{"id":952,"date":"2023-07-07T10:36:27","date_gmt":"2023-07-07T08:36:27","guid":{"rendered":"https:\/\/secom.sk\/security\/"},"modified":"2023-08-24T10:15:17","modified_gmt":"2023-08-24T08:15:17","slug":"security","status":"publish","type":"page","link":"https:\/\/secom.sk\/en\/security\/","title":{"rendered":"Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/new.secom.sk\/wp-content\/uploads\/2023\/07\/bezpecnost_background.png&#8221; background_position=&#8221;bottom_center&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; height=&#8221;150px&#8221; custom_margin=&#8221;20px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.21.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata|700|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;50px&#8221; custom_margin=&#8221;30px||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;50px&#8221; text_font_size_phone=&#8221;40px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Security<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;kyberneticka-bezpecnost&#8221; module_id=&#8221;kyberneticka-bezpecnost&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata|700|||||||&#8221; text_text_color=&#8221;#2a1c66&#8243; text_font_size=&#8221;40px&#8221; hover_enabled=&#8221;0&#8243; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;1.1em&#8221; text_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_font_size_phone=&#8221;30px&#8221; sticky_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;40px&#8221;]<\/p>\n<p>CYBERSECURITY<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;15px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Cybersecurity is a key aspect of protecting information systems. It involves a coordinated combination of people, processes, and security technologies aimed at preventing, detecting, and responding to various threats and risks. It aims to ensure that information systems, such as networks, servers, and data, are protected against unauthorized access, theft, destruction, or compromise of their availability, integrity, and confidentiality. For this reason, it&#8217;s important to have trained personnel, proper processes, and deployed security technologies that ensure your company&#8217;s protection.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f0eff5&#8243; border_radii=&#8221;on|15px|15px|15px|15px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata||||||||&#8221; text_text_color=&#8221;#E02B20&#8243; text_font_size=&#8221;30px&#8221; custom_margin=&#8221;10px|||50px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>SPECIFICATION<\/p>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=&#8221;#2a1c66&#8243; closed_toggle_text_color=&#8221;#2a1c66&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; toggle_font=&#8221;Armata|700|||||||&#8221; custom_margin=&#8221;|30px||30px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion_item title=&#8221;Cybersecurity analysis&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>We follow the current legislation of the Slovak Republic, international standards, and so-called best practices in the field of information security management. And this applies even if you are not a critical infrastructure and the Law on Cybersecurity doesn&#8217;t directly apply to you.<\/span><br \/><span>Malware and attackers don&#8217;t differentiate; they attack in the same way.<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Cybersecurity solutions&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]<\/p>\n<p><span>There are several areas related to cybersecurity management.<\/span><br \/><span>In each of these areas, we can conduct partial analysis and prepare suitable process and technical solutions for you.<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Cybersecurity training&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]<\/p>\n<p><span>Human is the weakest link in cybersecurity. Employees tend to forget directives and recommendations over time. <\/span><span>Training is your smallest investment with the greatest impact.<\/span><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#2a1c66&#8243; divider_position=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;antivirova-ochrana&#8221; module_id=&#8221;antivirova-ochrana&#8221; _builder_version=&#8221;4.21.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; custom_padding_phone=&#8221;0px||0px||false|false&#8221; sticky_enabled=&#8221;0&#8243; custom_padding_tablet=&#8221;||0px||false|false&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; display_conditions=&#8221;W10=&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata|700|||||||&#8221; text_text_color=&#8221;#2a1c66&#8243; text_font_size=&#8221;40px&#8221; hover_enabled=&#8221;0&#8243; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;1.1em&#8221; text_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_font_size_phone=&#8221;30px&#8221; sticky_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;40px&#8221;]<\/p>\n<p>ANTIVIRUS PROTECTION<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;15px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"big\"><span>We provide cybersecurity solutions with high levels of security, performance, and user-friendliness for small and medium businesses, medium-sized organizations, and consumers.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/new.secom.sk\/wp-content\/uploads\/2023\/07\/OCHRANA_KONCOVY_BODOV.png&#8221; title_text=&#8221;OCHRANA_KONCOVY_BODOV&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;120px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata|700|||||||&#8221; text_text_color=&#8221;#2a1c66&#8243; text_font_size=&#8221;18px&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>MOST EFFECTIVE ENDPOINT PROTECTION<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/new.secom.sk\/wp-content\/uploads\/2023\/07\/EDR.png&#8221; title_text=&#8221;EDR&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;120px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata|700|||||||&#8221; text_text_color=&#8221;#2a1c66&#8243; text_font_size=&#8221;18px&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>ENDPOINT TECHNOLOGY<br \/>DETECTION AND RESPONSE (EDR)<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/new.secom.sk\/wp-content\/uploads\/2023\/07\/HARDENING.png&#8221; title_text=&#8221;HARDENING&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; width=&#8221;120px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata|700|||||||&#8221; text_text_color=&#8221;#2a1c66&#8243; text_font_size=&#8221;18px&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]HARDERING BASED<br \/> ON RISK ANALYSIS[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f0eff5&#8243; border_radii=&#8221;on|15px|15px|15px|15px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata||||||||&#8221; text_text_color=&#8221;#E02B20&#8243; text_font_size=&#8221;30px&#8221; custom_margin=&#8221;10px|||50px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>SPECIFICATION<\/p>\n<p>[\/et_pb_text][et_pb_accordion open_toggle_text_color=&#8221;#2a1c66&#8243; closed_toggle_text_color=&#8221;#2a1c66&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; toggle_font=&#8221;Armata|700|||||||&#8221; custom_margin=&#8221;|30px||30px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_accordion_item title=&#8221;Multi-layered endpoint protection&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;||||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;|2px||15px|false|false&#8221; global_colors_info=&#8221;{}&#8221; open=&#8221;on&#8221;]<\/p>\n<p><span>Protect desktops, laptops, and servers with multi-layered security featuring effective malware detection and minimal false alarms. Machine learning models from Bitdefender utilize static and dynamic features, constantly trained on billions of samples of clean and malicious files collected from hundreds of millions of endpoints worldwide. If a threat is identified, it&#8217;s immediately neutralized through process termination, quarantining, removal, and restoring malicious changes.<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Prevention and mitigation of ransomware consequences&#8221; open=&#8221;off&#8221; title_tablet=&#8221;Prevencia a zmiernenie n\u00e1sledkov ransomwaru&#8221; title_phone=&#8221;Prevencia a zmiernenie n\u00e1sledkov ransomwaru&#8221; title_last_edited=&#8221;on|phone&#8221; content_tablet=&#8221; <\/p>\n<p><span>Ransomware predstavuje ve\u013ek\u00fd probl\u00e9m pre organiz\u00e1cie po celom svete. S rozsiahlym v\u00fdskumom ransomwaru a de\u0161ifrovac\u00edmi n\u00e1strojmi od spolo\u010dnosti Bitdefender sme pomohli obetiam zachr\u00e1ni\u0165 miliardy. Bitdefender presne detekuje nov\u00e9 vzory ransomwaru e\u0161te pred spusten\u00edm aj po\u010das behu, \u010do v\u00e1m poskytuje najpokro\u010dilej\u0161iu ochranu va\u0161ich syst\u00e9mov.<\/span><\/p>\n<p> &#8221; content_phone=&#8221; <\/p>\n<p><span>Ransomware predstavuje ve\u013ek\u00fd probl\u00e9m pre organiz\u00e1cie po celom svete. S rozsiahlym v\u00fdskumom ransomwaru a de\u0161ifrovac\u00edmi n\u00e1strojmi od spolo\u010dnosti Bitdefender sme pomohli obetiam zachr\u00e1ni\u0165 miliardy. Bitdefender presne detekuje nov\u00e9 vzory ransomwaru e\u0161te pred spusten\u00edm aj po\u010das behu, \u010do v\u00e1m poskytuje najpokro\u010dilej\u0161iu ochranu va\u0161ich syst\u00e9mov.<\/span><\/p>\n<p> &#8221; content_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;|1px||15px|false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Ransomware poses a significant challenge for organizations worldwide. With extensive ransomware research and decryption tools from Bitdefender, we have helped victims save billions. Bitdefender accurately detects new ransomware patterns even before execution and during runtime, providing you with the most advanced protection for your systems.<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Protection through endpoint risk management&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]<\/p>\n<p><span>Effective identification, assessment, and remediation of endpoint vulnerabilities are key to the proper functioning of a security program and reducing risk for organizations. The GravityZone Business Security infrastructure for endpoint risk management reduces vulnerability and strengthens endpoint resilience by detecting and prioritizing critical configuration and software vulnerabilities.<\/span><\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Defense against network attacks&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]<\/p>\n<p><span>Gain a new level of protection against network vulnerability attacks. Expand protection into new areas through network security that blocks threats such as brute-force attacks, password theft, network abuse, and lateral movement before they even initiate.<\/span><\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;15px&#8221; custom_margin=&#8221;10px|||50px|false|false&#8221; custom_margin_tablet=&#8221;10px|||50px|false|false&#8221; custom_margin_phone=&#8221;10px|||15px|false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div id=\"comp-l3bvu5ky5\" class=\"KcpHeO tz5f0K comp-l3bvu5ky5 wixui-rich-text\" data-testid=\"richTextElement\">\n<p class=\"font_0 wixui-rich-text__text\"><span>The GravityZone Business Security technology is built on an adaptive layered architecture, encompassing endpoint control, prevention, detection, recovery, and transparency.<\/span><\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#2a1c66&#8243; divider_position=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;secom-security&#8221; module_id=&#8221;secom-security&#8221; _builder_version=&#8221;4.21.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; custom_padding_phone=&#8221;0px||0px||false|false&#8221; sticky_enabled=&#8221;0&#8243; custom_padding_tablet=&#8221;||0px||false|false&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata|700|||||||&#8221; text_text_color=&#8221;#2a1c66&#8243; text_font_size=&#8221;40px&#8221; hover_enabled=&#8221;0&#8243; text_line_height_tablet=&#8221;&#8221; text_line_height_phone=&#8221;1.1em&#8221; text_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_font_size_phone=&#8221;30px&#8221; sticky_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;40px&#8221;]<\/p>\n<p>SECOM SECURITY<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;15px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Privacy protection allows you to fully secure your communication on computers and mobile devices against third-party eavesdropping. For this security, we use state-of-the-art technologies and proven techniques. SECOM Security can be deployed on Android and iOS mobile devices, as well as on Windows and Linux computers. The service is divided into BASIC, MEDIUM, and BUSINESS packages. If you&#8217;re interested, don&#8217;t hesitate to contact us.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f0eff5&#8243; border_radii=&#8221;on|15px|15px|15px|15px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata||||||||&#8221; text_text_color=&#8221;#E02B20&#8243; text_font_size=&#8221;30px&#8221; custom_margin=&#8221;10px|||50px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>SPECIFICATION<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;15px&#8221; custom_margin=&#8221;10px|||50px|false|false&#8221; custom_margin_tablet=&#8221;10px|||50px|false|false&#8221; custom_margin_phone=&#8221;10px|||15px|false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"big\">Supported operating systems for PCs:<span> <\/span><strong>Windows<\/strong>,<span> <\/span><strong>Linux<\/strong><br \/>Supported mobile operating systems:<span> <\/span><strong>Android<\/strong>,<span> <\/span><strong>iOS<\/strong><\/p>\n<p>Encryption of emails using secure PGP (web-of-trust) or S\/MIME technologies tailored to the client&#8217;s needs. In the case of S\/MIME, a globally recognized certification authority is used. Both technologies utilize proven asymmetric encryption with sufficiently long keys.<\/p>\n<p>Disk encryption is implemented using dm-crypt or other available encryption technologies, employing symmetric AES-256 or stronger encryption. We can also apply complete encryption to Android phones.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#2a1c66&#8243; divider_position=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata|700|||||||&#8221; text_text_color=&#8221;#2a1c66&#8243; text_font_size=&#8221;40px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_font_size_phone=&#8221;30px&#8221; sticky_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;40px&#8221;]<\/p>\n<p>FIREWALL<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;15px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>We provide implementation, configuration, and management of firewalls, whether it&#8217;s a virtual firewall, web application firewall, or hardware devices. Each installation is individual based on client requirements.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#2a1c66&#8243; divider_position=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata|700|||||||&#8221; text_text_color=&#8221;#2a1c66&#8243; text_font_size=&#8221;40px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_font_size_phone=&#8221;30px&#8221; sticky_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;40px&#8221;]<\/p>\n<p>VPN NETWORK<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;15px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>We provide implementation, configuration, and management of VPN networks with a security certificate. Multi-user access and remote connection from anywhere are standard features, whether through a web interface or client applications. Each installation is individual based on client requirements.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#2a1c66&#8243; divider_position=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata|700|||||||&#8221; text_text_color=&#8221;#2a1c66&#8243; text_font_size=&#8221;40px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_font_size_phone=&#8221;30px&#8221; sticky_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;40px&#8221;]<\/p>\n<p>MONITORING<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Armata||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;15px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>We provide monitoring for detecting security events as well as automatic monitoring to keep track of our cloud servers. Monitoring of running services, ports, as well as CPU load, temperature, and disk usage.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#2a1c66&#8243; divider_position=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(232,232,232,0.5)&#8221; custom_margin=&#8221;50px||50px||false|false&#8221; custom_margin_tablet=&#8221;||20px||false|false&#8221; custom_margin_phone=&#8221;0px||0px||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;45px|45px|40px||false|false&#8221; custom_padding_tablet=&#8221;45px|45px|40px||false|false&#8221; custom_padding_phone=&#8221;|0px||0px|false|false&#8221; global_module=&#8221;353&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Open Sans|500|||||||&#8221; text_text_color=&#8221;#2a1c66&#8243; text_font_size=&#8221;21px&#8221; text_line_height=&#8221;2.6em&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;0px||20px||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;|0px||43px|false|false&#8221; custom_padding_tablet=&#8221;|0px||43px|false|false&#8221; custom_padding_phone=&#8221;|0px||0px|false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; text_font_tablet=&#8221;Open Sans|500|||||||&#8221; text_font_phone=&#8221;Open Sans|600|||||||&#8221; text_font_last_edited=&#8221;on|phone&#8221; text_font_size_tablet=&#8221;21px&#8221; text_font_size_phone=&#8221;13px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; text_line_height_tablet=&#8221;2.6em&#8221; text_line_height_phone=&#8221;1.5em&#8221; text_line_height_last_edited=&#8221;on|phone&#8221; text_orientation_tablet=&#8221;&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">In case of specific requirements, do not hesitate to contact us.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/new.secom.sk\/kontakt\/#formular&#8221; button_text=&#8221;FORM&#8221; button_alignment=&#8221;center&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.21.2&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;18px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#014584&#8243; button_border_width=&#8221;4px&#8221; button_border_color=&#8221;#014584&#8243; button_border_radius=&#8221;4px&#8221; button_letter_spacing=&#8221;3px&#8221; button_font=&#8221;Armata|700|||||||&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;2px|30px|||false|false&#8221; custom_margin_tablet=&#8221;|30px|||false|false&#8221; custom_margin_phone=&#8221;|0px||0px|false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;5px|40px|5px|40px|false|false&#8221; custom_padding_tablet=&#8221;5px|40px|5px|40px|false|false&#8221; custom_padding_phone=&#8221;||||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; button_icon_placement_tablet=&#8221;&#8221; button_icon_placement_phone=&#8221;&#8221; button_icon_placement_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SecurityCYBERSECURITYCybersecurity is a key aspect of protecting information systems. It involves a coordinated combination of people, processes, and security technologies aimed at preventing, detecting, and responding to various threats and risks. It aims to ensure that information systems, such as networks, servers, and data, are protected against unauthorized access, theft, destruction, or compromise of their [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"_links":{"self":[{"href":"https:\/\/secom.sk\/en\/wp-json\/wp\/v2\/pages\/952"}],"collection":[{"href":"https:\/\/secom.sk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/secom.sk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/secom.sk\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secom.sk\/en\/wp-json\/wp\/v2\/comments?post=952"}],"version-history":[{"count":1,"href":"https:\/\/secom.sk\/en\/wp-json\/wp\/v2\/pages\/952\/revisions"}],"predecessor-version":[{"id":966,"href":"https:\/\/secom.sk\/en\/wp-json\/wp\/v2\/pages\/952\/revisions\/966"}],"wp:attachment":[{"href":"https:\/\/secom.sk\/en\/wp-json\/wp\/v2\/media?parent=952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}