/en/43/index.html /en/blog/;
/en/42/Current-News.html /en/blog/;
/en/42/Aktuelle-Meldungen,10,1.html /en/blog/;
/en/42/Aktuelle-Meldungen,11,1.html /en/blog/;
/en/42/Aktuelle-Meldungen,1,1.html /en/blog/;
/en/42/Aktuelle-Meldungen,2,1.html /en/blog/;
/en/42/Aktuelle-Meldungen,3,1.html /en/blog/;
/en/42/Aktuelle-Meldungen,4,1.html /en/blog/;
/en/42/Aktuelle-Meldungen,5,1.html /en/blog/;
/en/42/Aktuelle-Meldungen,6,1.html /en/blog/;
/en/42/Aktuelle-Meldungen,7,1.html /en/blog/;
/en/42/Aktuelle-Meldungen,8,1.html /en/blog/;
/en/42/Aktuelle-Meldungen,9,1.html /en/blog/;
/de/43/index.html /blog/;
/de/42/Aktuelle-Meldungen,11,1.html /blog/;
/de/42/Aktuelle-Meldungen,10,1.html /blog/;
/de/42/Aktuelle-Meldungen,1,1.html /blog/;
/de/42/Aktuelle-Meldungen,2,1.html /blog/;
/de/42/Aktuelle-Meldungen,3,1.html /blog/;
/de/42/Aktuelle-Meldungen,4,1.html /blog/;
/de/42/Aktuelle-Meldungen,5,1.html /blog/;
/de/42/Aktuelle-Meldungen,6,1.html /blog/;
/de/42/Aktuelle-Meldungen,7,1.html /blog/;
/de/42/Aktuelle-Meldungen,8,1.html /blog/;
/de/42/Aktuelle-Meldungen,9,1.html /blog/;
/de/42/Aktuelle-Meldungen.html /blog/;
/en/2/Home.html /en/;
/de/2/Home.html /;
/de/43/posts/proboter_04/ /blog/proboter-04/;
/en/43/posts/proboter_04/ /en/blog/proboter-04/;
/de/43/posts/differential_cryptanalysis_2/ /blog/differential-cryptanalysis-2/;
/en/43/posts/differential_cryptanalysis_2/ /en/blog/differential-cryptanalysis-2/;
/en/74/Secure-Our-Streets-Conference,1,1,127.html /en/blog/secure-our-streets-conference-2022/;
/de/74/Secure-Our-Streets-Conference,1,1,127.html /blog/secure-our-streets-conference-2022/;
/en/74/SCHUTZWERK-is-ISO-27001-ISO-9001-and-TISAX-certified,1,1,126.html /en/blog/schutzwerk-ist-iso27001-iso9001-und-tisax-zertifiziert/;
/de/74/SCHUTZWERK-ist-nach-ISO-27001-ISO-9001-und-TISAX-zertifiziert,1,1,126.html /blog/schutzwerk-ist-iso27001-iso9001-und-tisax-zertifiziert/;
/de/43/posts/proboter_03/ /blog/proboter-03/;
/en/43/posts/proboter_03/ /en/blog/proboter-03/;
/de/43/advisories/schutzwerk-sa-2022-003/ /blog/schutzwerk-sa-2022-003/;
/en/43/advisories/schutzwerk-sa-2022-003/ /en/blog/schutzwerk-sa-2022-003/;
/advisories/schutzwerk-sa-2022-003/ /en/blog/schutzwerk-sa-2022-003/;
/de/43/posts/control_04_groups_kernel/ /blog/linux-container-cgroups-04-groups-kernel/;
/en/43/posts/control_04_groups_kernel/ /en/blog/linux-container-cgroups-04-groups-kernel/;
/de/72/Offene-Stellen.html /freie-stellen/;
/en/72/Current-Vacancies.html /en/vacancies/;
/vacancies /en/vacancies/;
/jobs /en/vacancies/;
/en/116/Certification.html /en/certification/;
/de/116/Zertifizierungen.html /zertifizierung/;
/en/74/Talk-about-phishing-attacks,1,1,125.html /en/blog/talk-about-phishing-attacks-at-10th-ulm-logistics-day/;
/de/74/SCHUTZWERK-haelt-einen-Vortrag-zu-Phishing-Angriffen-auf-dem-10-Ulmer-Logistiktag,1,1,125.html /blog/talk-about-phishing-attacks-at-10th-ulm-logistics-day/;
/en/74/BSides-Munich-onsite-again,1,1,124.html /en/blog/bsides-munich-onsite-again/;
/de/74/BSides-Munich-wieder-in-vor-Ort,1,1,124.html /blog/bsides-munich-onsite-again/;
/en/74/SCHUTZWERK-gives-an-interview-for-the-newspaper-regarding-the-data-leakage-at-Legoland,1,1,123.html /en/blog/interview-for-newspaper-regarding-data-leakage-at-legoland/;
/de/74/SCHUTZWERK-im-Zeitungs-Interview-zum-Datenleck-bei-Legoland,1,1,123.html /blog/interview-for-newspaper-regarding-data-leakage-at-legoland/;
/de/43/posts/proboter-video/ /blog/proboter-video/;
/en/43/posts/proboter-video/ /en/blog/proboter-video/;
/proboter /en/blog/proboter-video/;
/PROBoter /en/blog/proboter-video/;
/de/43/posts/proboter_02/ /blog/proboter-02/;
/en/43/posts/proboter_02/ /en/blog/proboter-02/;
/de/43/posts/telechips/ /blog/embedded-security-assessment-of-a-telechips-soc/;
/en/43/posts/telechips/ /en/blog/embedded-security-assessment-of-a-telechips-soc/;
/de/43/posts/statistical_modelling_of_timing_sidechannels/ /blog/statistical-modelling-of-timing-sidechannels/;
/en/43/posts/statistical_modelling_of_timing_sidechannels/ /en/blog/statistical-modelling-of-timing-sidechannels/;
/de/43/posts/escar21/ /blog/escar21/;
/en/43/posts/escar21/ /en/blog/escar21/;
/en/74/SCHUTZWERK-is-NEON-sponsor,2,1,121.html /en/blog/schutzwerk-ist-neon-sponsor/;
/de/74/SCHUTZWERK-ist-NEON-Sponsor,2,1,121.html /blog/schutzwerk-ist-neon-sponsor/;
/de/43/posts/control_groups_03_memory_cpu_freezer_dev/ /blog/linux-container-cgroups-03-memory-cpu-freezer-dev/;
/en/43/posts/control_groups_03_memory_cpu_freezer_dev/ /en/blog/linux-container-cgroups-03-memory-cpu-freezer-dev/;
/de/43/posts/differential_cryptanalysis_1/ /blog/differential-cryptanalysis-1/;
/en/43/posts/differential_cryptanalysis_1/ /en/blog/differential-cryptanalysis-1/;
/de/43/posts/control_groups_02_network_block_io/ /blog/linux-container-cgroups-02-network-block-io/;
/en/43/posts/control_groups_02_network_block_io/ /en/blog/linux-container-cgroups-02-network-block-io/;
/en/43/posts/methodology-iot-healthcare-devices_01/ /en/blog/methodology-iot-healthcare-devices-01/;
/de/43/posts/cgroups_01_intro/ /blog/linux-container-cgroups-01-intro/;
/en/43/posts/cgroups_01_intro/ /en/blog/linux-container-cgroups-01-intro/;
/de/43/posts/proboter_01/ /blog/proboter-01/;
/en/43/posts/proboter_01/ /en/blog/proboter-01/;
/de/43/posts/namespaces_05_kernel/ /blog/linux-container-namespaces05-kernel/;
/en/43/posts/namespaces_05_kernel/ /en/blog/linux-container-namespaces05-kernel/;
/de/43/posts/attacking_a_random_number_generator/ /blog/attacking-a-rng/;
/en/43/posts/attacking_a_random_number_generator/ /en/blog/attacking-a-rng/;
/de/43/posts/namespaces_04_user/ /blog/linux-container-namespaces04-user/;
/en/43/posts/namespaces_04_user/ /en/blog/linux-container-namespaces04-user/;
/de/43/posts/poweranalysis_2/ /blog/poweranalysis02/;
/en/43/posts/poweranalysis_2/ /en/blog/poweranalysis02/;
/de/43/posts/namespaces_03_pid_net/ /blog/linux-container-namespaces03-pid-net/;
/en/43/posts/namespaces_03_pid_net/ /en/blog/linux-container-namespaces03-pid-net/;
/de/43/posts/sd-wan/ /blog/sd-wan/;
/en/43/posts/sd-wan/ /en/blog/sd-wan/;
/en/74/Home-office-and-IT-security-in-times-of-COVID-19,2,1,120.html /en/blog/home-office-covid-19/;
/de/74/Home-Office-und-IT-Sicherheit-in-Zeiten-von-COVID-19,2,1,120.html /blog/home-office-covid-19/;
/de/43/posts/covid19malware/ /blog/covid19malware/;
/en/43/posts/covid19malware/ /en/blog/covid19malware/;
/de/43/posts/namespaces_02_mnt/ /blog/linux-container-namespaces02-mnt/;
/en/43/posts/namespaces_02_mnt/ /en/blog/linux-container-namespaces02-mnt/;
/de/74/SCHUTZWERK-COVID-19-Information,2,1,119.html /blog/covid-19-information/;
/de/43/posts/azuregenerat0r/ /blog/azuregenerat0r/;
/en/43/posts/azuregenerat0r/ /en/blog/azuregenerat0r/;
/en/74/SCHUTZWERK-IS-SPONSOR-OF-THE-11TH-GOD,2,1,118.html /en/blog/11-german-owasp-day/;
/de/74/SCHUTZWERK-IST-SPONSOR-DES-11-GOD,2,1,118.html /blog/11-german-owasp-day/;
/en/74/SCHUTZWERK-COOPERATES-WITH-THE-WEDELER-UNIVERSITY-ASSOCIATION,3,1,117.html /en/blog/hochschulkooperation-im-norden/;
/de/74/SCHUTZWERK-KOOPERIERT-MIT-DEM-WEDELER-HOCHSCHULBUND-WHB,3,1,117.html /blog/hochschulkooperation-im-norden/;
/de/43/posts/namespaces_01_intro/ /blog/linux-container-namespaces01-intro/;
/en/43/posts/namespaces_01_intro/ /en/blog/linux-container-namespaces01-intro/;
/en/74/SCHUTZWERK-IS-SILVER-SPONSOR-OF-ELBSIDES,3,1,115.html /en/blog/sponsor-elbsides/;
/de/74/SCHUTZWERK-IST-SILVER-SPONSOR-DER-ELBSIDES,3,1,115.html /blog/sponsor-elbsides/;
/de/43/posts/poweranalysis_1/ /blog/poweranalysis01/;
/en/43/posts/poweranalysis_1/ /en/blog/poweranalysis01/;
/de/74/Moin-moin-Neues-Buero-im-Herzen-von-Hamburg,3,1,114.html /blog/neues-buero-hamburg/;
/en/74/Moin-moin-New-office-in-the-heart-of-Hamburg,3,1,114.html /en/blog/neues-buero-hamburg/;
/en/74/Automotive-Security-Talk-at-Aalen-University,3,1,113.html /en/blog/vortrag-hs-aalen-2019/;
/de/74/Vortrag-zu-Automotive-Security-an-der-HS-Aalen,3,1,113.html /blog/vortrag-hs-aalen-2019/;
/de/74/SCHUTZWERK-CTF-Event-an-der-Hochschule-Aalen,3,1,112.html /blog/ctf-hs-aalen-2019/;
/en/74/SCHUTZWERK-CTF-Event-at-the-Aalen-University-of-Applied-Sciences,3,1,112.html /en/blog/ctf-hs-aalen-2019/;
/de/43/posts/linux_container_capabilities/ /blog/linux-container-capabilities/;
/en/43/posts/linux_container_capabilities/ /en/blog/linux-container-capabilities/;
/de/43/posts/linux_container_intro/ /blog/linux-container-intro/;
/en/43/posts/linux_container_intro/ /en/blog/linux-container-intro/;
/de/43/posts/pqcrypto/ /blog/pqcrypto/;
/en/43/posts/pqcrypto/ /en/blog/pqcrypto/;
/de/43/posts/guestlectures/ /blog/guestlectures/;
/en/43/posts/guestlectures/ /en/blog/guestlectures/;
/de/43/posts/tmte4pt/ /blog/threat-modeling-with-tmte4pt/;
/en/43/posts/tmte4pt/ /en/blog/threat-modeling-with-tmte4pt/;
/de/74/Machs-gut-2018-Hallo-2019,4,1,111.html /blog/machs-gut-2018-hallo-2019/;
/en/74/So-long-2018-Hello-2019,4,1,111.html /en/blog/machs-gut-2018-hallo-2019/;
/de/74/SCHUTZWERK-IST-SPONSOR-DES-10-GERMAN-OWASP-DAY,4,1,110.html /blog/schutzwerk-ist-sponsor-des-10-german-owasp-day/;
/en/74/SCHUTZWERK-AT-THE-10TH-GERMAN-OWASP-DAY,4,1,110.html /en/blog/schutzwerk-ist-sponsor-des-10-german-owasp-day/;
/de/43/posts/brucon/ /blog/brucon/;
/en/43/posts/brucon/ /en/blog/brucon/;
/de/43/posts/hardweario2018/ /blog/hardweario2018/;
/en/43/posts/hardweario2018/ /en/blog/hardweario2018/;
/de/74/SCHUTZWERK-auf-der-hardwear-io,4,1,109.html /blog/hardwear.io-2018/;
/en/74/SCHUTZWERK-sponsors-hardwear-io,4,1,109.html /en/blog/hardwear.io-2018/;
/en/74/Powerful-IT-security-for-the-car-of-the-future,4,1,108.html /en/blog/starke-it-sicherheit-fuer-das-auto-der-zukunft/;
/de/74/Starke-IT-Sicherheit-fuer-das-Auto-der-Zukunft,4,1,108.html /blog/starke-it-sicherheit-fuer-das-auto-der-zukunft/;
/de/43/posts/canalyzat0r/ /blog/canalyzat0r/;
/en/43/posts/canalyzat0r/ /en/blog/canalyzat0r/;
/en/74/Our-year-2017-Even-closer-to-our-customer,4,1,107.html /en/blog/unser-jahr-2017/;
/de/74/Unser-Jahr-2017-Noch-naeher-beim-Kunden,4,1,107.html /blog/unser-jahr-2017/;
/en/74/SCHUTZWERK-AT-THE-9TH-GERMAN-OWASP-DAY,5,1,106.html /en/blog/9-german-owasp-day/;
/de/74/SCHUTZWERK-IST-SPONSOR-DES-9-GERMAN-OWASP-DAY,5,1,106.html /blog/9-german-owasp-day/;
/en/74/CAPTURE-THE-FLAG-FREE-HACKING-WORKSHOP-AT-IT-SA,5,1,105.html /en/blog/it-sa-2017/;
/de/74/Capture-the-Flag-Kostenloser-Hacking-Workshop-auf-der-it-sa,5,1,105.html /blog/it-sa-2017/;
/de/74/SCHUTZWERK-ist-Sponsor-der-hardwear-io,5,1,103.html /blog/hardwear.io-2017/;
/en/74/SCHUTZWERK-sponsors-hardwear-io,5,1,103.html /en/blog/hardwear.io-2017/;
/de/74/CTF-Training-an-der-Uni-Ulm,5,1,104.html /blog/uniulm-ctf-2017/;
/en/74/CTF-Training-at-University-of-Ulm,5,1,104.html /en/blog/uniulm-ctf-2017/;
/de/74/Die-naechste-Generation-Sicherheitsexperten,5,1,102.html /blog/naechste-generation-sicherheitsexperten/;
/en/74/The-Next-Generation-of-Security-Experts,5,1,102.html /en/blog/naechste-generation-sicherheitsexperten/;
/de/74/Hacking-Workshop-an-der-Hochschule-Aalen,6,1,101.html /blog/hacking-workshop-hochschule-aalen/;
/en/74/Hacking-Workshop-at-Hochschule-Aalen,6,1,101.html /en/blog/hacking-workshop-hochschule-aalen/;
/de/74/Neue-Trainingsbekleidung-fuer-die-Handballer-des-SG-Ulm-Wiblingen,6,1,100.html /blog/neue-trainingsbekleidung-fuer-die-handballer.des-sg-ulm-wiblingen/;
/en/74/New-training-wear-for-the-handballers-of-SG-Ulm-Wiblingen,6,1,100.html /en/blog/neue-trainingsbekleidung-fuer-die-handballer.des-sg-ulm-wiblingen/;
/de/74/8-FURTWANGENER-HACKING-EVENT-HACK2IMPROVE-2016-MIT-SCHUTZWERK,6,1,99.html /blog/8-hack2improve-2016/;
/en/74/8-FURTWANGENER-HACKING-EVENT-HACK2IMPROVE-2016-WITH-SCHUTZWERK,6,1,99.html /en/blog/8-hack2improve-2016/;
/en/74/SCHUTZWERK-AT-THE-8TH-GERMAN-OWASP-DAY,6,1,98.html /en/blog/schutzwerk-ist-sponsor-des-8-german-owasp-day/;
/de/74/SCHUTZWERK-IST-SPONSOR-DES-8-GERMAN-OWASP-DAY,6,1,98.html /blog/schutzwerk-ist-sponsor-des-8-german-owasp-day/;
/en/74/Presentation-about-targeted-attacks-on-IT-networks,6,1,97.html /en/blog/vortrag-zum-thema-zielgerichtete-angriffe-auf-das-unternehmensnetzwerk/;
/de/74/Vortrag-zum-Thema-Zielgerichtete-Angriffe-auf-das-Unternehmensnetzwerk,6,1,97.html /blog/vortrag-zum-thema-zielgerichtete-angriffe-auf-das-unternehmensnetzwerk/;
/de/74/Neue-Website-strafferes-Portfolio-neue-Mitarbeiter,7,1,96.html /blog/neue-website-strafferes-portfolio-neue-mitarbeiter/;
/en/74/New-website-streamlined-portfolio-new-team-members,7,1,96.html /en/blog/neue-website-strafferes-portfolio-neue-mitarbeiter/;
/en/74/Presentation-on-Web-Security-from-the-Perspective-of-a-Penetration-Tester,7,1,95.html /en/blog/vortrag-zum-thema-web-security-aus-der-perspektive-eines-penetration-testers/;
/de/74/Vortrag-zum-Thema-Web-Security-aus-der-Perspektive-eines-Penetration-Testers,7,1,95.html /blog/vortrag-zum-thema-web-security-aus-der-perspektive-eines-penetration-testers/;
/en/15/About-Us.html /en/about-us/;
/en/11/Company.html /en/about-us/;
/de/45/Anfahrt-Parken.html /anfahrt-und-parken/;
/en/21/Assessment.html /en/assessment/;
/en/21/Pruefung.html /en/assessment/;
/en/12/Services.html /en/assessment/;
/assessments /en/assessment/;
/de/27/IT-Risikoassessment-nach-ISO-IEC-27005.html /pruefung/bedrohungs-und-risikoanalyse/;
/de/33/Beratung.html /beratung/;
/de/114/Cloud-Security-Assessment.html /pruefung/cloud-security-assessment/;
/en/114/Cloud-Security-Assessment.html /en/assessment/cloud-security-assessment/;
/en/33/Consulting.html /en/consulting/;
/en/33/Beratung.html /en/consulting/;
/en/60/Data-Protection.html /en/data/;
/de/60/Datenschutz.html /datenschutz/;
/en/45/Directions-Parking.html /en/directions/;
/en/79/Effectiveness-Economic-Efficiency-Assessment.html /en/consulting/effectiveness-and-economic-efficiency-assessment/;
/de/107/Embedded-Systems-Assessment.html /pruefung/embedded-security-assessment/;
/en/107/Embedded-Systems-Assessment.html /en/assessment/embedded-security-assessment/;
/de/28/Pruefung-Client-Systeme.html /pruefung/endpoint-security-assessment/;
/en/28/Assessment-of-Client-Systems.html /en/assessment/endpoint-security-assessment/;
/en/74/IT-security-is-eligible-for-funding,2,1,122.html /en/funding/;
/de/74/IT-Sicherheit-ist-foerderbar,2,1,122.html /foerderungen/;
/de/44/Ihre-Ansprechpartner.html /ansprechpartner/;
/de/14/Kontakt.html /ansprechpartner/;
/en/61/Imprint.html /en/imprint/;
/de/40/Incident-Response-Management.html /prozesse/incident-response-management/;
/en/40/Incident-Response-Management.html /en/process/incident-response-management/;
/en/34/Information-IT-Security.html /en/consulting/information-and-it-security/;
/en/38/Information-Security-Management-according-to-ISO-IEC-27001.html /en/process/information-security-management/;
/de/34/Informations-und-IT-Sicherheit.html /beratung/informations-und-it-sicherheit/;
/de/38/Informationssicherheitsmanagement-nach-ISO-IEC-27001.html /prozesse/informationssicherheitsmanagement/;
/en/32/IT-Forensics.html /en/assessment/it-forensics/;
/en/39/IT-Risk-Management-according-to-ISO-IEC-27005.html /en/process/it-risk-management-according-to-iso-iec-27005/;
/de/32/IT-Forensik.html /pruefung/it-forensik/;
/de/39/IT-Risikomanagement-nach-ISO-IEC-27005.html /prozesse/it-risikomanagement-nach-iso-iec-27005/;
/de/61/Impressum.html /impressum/;
/en/26/Maturity-Level-Analysis-of-Information-Security.html /en/assessment/maturity-level-analysis/;
/en/80/Maturity-Level-Optimization.html /en/consulting/maturity-level-optimization/;
/de/25/Mobile-Application-Security-Assessment.html /pruefung/mobile-application-security-assessment/;
/en/25/Mobile-Application-Security-Assessment.html /en/assessment/mobile-application-security-assessment/;
/de/20/Partnerschaften.html /partner/;
/en/20/Partnerships.html /en/partner/;
/en/22/Penetration-Test.html /en/assessment/penetration-test/;
/de/22/Penetrationstest.html /pruefung/penetrationstest/;
/en/37/Process.html /en/process/;
/en/37/Prozesse.html /en/process/;
/de/37/Prozesse.html /prozesse/;
/de/21/Pruefung.html /pruefung/;
/de/12/Leistungen.html /pruefung/;
/en/17/Reference-Projects.html /en/references/;
/de/17/Referenzprojekte.html /referenzen/;
/de/26/Reifegradanalyse-Informationssicherheit.html /pruefung/reifegradanalyse-der-informationssicherheit/;
/de/80/Reifegradoptimierung.html /beratung/reifegradoptimierung/;
/en/74/SCHUTZWERK-COVID-19-Information,2,1,119.html /en/blog/covid-19-information/;
/de/23/Schwachstellenanalyse.html /pruefung/schwachstellenanalyse/;
/en/36/Security-Incidents.html /en/consulting/security-incidents/;
/de/36/Sicherheitsvorfaelle.html /beratung/sicherheitsvorfaelle/;
/en/62/Sitemap.html /en/sitemap/;
/de/62/Sitemap.html /sitemap/;
/de/29/Social-Engineering.html /pruefung/social-engineering-assessment/;
/de/77/Social-Engineering-mit-Schwerpunkt-Zutrittsschutz.html /pruefung/social-engineering-assessment/;
/de/78/Social-Engineering-mit-Schwerpunkt-Informationsschutz.html /pruefung/social-engineering-assessment/;
/en/29/Social-Engineering.html /en/assessment/social-engineering-assessment/;
/en/77/Social-Engineering-focussed-on-Access-Control.html /en/assessment/social-engineering-assessment/;
/en/78/Social-Engineering-focussed-on-Information-Protection.html /en/assessment/social-engineering-assessment/;
/en/16/Team.html /en/team/;
/en/76/Jakob-Pietzka,17.html /en/team/;
/en/76/Michael-Schaefer,18.html /en/team/;
/de/16/Team.html /team/;
/de/76/Michael-Schaefer,18.html /team/;
/de/76/Jakob-Pietzka,17.html /team/;
/en/27/IT-Risk-Assessment-according-to-ISO-IEC-27005.html /en/assessment/threat-and-risk-assessment/;
/en/23/Vulnerability-Analysis.html /en/assessment/vulnerability-analysis/;
/de/73/Warum-bewerben.html /warum-bewerben/;
/de/24/Web-Application-Security-Assessment.html /pruefung/web-application-security-assessment/;
/en/24/Web-Application-Security-Assessment.html /en/assessment/web-application-security-assessment/;
/en/73/Why-apply.html /en/apply/;
/de/15/Wir-ueber-uns.html /wir-ueber-uns/;
/de/11/Unternehmen.html /wir-ueber-uns/;
/de/79/Wirksamkeits-und-Wirtschaftlichkeitsbetrachtung.html /beratung/wirksamkeits-und-wirtschaftlichkeitsbetrachtung/;
/en/44/Your-Points-of-Contact.html /en/contact/;
/en/14/Kontakt.html /en/contact/;