{"id":1638,"date":"2017-08-21T13:18:24","date_gmt":"2017-08-21T11:18:24","guid":{"rendered":"https:\/\https://www.iczgroup.com/web.i.cz\/?page_id=1638\/"},"modified":"2025-04-07T09:29:48","modified_gmt":"2025-04-07T07:29:48","slug":"certified-information-systems","status":"publish","type":"page","link":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/","title":{"rendered":"Certified Information Systems"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.4.2&#8243; background_color=&#8221;#003156&#8243; custom_padding=&#8221;0px||0px|&#8221; transparent_background=&#8221;off&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;0px||0px|&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; background_position=&#8221;top_left&#8221; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;]<div class=\"icz-submenu et_pb_submenu_0\"><div class=\"icz-submenu__wrap\"><a href=\"#purpose\" target=\"_self\">Purpose<\/a><a href=\"#features\" target=\"_self\">Features<\/a><a href=\"#products\" target=\"_self\">Products<\/a><a href=\"#references\" target=\"_self\">References<\/a><\/div><\/div>[\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#d9f2fe&#8221; background_color_gradient_end=&#8221;#a6e2fa&#8221; background_color_gradient_type=&#8221;radial&#8221; custom_padding=&#8221;76.796875px|0px|76px|0px&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.4.2&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<blockquote>\n<h1 style=\"text-align: center;\">Certified Information Systems<\/h1>\n<\/blockquote>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center\"><span style=\"font-size: large\">Today, there are large computer networks where there used to be only single computers. Formerly completely closed off, today they are securely interconnected. These are today\u2019s state-of the-art certified systems intended for processing confidential information. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;zamereni&#8221; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h2 style=\"text-align: center\">TARGETING \/ PURPOSE OF THE SOLUTION, WHO IT IS GOOD FOR<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center\">The time when a single PC with a removable hard disc stored in a safe was enough to process confidential information is gone forever. Today\u2019s user requires relevant applications, sufficient user comfort, the possibility to work in a team and, last but not least, a permanently and effectively available information system per se.<\/p>\n<p>Today, a security architect who designs information systems for confidential information processing must therefore take account of requirements for security as well as of users as early as in the proposal for the system architecture. On the one hand, there are strict security requirements arising from valid legislation and the evaluator, while on the other, there are users who require sufficient efficiency and performance. To satisfy these requirements, the architect must have extensive knowledge of both security and information technologies as well as appropriate available certified cryptographic and security means.<\/p>\n<p>S.ICZ a.s. employs experienced security architects who participated in the development of currently the largest certified information systems in the Czech Republic. At the same time, S.ICZ a.s. develops and produces certified cryptographic systems that, for instance, enable placing a workstation in a user\u2019s office without any restrictions concerning the availability of a physically protected communication infrastructure.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;charakteristika&#8221; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#d9f2fe&#8221; background_color_gradient_end=&#8221;#a6e2fa&#8221; background_color_gradient_type=&#8221;radial&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h2 style=\"text-align: center\">DESCRIPTION, FEATURES, AND FUNCTIONALITY OF THE SOLUTION<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: left\">S.ICZ a.s. designs, implements and supports certified information systems intended for processing confidential information with the following basic parameters:<\/p>\n<p>Based on the level of confidentiality of the processed information:<br \/>\na.\u00a0RESTRICTED<br \/>\nb.\u00a0CONFIDENTIAL<br \/>\nc.\u00a0SECRET<br \/>\nd.\u00a0TOP SECRET<\/p>\n<p>Based on the information category:<br \/>\na.\u00a0CZ<br \/>\nb.\u00a0EU<br \/>\nc.\u00a0NATO<br \/>\nd.\u00a0CRYPTO<\/p>\n<p>Based on the security operational mode:<br \/>\na.\u00a0restricted security operational mode<br \/>\nb.\u00a0top level security operational mode<br \/>\nc.\u00a0top level security operational mode with formal control of access to the information<br \/>\nd.\u00a0multi-level security operational mode<\/p>\n<p>Based on the extent:<br \/>\na.\u00a0small-scale information systems<br \/>\nb.\u00a0large-scale information systems of a single organization<br \/>\nc.\u00a0large-scale information systems across more organizations<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;dalsi-info&#8221; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h2 style=\"text-align: center\">ADDITIONAL INFORMATION, SUMMARY<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: left\">S.ICZ a.s. offers the following development services:<\/p>\n<p>a.\u00a0development of secure applications (applications with security guarantees)<br \/>\nb.\u00a0development of secure interfaces allowing for external information exchange<br \/>\nc.\u00a0development of secure system extensions for the OS<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;produkty&#8221; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#d9f2fe&#8221; background_color_gradient_end=&#8221;#a6e2fa&#8221; background_color_gradient_type=&#8221;radial&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.4.2&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<blockquote>\n<h2 style=\"text-align: center;\">List of products<\/h2>\n<\/blockquote>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/Lanpcs_ALL.png&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; border_style=&#8221;solid&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h3>LANPCS<\/h3>\n<p>The LANPCS certified national cryptographic tool protects the network communication of workstations intended for processing confidential information.<\/p>\n<p style=\"text-align: center\">\n[\/et_pb_text]<div class=\"et_pb_blurb icon-next-to-text-wrapper et_pb_module et_pb_bg_layout_light  et_pb_icon_next_to_text_0\">\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t<div class=\"et_pb_blurb_content\">\r\n\t\t\t\t\t<div class=\"icon-next-to-text next-to-text-without-icon-corners\">\r\n                <div class=\"beside-icon-part\">\r\n                    <div class=\"et_pb_main_blurb_image\"><a href=\"#\"><span class=\"et-pb-icon \" style=\"color: #0593d3;\">s<\/span><\/a><\/div>\r\n                <\/div>\r\n                <div class=\"beside-text-part\"><strong><a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/ICZ_PL_ICZ_LANPCS-RG2_EN.pdf\">Product list to download<\/a><\/strong><\/p>\n<p style=\"text-align: center\">\n<p style=\"text-align: center\"><\/div>\r\n            <\/div> \r\n\t\t\t\t\t<div class=\"et_pb_blurb_container\">\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div> <!-- .et_pb_blurb_content -->\r\n\t\t\t<\/div> <!-- .et_pb_blurb -->[\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/PCS1_all2.png&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; border_style=&#8221;solid&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h3>PCS1<\/h3>\n<p>The PCS1 certified national cryptographic tool ensures the comprehensive protection of confidential information on a workstation intended for processing confidential information up to, and including, the \u201cSECRET\u201d confidentiality level..<\/p>\n<p style=\"text-align: center\">\n[\/et_pb_text]<div class=\"et_pb_blurb icon-next-to-text-wrapper et_pb_module et_pb_bg_layout_light  et_pb_icon_next_to_text_1\">\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t<div class=\"et_pb_blurb_content\">\r\n\t\t\t\t\t<div class=\"icon-next-to-text next-to-text-without-icon-corners\">\r\n                <div class=\"beside-icon-part\">\r\n                    <div class=\"et_pb_main_blurb_image\"><a href=\"#\"><span class=\"et-pb-icon \" style=\"color: #0593d3;\">s<\/span><\/a><\/div>\r\n                <\/div>\r\n                <div class=\"beside-text-part\"><strong><a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/SICZ_PL_SEC_PCS1e_EN_1610_PRINT_02.pdf\">Product list to download<\/a><\/strong><\/p>\n<p style=\"text-align: center\"><\/div>\r\n            <\/div> \r\n\t\t\t\t\t<div class=\"et_pb_blurb_container\">\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div> <!-- .et_pb_blurb_content -->\r\n\t\t\t<\/div> <!-- .et_pb_blurb -->[\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/20170915_CSP-II_MicroCzech_ALL.jpg&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; border_style=&#8221;solid&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h3>CSP-II MicroCzech<\/h3>\n<p>This certified cryptographic tool enables the integration of certified cryptography into the Crypto API subsystem intended for the processing of confidential information up to the \u201cCONFIDENTIAL\u201d confidentiality level.<\/p>\n<p style=\"text-align: center\">\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/20150518_AirGap_02.jpg&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; border_style=&#8221;solid&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221;][\/et_pb_image][et_pb_text admin_label=&#8221;AirGap 02&#8243; _builder_version=&#8221;4.4.2&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h3>AirGap 02<\/h3>\n<p>Two-way information transfer between two information systems with maintained galvanic separation of those systems. AirGap 02 brings the real possibility of information exchange between certified information systems intended for the processing of confidential information and non-certified information systems.<\/p>\n<p style=\"text-align: center;\">\n[\/et_pb_text]<div class=\"et_pb_blurb icon-next-to-text-wrapper et_pb_module et_pb_bg_layout_light  et_pb_icon_next_to_text_2\">\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t<div class=\"et_pb_blurb_content\">\r\n\t\t\t\t\t<div class=\"icon-next-to-text next-to-text-without-icon-corners\">\r\n                <div class=\"beside-icon-part\">\r\n                    <div class=\"et_pb_main_blurb_image\"><a href=\"#\"><span class=\"et-pb-icon \" style=\"color: #0593d3;\">s<\/span><\/a><\/div>\r\n                <\/div>\r\n                <div class=\"beside-text-part\"><strong><a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/ICZ_PL_SEC_AirGap02_EN_1610_PRINT_02.pdf\">Product list to download<\/a><\/strong><\/p>\n<p style=\"text-align: center\"><\/div>\r\n            <\/div> \r\n\t\t\t\t\t<div class=\"et_pb_blurb_container\">\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div> <!-- .et_pb_blurb_content -->\r\n\t\t\t<\/div> <!-- .et_pb_blurb -->[\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/default-placeholder.png&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h3>Security separation block (BOB)<\/h3>\n<p>designed to ensure data exchange between systems that must be mutually separated at the network layer, for example systems working under the administration of different authorities (which do not trust each other).<\/p>\n<p style=\"text-align: center\">\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/default-placeholder.png&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h3>Comprehensive services in the design, construction, certification support, and running of certified information systems<\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\">\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/default-placeholder.png&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h3>Specialized services in the design and implementation of secured applications (guaranteed applications)<\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\">\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/default-placeholder.png&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h3>Specialized services in the design and implementation of security interfaces for certified information systems<\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\">\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.4.2&#8243; background_color=&#8221;#003156&#8243; custom_padding=&#8221;0px||0px|&#8221; transparent_background=&#8221;off&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;0px||0px|&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; background_position=&#8221;top_left&#8221; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#d9f2fe&#8221; background_color_gradient_end=&#8221;#a6e2fa&#8221; background_color_gradient_type=&#8221;radial&#8221; custom_padding=&#8221;76.796875px|0px|76px|0px&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.4.2&#8243; border_style=&#8221;solid&#8221;] Certified Information Systems [\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;] Today, there are large computer networks where there used to be only single computers. Formerly &hellip; <a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/\">Continued<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1510,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.4.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Certified Information Systems &bull; ICZ Group<\/title>\n<meta name=\"description\" content=\"Certified Information Systems Today, there are large computer networks where there used to be only single computers. Formerly completely closed off, today\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Certified Information Systems &bull; ICZ Group\" \/>\n<meta property=\"og:description\" content=\"Certified Information Systems Today, there are large computer networks where there used to be only single computers. Formerly completely closed off, today\" \/>\n<meta property=\"og:url\" content=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"ICZ Group\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-07T07:29:48+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#organization\",\"name\":\"ICZ Group\",\"url\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/07\/icz-logo.png\",\"contentUrl\":\"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/07\/icz-logo.png\",\"width\":96,\"height\":47,\"caption\":\"ICZ Group\"},\"image\":{\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#website\",\"url\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/\",\"name\":\"ICZ Group\",\"description\":\"ICZ Group\",\"publisher\":{\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/#webpage\",\"url\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/\",\"name\":\"Certified Information Systems &bull; ICZ Group\",\"isPartOf\":{\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#website\"},\"datePublished\":\"2017-08-21T11:18:24+00:00\",\"dateModified\":\"2025-04-07T07:29:48+00:00\",\"description\":\"Certified Information Systems Today, there are large computer networks where there used to be only single computers. Formerly completely closed off, today\",\"breadcrumb\":{\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products and Services\",\"item\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\",\"item\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Certified Information Systems\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Certified Information Systems &bull; ICZ Group","description":"Certified Information Systems Today, there are large computer networks where there used to be only single computers. Formerly completely closed off, today","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/","og_locale":"en_US","og_type":"article","og_title":"Certified Information Systems &bull; ICZ Group","og_description":"Certified Information Systems Today, there are large computer networks where there used to be only single computers. Formerly completely closed off, today","og_url":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/","og_site_name":"ICZ Group","article_modified_time":"2025-04-07T07:29:48+00:00","twitter_card":"summary","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#organization","name":"ICZ Group","url":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#logo","inLanguage":"en-US","url":"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/07\/icz-logo.png","contentUrl":"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/07\/icz-logo.png","width":96,"height":47,"caption":"ICZ Group"},"image":{"@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#logo"}},{"@type":"WebSite","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#website","url":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/","name":"ICZ Group","description":"ICZ Group","publisher":{"@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/#webpage","url":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/","name":"Certified Information Systems &bull; ICZ Group","isPartOf":{"@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#website"},"datePublished":"2017-08-21T11:18:24+00:00","dateModified":"2025-04-07T07:29:48+00:00","description":"Certified Information Systems Today, there are large computer networks where there used to be only single computers. Formerly completely closed off, today","breadcrumb":{"@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/certified-information-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/"},{"@type":"ListItem","position":2,"name":"Products and Services","item":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/"},{"@type":"ListItem","position":3,"name":"Security","item":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/"},{"@type":"ListItem","position":4,"name":"Certified Information Systems"}]}]}},"_links":{"self":[{"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages\/1638"}],"collection":[{"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/comments?post=1638"}],"version-history":[{"count":20,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages\/1638\/revisions"}],"predecessor-version":[{"id":37742,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages\/1638\/revisions\/37742"}],"up":[{"embeddable":true,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages\/1510"}],"wp:attachment":[{"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/media?parent=1638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}