made Simple\",\"publisher\":{\"@id\":\"https:\/\/www.open-systems.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.open-systems.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.open-systems.com\/de\/#organization\",\"name\":\"Open Systems\",\"url\":\"https:\/\/www.open-systems.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.open-systems.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.open-systems.com\/wp-content\/uploads\/2020\/02\/OS_Logo_Primary_BlackGreen.png\",\"contentUrl\":\"https:\/\/www.open-systems.com\/wp-content\/uploads\/2020\/02\/OS_Logo_Primary_BlackGreen.png\",\"width\":848,\"height\":656,\"caption\":\"Open Systems\"},\"image\":{\"@id\":\"https:\/\/www.open-systems.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/opensystemsag\",\"https:\/\/x.com\/securesdwan\",\"https:\/\/www.linkedin.com\/company\/opensystems\",\"https:\/\/www.youtube.com\/channel\/UCQ747zdWSoIm3fqmghqFcJQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.open-systems.com\/de\/#\/schema\/person\/96ee72dbc191e2a801ed0e0dd1c5ab10\",\"name\":\"Barbara J\u00e4ggi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.open-systems.com\/de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/243de0bbf81509b279a06dfae8318e7d77bcaf98a0e61668ba9bcf907ba775ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/243de0bbf81509b279a06dfae8318e7d77bcaf98a0e61668ba9bcf907ba775ed?s=96&d=mm&r=g\",\"caption\":\"Barbara J\u00e4ggi\"},\"url\":\"https:\/\/www.open-systems.com\/de\/blog\/author\/bjaeggi\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Blockieren oder nicht blockieren - Open Systems","description":"Wie baut man ein Intrusion Prevention System, das in der Praxis funktioniert? Ein Blick hinter die Kulissen: Wie Geschwindigkeit, Pr\u00e4zision und Stabilit\u00e4t zusammenspielen, um Angriffe zu stoppen, bevor sie Schaden anrichten.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/","og_locale":"de_DE","og_type":"article","og_title":"Blockieren oder nicht blockieren Was ein IPS in der Praxis leisten muss","og_description":"Bedrohungen zu stoppen klingt einfach. In der Realit\u00e4t ist es ein st\u00e4ndiger Balanceakt zwischen Geschwindigkeit, Pr\u00e4zision und m\u00f6glichst wenigen Fehlalarmen.Dieser Blick hinter die Kulissen zeigt, wie wir ein IPS gebaut haben, das nicht nur erkennt, sondern Angriffe stoppt, ohne den Betrieb zu st\u00f6ren.","og_url":"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/","og_site_name":"Open Systems","article_publisher":"https:\/\/www.facebook.com\/opensystemsag","article_published_time":"2026-04-20T14:48:05+00:00","article_modified_time":"2026-04-20T14:51:21+00:00","og_image":[{"width":1200,"height":626,"url":"https:\/\/www.open-systems.com\/wp-content\/uploads\/2026\/04\/Technical-Blog-Image_Building-an-IPS-for-Real-World-DE.png","type":"image\/png"}],"author":"Barbara J\u00e4ggi","twitter_card":"summary_large_image","twitter_title":"Blockieren oder nicht blockieren","twitter_creator":"@securesdwan","twitter_site":"@securesdwan","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/#article","isPartOf":{"@id":"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/"},"author":{"name":"Barbara J\u00e4ggi","@id":"https:\/\/www.open-systems.com\/de\/#\/schema\/person\/96ee72dbc191e2a801ed0e0dd1c5ab10"},"headline":"Blockieren oder nicht blockieren","datePublished":"2026-04-20T14:48:05+00:00","dateModified":"2026-04-20T14:51:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/"},"wordCount":4,"publisher":{"@id":"https:\/\/www.open-systems.com\/de\/#organization"},"keywords":["Datenflut","Network Transformation"],"articleSection":["Unkategorisiert"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/","url":"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/","name":"Blockieren oder nicht blockieren - Open Systems","isPartOf":{"@id":"https:\/\/www.open-systems.com\/de\/#website"},"datePublished":"2026-04-20T14:48:05+00:00","dateModified":"2026-04-20T14:51:21+00:00","description":"Wie baut man ein Intrusion Prevention System, das in der Praxis funktioniert? Ein Blick hinter die Kulissen: Wie Geschwindigkeit, Pr\u00e4zision und Stabilit\u00e4t zusammenspielen, um Angriffe zu stoppen, bevor sie Schaden anrichten.","breadcrumb":{"@id":"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.open-systems.com\/de\/blog\/blockieren-oder-nicht-blockieren\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.open-systems.com\/de\/"},{"@type":"ListItem","position":2,"name":"Blockieren oder nicht blockieren"}]},{"@type":"WebSite","@id":"https:\/\/www.open-systems.com\/de\/#website","url":"https:\/\/www.open-systems.com\/de\/","name":"Open Systems","description":"Secure Connectivity Made Simple","publisher":{"@id":"https:\/\/www.open-systems.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.open-systems.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.open-systems.com\/de\/#organization","name":"Open Systems","url":"https:\/\/www.open-systems.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.open-systems.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.open-systems.com\/wp-content\/uploads\/2020\/02\/OS_Logo_Primary_BlackGreen.png","contentUrl":"https:\/\/www.open-systems.com\/wp-content\/uploads\/2020\/02\/OS_Logo_Primary_BlackGreen.png","width":848,"height":656,"caption":"Open Systems"},"image":{"@id":"https:\/\/www.open-systems.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/opensystemsag","https:\/\/x.com\/securesdwan","https:\/\/www.linkedin.com\/company\/opensystems","https:\/\/www.youtube.com\/channel\/UCQ747zdWSoIm3fqmghqFcJQ"]},{"@type":"Person","@id":"https:\/\/www.open-systems.com\/de\/#\/schema\/person\/96ee72dbc191e2a801ed0e0dd1c5ab10","name":"Barbara J\u00e4ggi","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.open-systems.com\/de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/243de0bbf81509b279a06dfae8318e7d77bcaf98a0e61668ba9bcf907ba775ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/243de0bbf81509b279a06dfae8318e7d77bcaf98a0e61668ba9bcf907ba775ed?s=96&d=mm&r=g","caption":"Barbara J\u00e4ggi"},"url":"https:\/\/www.open-systems.com\/de\/blog\/author\/bjaeggi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.open-systems.com\/de\/wp-json\/wp\/v2\/posts\/19686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.open-systems.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.open-systems.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.open-systems.com\/de\/wp-json\/wp\/v2\/users\/60"}],"replies":[{"embeddable":true,"href":"https:\/\/www.open-systems.com\/de\/wp-json\/wp\/v2\/comments?post=19686"}],"version-history":[{"count":3,"href":"https:\/\/www.open-systems.com\/de\/wp-json\/wp\/v2\/posts\/19686\/revisions"}],"predecessor-version":[{"id":19768,"href":"https:\/\/www.open-systems.com\/de\/wp-json\/wp\/v2\/posts\/19686\/revisions\/19768"}],"wp:attachment":[{"href":"https:\/\/www.open-systems.com\/de\/wp-json\/wp\/v2\/media?parent=19686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.open-systems.com\/de\/wp-json\/wp\/v2\/categories?post=19686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.open-systems.com\/de\/wp-json\/wp\/v2\/tags?post=19686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}