{"id":1653,"date":"2017-08-21T13:26:21","date_gmt":"2017-08-21T11:26:21","guid":{"rendered":"https:\/\https://www.iczgroup.com/web.i.cz\/?page_id=1653\/"},"modified":"2020-04-28T15:40:23","modified_gmt":"2020-04-28T13:40:23","slug":"security","status":"publish","type":"page","link":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/security\/","title":{"rendered":"Secure communication"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.4.2&#8243; background_color=&#8221;#003156&#8243; custom_padding=&#8221;0px||0px|&#8221; hover_enabled=&#8221;0&#8243; transparent_background=&#8221;off&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;0px||0px|&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; background_position=&#8221;top_left&#8221; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;]<div class=\"icz-submenu et_pb_submenu_0\"><div class=\"icz-submenu__wrap\"><a href=\"#zamereni\" target=\"_self\">TARGETING<\/a><a href=\"#charakteristika\" target=\"_self\">DESCRIPTION<\/a><a href=\"#produkty\" target=\"_self\">PRODUCTS<\/a><\/div><\/div>[\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#d9f2fe&#8221; background_color_gradient_end=&#8221;#a6e2fa&#8221; background_color_gradient_type=&#8221;radial&#8221; custom_padding=&#8221;76.796875px|0px|76px|0px&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<h1 style=\"text-align: center\">Safe Communication<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<h4 style=\"text-align: center\"><span style=\"font-size: 20px\">The boom in communication technologies is accompanied by more and more threats that can constitute a serious hazard. These can be combatted with a suitable combination of state-of-the-art technologies offered by ICZ.<\/span><\/h4>\n<h4 style=\"text-align: center\"><span style=\"font-size: 20px\">\u00a0<\/span><\/h4>\n<p style=\"text-align: center\"><span style=\"font-size: 20px\">Design and development of a safe communication infrastructure<\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-size: 20px\">\u00a0<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;zamereni&#8221; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<h1 style=\"text-align: center\">TARGETING \/ PURPOSE OF THE SOLUTION, WHO IT IS GOOD FOR<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center\"><span style=\"font-size: 20px\">Today, the commercial success of an organisation depends on working with electronic data; therefore, it is necessary to efficiently and flexibly react to all risks that can damage data, compromise them, or prevent access to them. The solutions provided are suitable for organisations of any size \u2013 they are designed to effectively eliminate potential security risks while taking account of the required level of network and infrastructure security.<\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-size: 20px\">\u00a0<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;charakteristika&#8221; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#d9f2fe&#8221; background_color_gradient_end=&#8221;#a6e2fa&#8221; background_color_gradient_type=&#8221;radial&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<h2 style=\"text-align: center\">DESCRIPTION, FEATURES, AND FUNCTIONALITY OF THE SOLUTION<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center\"><span style=\"font-size: 20px\">The offered solution comprises several stages, starting with a thorough analysis of the customer\u2019s needs and resulting in the optimal security of the communication infrastructure using a suitable combination of functions and products. ICZ ensures the security of the communication infrastructure per se, as well as network access security, end station and mobile device security, and also SCADA industrial systems security. ICZ also offers proactive network security supervision (SIEM) and security audits, including risk assessment.<\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-size: 20px\">\u00a0<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;dalsi-info&#8221; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<h2 style=\"text-align: center\">ADDITIONAL INFORMATION, SUMMARY<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center\"><span style=\"font-size: 20px\">The ICZ group provides comprehensive services ranging from the design and selection of suitable technologies, through implementation and administration, to testing and audits of already operated solutions. Qualified consultants also provide security training and ensure that staff knowledge is up to date. They regularly evaluate all provided systems and services with the aim of constant and continuous improvement in quality. ICZ sees security as a dynamic process, and its experts provide an excellent combination of experience with state-of-the-art trends.<\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-size: 20px\">\u00a0<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;produkty&#8221; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#d9f2fe&#8221; background_color_gradient_end=&#8221;#a6e2fa&#8221; background_color_gradient_type=&#8221;radial&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<h2 style=\"text-align: center\">LIST OF PRODUCTS<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;][\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; column_structure=&#8221;1_3,1_3,1_3&#8243;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/05.-telekomunikace-infrastruktura_tel_19_1600x1067.jpg&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; border_style=&#8221;solid&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<h3>Industrial Networks Security<\/h3>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/09\/Tel_09_1.jpg&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; border_style=&#8221;solid&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<h3>End Devices and Mobile Devices Security<\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/09\/SEC_02_1.jpg&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; border_style=&#8221;solid&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<h3>Network Access Security<\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; column_structure=&#8221;1_3,1_3,1_3&#8243;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/09\/Ost_25_1.jpg&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; border_style=&#8221;solid&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<h3>Network Security<\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/09\/SEC_03_1.jpg&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; border_style=&#8221;solid&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<h3>Anti-X Solution<\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/09\/Tel_20_1.jpg&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; border_style=&#8221;solid&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<h3>Application Security<\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; column_structure=&#8221;1_3,1_3,1_3&#8243;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/09\/SEC_09_1.jpg&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; border_style=&#8221;solid&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<h3>Next-Gen Firewalls<\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/09.-verejna-a-statni-sprava_gov_11_1600x1066.jpg&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; border_style=&#8221;solid&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<h3>SIEM Systems<\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.4.2&#8243; background_color=&#8221;#003156&#8243; custom_padding=&#8221;0px||0px|&#8221; hover_enabled=&#8221;0&#8243; transparent_background=&#8221;off&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;0px||0px|&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; background_position=&#8221;top_left&#8221; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#d9f2fe&#8221; background_color_gradient_end=&#8221;#a6e2fa&#8221; background_color_gradient_type=&#8221;radial&#8221; custom_padding=&#8221;76.796875px|0px|76px|0px&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;] Safe Communication [\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; border_style=&#8221;solid&#8221;] The boom in communication technologies is accompanied by more &hellip; <a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/security\/\">Continued<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1514,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.4.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Secure communication &bull; ICZ Group<\/title>\n<meta name=\"description\" content=\"Safe Communication The boom in communication technologies is accompanied by more and more threats that can constitute a serious hazard. These can be\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure communication &bull; ICZ Group\" \/>\n<meta property=\"og:description\" content=\"Safe Communication The boom in communication technologies is accompanied by more and more threats that can constitute a serious hazard. These can be\" \/>\n<meta property=\"og:url\" content=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/security\/\" \/>\n<meta property=\"og:site_name\" content=\"ICZ Group\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-28T13:40:23+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#organization\",\"name\":\"ICZ Group\",\"url\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/07\/icz-logo.png\",\"contentUrl\":\"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/07\/icz-logo.png\",\"width\":96,\"height\":47,\"caption\":\"ICZ Group\"},\"image\":{\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#website\",\"url\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/\",\"name\":\"ICZ Group\",\"description\":\"ICZ Group\",\"publisher\":{\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/security\/#webpage\",\"url\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/security\/\",\"name\":\"Secure communication &bull; ICZ Group\",\"isPartOf\":{\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#website\"},\"datePublished\":\"2017-08-21T11:26:21+00:00\",\"dateModified\":\"2020-04-28T13:40:23+00:00\",\"description\":\"Safe Communication The boom in communication technologies is accompanied by more and more threats that can constitute a serious hazard. These can be\",\"breadcrumb\":{\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products and Services\",\"item\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Infrastructure\",\"item\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Secure communication\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure communication &bull; ICZ Group","description":"Safe Communication The boom in communication technologies is accompanied by more and more threats that can constitute a serious hazard. These can be","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/security\/","og_locale":"en_US","og_type":"article","og_title":"Secure communication &bull; ICZ Group","og_description":"Safe Communication The boom in communication technologies is accompanied by more and more threats that can constitute a serious hazard. These can be","og_url":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/security\/","og_site_name":"ICZ Group","article_modified_time":"2020-04-28T13:40:23+00:00","twitter_card":"summary","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#organization","name":"ICZ Group","url":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#logo","inLanguage":"en-US","url":"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/07\/icz-logo.png","contentUrl":"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/07\/icz-logo.png","width":96,"height":47,"caption":"ICZ Group"},"image":{"@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#logo"}},{"@type":"WebSite","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#website","url":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/","name":"ICZ Group","description":"ICZ Group","publisher":{"@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/security\/#webpage","url":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/security\/","name":"Secure communication &bull; ICZ Group","isPartOf":{"@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#website"},"datePublished":"2017-08-21T11:26:21+00:00","dateModified":"2020-04-28T13:40:23+00:00","description":"Safe Communication The boom in communication technologies is accompanied by more and more threats that can constitute a serious hazard. These can be","breadcrumb":{"@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/"},{"@type":"ListItem","position":2,"name":"Products and Services","item":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/"},{"@type":"ListItem","position":3,"name":"Infrastructure","item":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/infrastructure\/"},{"@type":"ListItem","position":4,"name":"Secure communication"}]}]}},"_links":{"self":[{"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages\/1653"}],"collection":[{"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/comments?post=1653"}],"version-history":[{"count":17,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages\/1653\/revisions"}],"predecessor-version":[{"id":18233,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages\/1653\/revisions\/18233"}],"up":[{"embeddable":true,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages\/1514"}],"wp:attachment":[{"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/media?parent=1653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}