{"id":1510,"date":"2017-08-15T09:47:10","date_gmt":"2017-08-15T07:47:10","guid":{"rendered":"https:\/\https://www.iczgroup.com/web.i.cz\/?page_id=1510\/"},"modified":"2017-09-16T20:34:37","modified_gmt":"2017-09-16T18:34:37","slug":"security","status":"publish","type":"page","link":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/","title":{"rendered":"Security"},"content":{"rendered":"<p>[et_pb_section bb_built=&#8221;1&#8243; transparent_background_fb=&#8221;default&#8221; _builder_version=&#8221;3.0.63&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#d9f2fe&#8221; background_color_gradient_end=&#8221;#a6e2fa&#8221; background_color_gradient_type=&#8221;radial&#8221;][et_pb_row _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243;][et_pb_text _builder_version=&#8221;3.0.63&#8243; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<h1 style=\"text-align: center\">Security<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.0.63&#8243; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center\"><span style=\"font-size: large\">Considering the increasing reliance of everyday work and other activities on information technologies, the security of information systems has become a vital part of daily life.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;1_2&#8243;]<div class=\"et_pb_blurb et_pb_module et_pb_bg_layout_  et_pb_icon_0\">\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t<div class=\"et_pb_blurb_content\">\r\n\t\t\t\t\t<div class=\"et_pb_main_blurb_image\"><a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/\"><span class=\"et-pb-icon  icon-corners\" style=\"color: #003156;\">V<\/span><\/a><\/div>\r\n\t\t\t\t\t<div class=\"et_pb_blurb_container\">\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div> <!-- .et_pb_blurb_content -->\r\n\t\t\t<\/div> <!-- .et_pb_blurb -->[et_pb_text _builder_version=&#8221;3.0.63&#8243; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center\"><span style=\"font-size: x-large\"><a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/\"><strong>Information Security Assurance Services<\/strong><\/a><\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.0.63&#8243; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center\">Considering the increasing reliance of everyday work and other activities on information technologies, the security of information systems has become a vital part of daily life.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/&#8221; button_text=&#8221;MORE&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;3.0.63&#8243; custom_button=&#8221;on&#8221; button_text_color=&#8221;#003156&#8243; button_border_color=&#8221;#003156&#8243; button_use_icon=&#8221;off&#8221; background_color=&#8221;#7EBEC5&#8243; url_new_window=&#8221;off&#8221; background_layout=&#8221;light&#8221; button_letter_spacing=&#8221;0&#8243; button_icon_placement=&#8221;right&#8221; button_letter_spacing_hover=&#8221;0&#8243; \/][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243;]<div class=\"et_pb_blurb et_pb_module et_pb_bg_layout_  et_pb_icon_1\">\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t<div class=\"et_pb_blurb_content\">\r\n\t\t\t\t\t<div class=\"et_pb_main_blurb_image\"><a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/\"><span class=\"et-pb-icon  icon-corners\" style=\"color: #003156;\">b<\/span><\/a><\/div>\r\n\t\t\t\t\t<div class=\"et_pb_blurb_container\">\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div> <!-- .et_pb_blurb_content -->\r\n\t\t\t<\/div> <!-- .et_pb_blurb -->[et_pb_text _builder_version=&#8221;3.0.63&#8243; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center\"><span style=\"font-size: x-large\"><a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/\"><strong>Certified Information Systems <\/strong><\/a><\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.0.63&#8243; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center\">Today, there are large computer networks where there used to be only single computers. Formerly completely closed off, today they are securely interconnected. These are today\u2019s state-of the-art certified systems intended for processing confidential information.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/&#8221; button_text=&#8221;MORE&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;3.0.63&#8243; custom_button=&#8221;on&#8221; button_text_color=&#8221;#003156&#8243; button_border_color=&#8221;#003156&#8243; button_use_icon=&#8221;off&#8221; background_color=&#8221;#7EBEC5&#8243; url_new_window=&#8221;off&#8221; background_layout=&#8221;light&#8221; button_letter_spacing=&#8221;0&#8243; button_icon_placement=&#8221;right&#8221; button_letter_spacing_hover=&#8221;0&#8243; \/][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section bb_built=&#8221;1&#8243; transparent_background_fb=&#8221;default&#8221; _builder_version=&#8221;3.0.47&#8243;][et_pb_row _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;1_4&#8243;][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243;]<div class=\"et_pb_blurb et_pb_module et_pb_bg_layout_  et_pb_icon_2\">\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t<div class=\"et_pb_blurb_content\">\r\n\t\t\t\t\t<div class=\"et_pb_main_blurb_image\"><a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-systems-administration\/\"><span class=\"et-pb-icon  icon-corners\" style=\"color: #003156;\">E<\/span><\/a><\/div>\r\n\t\t\t\t\t<div class=\"et_pb_blurb_container\">\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div> <!-- .et_pb_blurb_content -->\r\n\t\t\t<\/div> <!-- .et_pb_blurb -->[et_pb_text _builder_version=&#8221;3.0.63&#8243; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center\"><span style=\"font-size: x-large\"><a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-systems-administration\/\"><strong>Information Systems Administration<\/strong><\/a><\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.0.63&#8243; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center\">The operation of information systems is linked to the operation of an infrastructure of information technologies, ensuring, monitoring and evaluating required availability, reliability, and efficiency, as well as addressing change requirements.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-systems-administration\/&#8221; button_text=&#8221;MORE&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;3.0.63&#8243; custom_button=&#8221;on&#8221; button_text_color=&#8221;#003156&#8243; button_border_color=&#8221;#003156&#8243; button_use_icon=&#8221;off&#8221; background_color=&#8221;#7EBEC5&#8243; url_new_window=&#8221;off&#8221; background_layout=&#8221;light&#8221; button_letter_spacing=&#8221;0&#8243; button_icon_placement=&#8221;right&#8221; button_letter_spacing_hover=&#8221;0&#8243; \/][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243;][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section bb_built=&#8221;1&#8243; transparent_background_fb=&#8221;default&#8221; _builder_version=&#8221;3.0.63&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#d9f2fe&#8221; background_color_gradient_end=&#8221;#a6e2fa&#8221; background_color_gradient_type=&#8221;radial&#8221;][et_pb_row _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243;][et_pb_text _builder_version=&#8221;3.0.63&#8243; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; border_style=&#8221;solid&#8221;] Security [\/et_pb_text][et_pb_text _builder_version=&#8221;3.0.63&#8243; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; border_style=&#8221;solid&#8221;] Considering the increasing reliance of everyday work and other activities on information technologies, the security of information systems has become a vital part of daily life. [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.0.47&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;1_2&#8243;][et_pb_text &hellip; <a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/\">Continued<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1275,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.4.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security &bull; ICZ Group<\/title>\n<meta name=\"description\" content=\"Security Considering the increasing reliance of everyday work and other activities on information technologies, the security of information systems has\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security &bull; ICZ Group\" \/>\n<meta property=\"og:description\" content=\"Security Considering the increasing reliance of everyday work and other activities on information technologies, the security of information systems has\" \/>\n<meta property=\"og:url\" content=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/\" \/>\n<meta property=\"og:site_name\" content=\"ICZ Group\" \/>\n<meta property=\"article:modified_time\" content=\"2017-09-16T18:34:37+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#organization\",\"name\":\"ICZ Group\",\"url\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/07\/icz-logo.png\",\"contentUrl\":\"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/07\/icz-logo.png\",\"width\":96,\"height\":47,\"caption\":\"ICZ Group\"},\"image\":{\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#website\",\"url\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/\",\"name\":\"ICZ Group\",\"description\":\"ICZ Group\",\"publisher\":{\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/#webpage\",\"url\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/\",\"name\":\"Security &bull; ICZ Group\",\"isPartOf\":{\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#website\"},\"datePublished\":\"2017-08-15T07:47:10+00:00\",\"dateModified\":\"2017-09-16T18:34:37+00:00\",\"description\":\"Security Considering the increasing reliance of everyday work and other activities on information technologies, the security of information systems has\",\"breadcrumb\":{\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products and Services\",\"item\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security &bull; ICZ Group","description":"Security Considering the increasing reliance of everyday work and other activities on information technologies, the security of information systems has","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/","og_locale":"en_US","og_type":"article","og_title":"Security &bull; ICZ Group","og_description":"Security Considering the increasing reliance of everyday work and other activities on information technologies, the security of information systems has","og_url":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/","og_site_name":"ICZ Group","article_modified_time":"2017-09-16T18:34:37+00:00","twitter_card":"summary","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#organization","name":"ICZ Group","url":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#logo","inLanguage":"en-US","url":"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/07\/icz-logo.png","contentUrl":"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/07\/icz-logo.png","width":96,"height":47,"caption":"ICZ Group"},"image":{"@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#logo"}},{"@type":"WebSite","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#website","url":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/","name":"ICZ Group","description":"ICZ Group","publisher":{"@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/#webpage","url":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/","name":"Security &bull; ICZ Group","isPartOf":{"@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#website"},"datePublished":"2017-08-15T07:47:10+00:00","dateModified":"2017-09-16T18:34:37+00:00","description":"Security Considering the increasing reliance of everyday work and other activities on information technologies, the security of information systems has","breadcrumb":{"@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/"},{"@type":"ListItem","position":2,"name":"Products and Services","item":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/"},{"@type":"ListItem","position":3,"name":"Security"}]}]}},"_links":{"self":[{"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages\/1510"}],"collection":[{"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/comments?post=1510"}],"version-history":[{"count":18,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages\/1510\/revisions"}],"predecessor-version":[{"id":9766,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages\/1510\/revisions\/9766"}],"up":[{"embeddable":true,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages\/1275"}],"wp:attachment":[{"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/media?parent=1510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}