{"id":15411,"date":"2025-07-11T10:16:56","date_gmt":"2025-07-11T10:16:56","guid":{"rendered":"http:\/\/in-sist.si\/implementing-network-security\/"},"modified":"2025-11-24T08:38:54","modified_gmt":"2025-11-24T08:38:54","slug":"implementing-network-security","status":"publish","type":"page","link":"https:\/\/in-sist.si\/en\/implementing-network-security\/","title":{"rendered":"Implementing network security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15411\" class=\"elementor elementor-15411 elementor-15072\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dc64cee e-con-full e-flex e-con e-parent\" data-id=\"dc64cee\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-13719 navigation-breadcrumbs-custom split-breadcrumbs-y elementor-widget elementor-widget-global elementor-global-15262 elementor-global-13719 elementor-widget-the7-breadcrumb\" data-id=\"13719\" data-element_type=\"widget\" data-widget_type=\"the7-breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"assistive-text\">You are here:<\/div><ol class=\"breadcrumbs text-small rcrumbs\" itemscope itemtype=\"https:\/\/schema.org\/BreadcrumbList\"><li itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><a itemprop=\"item\" href=\"https:\/\/in-sist.si\/en\/\" title=\"Home\"><span itemprop=\"name\">Home<\/span><\/a><meta itemprop=\"position\" content=\"1\" \/><\/li><li class=\"current\" itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><span itemprop=\"name\">Page<\/span><meta itemprop=\"position\" content=\"2\" \/><\/li><\/ol>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c91313d elementor-widget elementor-widget-slider_revolution\" data-id=\"c91313d\" data-element_type=\"widget\" data-widget_type=\"slider_revolution.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"wp-block-themepunch-revslider\">\n\t\t\t\t<p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t\t<sr7-module data-alias=\"slider-7-1-11-1-1-1-1-1-1-1-1-1-1-1\" data-id=\"23\" id=\"SR7_23_1\" class=\"rs-ov-hidden\" data-version=\"6.7.37\">\n\t\t\t\t\t<sr7-adjuster><\/sr7-adjuster>\n\t\t\t\t\t<sr7-content>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_23_1-45\" data-key=\"45\">\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_23_1-45-1\" class=\"sr7-layer\">Implementacija omre\u017ene<\/sr7-txt>\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_23_1-45-2\" class=\"sr7-layer\">varnosti<\/sr7-txt>\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_23_1-46\" data-key=\"46\">\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t<\/sr7-content>\n\t\t\t\t\t<image_lists style=\"display:none\">\n\t\t\t\t\t\t<img data-src=\"\/\/in-sist.si\/wp-content\/uploads\/2025\/07\/Adobe-Express-file-18.jpg\" data-libid=\"12794\" data-lib=\"medialibrary\" title=\"Adobe Express &#8211; file (18)\" width=\"0\" height=\"0\" data-dbsrc=\"Ly9pbi1zaXN0LnNpL3dwLWNvbnRlbnQvdXBsb2Fkcy8yMDI1LzA3L0Fkb2JlLUV4cHJlc3MtZmlsZS0xOC5qcGc=\"\/>\n\t\t\t\t\t<\/image_lists>\n\t\t\t\t<\/sr7-module>\n\t\t\t\t<script>\n\t\t\t\t\tSR7.PMH ??={}; SR7.PMH[\"SR7_23_1\"] = {cn:100,state:false,fn: function() { if (_tpt!==undefined && _tpt.prepareModuleHeight !== undefined) {  _tpt.prepareModuleHeight({id:\"SR7_23_1\",el:[500,500,768,960,720],type:'hero',shdw:'0',gh:[500,500,412,313,193],gw:[1240,1240,1024,778,480],vpt:['-100px&#039;,&#039;-100px&#039;,&#039;-100px&#039;,&#039;-100px&#039;,&#039;-100px'],size:{fullWidth:true, fullHeight:false},mh:'0',onh:0,onw:0,bg:{color:'{\"orig\":\"transparent\",\"type\":\"solid\",\"string\":\"transparent\"}'}});   SR7.PMH[\"SR7_23_1\"].state=true;} else if(SR7.PMH[\"SR7_23_1\"].cn-->0)\tsetTimeout( SR7.PMH[\"SR7_23_1\"].fn,19);}};SR7.PMH[\"SR7_23_1\" ].fn();\n\t\t\t\t<\/script>\n<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5154d40 main-container e-flex e-con-boxed e-con e-parent\" data-id=\"5154d40\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a97e306 e-con-full e-flex e-con e-child\" data-id=\"a97e306\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9d829d9 e-con-full e-flex e-con e-child\" data-id=\"9d829d9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3126f8c elementor-widget elementor-widget-image\" data-id=\"3126f8c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/07\/vecteezy_network-security-in-open-hands-data-protection_66608768-1024x574.jpg\" class=\"attachment-large size-large wp-image-15213\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/07\/vecteezy_network-security-in-open-hands-data-protection_66608768-1024x574.jpg 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/07\/vecteezy_network-security-in-open-hands-data-protection_66608768-300x168.jpg 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/07\/vecteezy_network-security-in-open-hands-data-protection_66608768-768x430.jpg 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/07\/vecteezy_network-security-in-open-hands-data-protection_66608768-1536x861.jpg 1536w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/07\/vecteezy_network-security-in-open-hands-data-protection_66608768-2048x1148.jpg 2048w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/07\/vecteezy_network-security-in-open-hands-data-protection_66608768-900x504.jpg 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/07\/vecteezy_network-security-in-open-hands-data-protection_66608768-1200x673.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-06ad563 e-con-full e-flex e-con e-child\" data-id=\"06ad563\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ee2b28 elementor-widget elementor-widget-text-editor\" data-id=\"3ee2b28\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"222\" data-end=\"501\">Data protection and the smooth running of IT infrastructure are the cornerstones of the modern enterprise. Our network security implementation service includes a comprehensive approach to protecting your network from internal and external threats and ensuring a reliable business environment.   <\/p><p data-start=\"503\" data-end=\"1135\">Data protection and the uninterrupted operation of your IT infrastructure are the foundation of any modern company. Our network security implementation service offers a comprehensive approach to safeguarding your network from both internal and external threats, ensuring a stable and reliable business environment.   <\/p><p data-start=\"1137\" data-end=\"1575\">In addition to network and endpoint level protection, we also offer solutions for advanced <strong data-start=\"1219\" data-end=\"1263\">analytics and insight into security events<\/strong> using <strong data-start=\"1274\" data-end=\"1285\">Elastic<\/strong> tools that enable real-time event search, monitoring and correlation. For proactive risk management, we include <strong data-start=\"1416\" data-end=\"1427\">Tenable<\/strong> solutions that enable systematic <strong data-start=\"1463\" data-end=\"1489\">vulnerability detection<\/strong>, <strong data-start=\"1491\" data-end=\"1511\">compliance assessment<\/strong> and continuous monitoring of the security posture of your infrastructure.   <\/p><p data-start=\"1577\" data-end=\"1610\">Our experts take care of:<\/p><ul data-start=\"1611\" data-end=\"2087\"><li data-start=\"1611\" data-end=\"1672\"><p data-start=\"1613\" data-end=\"1672\">implementation of firewalls (NGFW) and IDS\/IPS systems,<\/p><\/li><li data-start=\"1673\" data-end=\"1724\"><p data-start=\"1675\" data-end=\"1724\">secure segmentation and network access control,<\/p><\/li><li data-start=\"1725\" data-end=\"1778\"><p data-start=\"1727\" data-end=\"1778\">SSL\/TLS decryption for timely threat detection,<\/p><\/li><li data-start=\"1779\" data-end=\"1834\"><p data-start=\"1781\" data-end=\"1834\">setting up secure VPN solutions for remote access,<\/p><\/li><li data-start=\"1835\" data-end=\"1886\"><p data-start=\"1837\" data-end=\"1886\">protecting email and web traffic,<\/p><\/li><li data-start=\"1887\" data-end=\"1954\"><p data-start=\"1889\" data-end=\"1954\">centralised monitoring and response to security incidents,<\/p><\/li><li data-start=\"1955\" data-end=\"2011\"><p data-start=\"1957\" data-end=\"2011\">monitoring security events with Elastic solutions,<\/p><\/li><li data-start=\"2012\" data-end=\"2087\"><p data-start=\"2014\" data-end=\"2087\">identifying vulnerabilities and ensuring compliance with Tenable solutions.<\/p><\/li><\/ul><p data-start=\"2089\" data-end=\"2372\">Whatever the size of your business, we provide tailored solutions based on best practices and proven technologies. Our goal is to create a secure digital environment that allows your business to grow and develop smoothly, while ensuring the highest level of data protection.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-09107b8 e-grid e-con-full e-con e-child\" data-id=\"09107b8\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-920cb24 e-con-full e-flex e-con e-child\" data-id=\"920cb24\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-272c717 elementor-widget elementor-widget-heading\" data-id=\"272c717\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our partners<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c945bcf e-grid e-con-full e-con e-child\" data-id=\"c945bcf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8065fcd elementor-widget elementor-widget-image\" data-id=\"8065fcd\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"99\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-300x99.png\" class=\"attachment-medium size-medium wp-image-15196\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-300x99.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1024x337.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-768x253.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-900x296.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1200x395.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix.png 1520w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6dbdd3 elementor-widget elementor-widget-image\" data-id=\"d6dbdd3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"158\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/Cisco_logo_blue_2016.svg-300x158.png\" class=\"attachment-medium size-medium wp-image-15214\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/Cisco_logo_blue_2016.svg-300x158.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/Cisco_logo_blue_2016.svg-1024x541.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/Cisco_logo_blue_2016.svg-768x406.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/Cisco_logo_blue_2016.svg-1536x811.png 1536w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/Cisco_logo_blue_2016.svg-2048x1082.png 2048w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/Cisco_logo_blue_2016.svg-900x475.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/Cisco_logo_blue_2016.svg-1200x634.png 1200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12fe2c8 elementor-widget elementor-widget-image\" data-id=\"12fe2c8\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"64\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/images-300x64.png\" class=\"attachment-medium size-medium wp-image-15215\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/images-300x64.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/images.png 486w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2968e1d elementor-widget elementor-widget-image\" data-id=\"2968e1d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"103\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/elastic-logo-png-transparent-300x103.png\" class=\"attachment-medium size-medium wp-image-15216\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/elastic-logo-png-transparent-300x103.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/elastic-logo-png-transparent-1024x351.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/elastic-logo-png-transparent-768x263.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/elastic-logo-png-transparent-1536x527.png 1536w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/elastic-logo-png-transparent-2048x702.png 2048w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/elastic-logo-png-transparent-900x309.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/elastic-logo-png-transparent-1200x412.png 1200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3793fc1 elementor-widget elementor-widget-image\" data-id=\"3793fc1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"84\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/tenable-300x84.png\" class=\"attachment-medium size-medium wp-image-15217\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/tenable-300x84.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/tenable.png 424w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21249711 e-con-full e-flex e-con e-parent\" data-id=\"21249711\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-31bf88f1 e-con-full e-flex e-con e-child\" data-id=\"31bf88f1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-49435ebc e-con-full e-flex e-con e-child\" data-id=\"49435ebc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3fe3b1d0 elementor-widget elementor-widget-heading\" data-id=\"3fe3b1d0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why with us?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70af30f elementor-widget elementor-widget-text-editor\" data-id=\"70af30f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We are a certified partner with extensive experience in ERP implementations and business digitalization. We understand the technological and human challenges of implementing such a system, ensuring a professionally managed project that focuses on the end user and long-term value.   <\/p><p>Whether you&#8217;re a micro-business or a manufacturing company with complex processes &#8211; with Pantheon ERP, you get a tool that grows with you.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-486221cd elementor-widget elementor-widget-button\" data-id=\"486221cd\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More about us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-22906aba e-con-full e-flex e-con e-child\" data-id=\"22906aba\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-bd7cb90 e-con-full e-flex e-con e-child\" data-id=\"bd7cb90\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-568c0d54 elementor-widget elementor-widget-heading\" data-id=\"568c0d54\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Want to know more or schedule a consultation?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72c65217 elementor-widget elementor-widget-text-editor\" data-id=\"72c65217\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Contact us and we will be happy to make you a presentation or a concrete offer.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33874fe e-con-full e-flex e-con e-child\" data-id=\"33874fe\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-26f0190 e-con-full e-flex e-con e-child\" data-id=\"26f0190\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e9b3f40 elementor-widget elementor-widget-heading\" data-id=\"5e9b3f40\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">They trust us<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2066d905 e-con-full e-flex e-con e-child\" data-id=\"2066d905\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e48e74c e-grid e-con-full e-con e-child\" data-id=\"e48e74c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c10b717 elementor-widget elementor-widget-image\" data-id=\"3c10b717\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1024x337.png\" class=\"attachment-large size-large wp-image-15195\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1024x337.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-300x99.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-768x253.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-900x296.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1200x395.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin.png 1520w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-220bb5c7 elementor-widget elementor-widget-image\" data-id=\"220bb5c7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1024x337.png\" class=\"attachment-large size-large wp-image-15196\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1024x337.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-300x99.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-768x253.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-900x296.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1200x395.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix.png 1520w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-734dd97a elementor-widget elementor-widget-image\" data-id=\"734dd97a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-1024x337.png\" class=\"attachment-large size-large wp-image-15197\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-1024x337.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-300x99.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-768x253.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-900x296.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin-1200x395.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/datalab_fin.png 1520w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-452b5346 elementor-widget elementor-widget-image\" data-id=\"452b5346\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1024x337.png\" class=\"attachment-large size-large wp-image-15195\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1024x337.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-300x99.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-768x253.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-900x296.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin-1200x395.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/krka_fin.png 1520w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b35c41f elementor-widget elementor-widget-image\" data-id=\"4b35c41f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1024x337.png\" class=\"attachment-large size-large wp-image-15196\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1024x337.png 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-300x99.png 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-768x253.png 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-900x296.png 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix-1200x395.png 1200w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/06\/sophos_fix.png 1520w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Tukaj ste: Domov Data protection and the smooth running of IT infrastructure are the cornerstones of the modern enterprise. Our network security implementation service includes a comprehensive approach to protecting your network from internal and external threats and ensuring a reliable business environment. Data protection and the uninterrupted operation of your IT infrastructure are the&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"give_campaign_id":0,"footnotes":""},"class_list":["post-15411","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Implementing network security - In.Sist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/in-sist.si\/en\/implementing-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Implementing network security - In.Sist\" \/>\n<meta property=\"og:description\" content=\"Tukaj ste: Domov Data protection and the smooth running of IT infrastructure are the cornerstones of the modern enterprise. Our network security implementation service includes a comprehensive approach to protecting your network from internal and external threats and ensuring a reliable business environment. Data protection and the uninterrupted operation of your IT infrastructure are the&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/in-sist.si\/en\/implementing-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"In.Sist\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-24T08:38:54+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/07\/vecteezy_network-security-in-open-hands-data-protection_66608768-1024x574.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/in-sist.si\/en\/implementing-network-security\/\",\"url\":\"https:\/\/in-sist.si\/en\/implementing-network-security\/\",\"name\":\"Implementing network security - In.Sist\",\"isPartOf\":{\"@id\":\"https:\/\/in-sist.si\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/in-sist.si\/en\/implementing-network-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/in-sist.si\/en\/implementing-network-security\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/07\/vecteezy_network-security-in-open-hands-data-protection_66608768-1024x574.jpg\",\"datePublished\":\"2025-07-11T10:16:56+00:00\",\"dateModified\":\"2025-11-24T08:38:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/in-sist.si\/en\/implementing-network-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/in-sist.si\/en\/implementing-network-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/in-sist.si\/en\/implementing-network-security\/#primaryimage\",\"url\":\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/07\/vecteezy_network-security-in-open-hands-data-protection_66608768-1024x574.jpg\",\"contentUrl\":\"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/07\/vecteezy_network-security-in-open-hands-data-protection_66608768-1024x574.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/in-sist.si\/en\/implementing-network-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/in-sist.si\/en\/main-page\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Implementing network security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/in-sist.si\/en\/#website\",\"url\":\"https:\/\/in-sist.si\/en\/\",\"name\":\"In.Sist\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/in-sist.si\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/in-sist.si\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/in-sist.si\/en\/#organization\",\"name\":\"In.Sist\",\"url\":\"https:\/\/in-sist.si\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/in-sist.si\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png\",\"contentUrl\":\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png\",\"width\":350,\"height\":100,\"caption\":\"In.Sist\"},\"image\":{\"@id\":\"https:\/\/in-sist.si\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Implementing network security - In.Sist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/in-sist.si\/en\/implementing-network-security\/","og_locale":"en_US","og_type":"article","og_title":"Implementing network security - In.Sist","og_description":"Tukaj ste: Domov Data protection and the smooth running of IT infrastructure are the cornerstones of the modern enterprise. Our network security implementation service includes a comprehensive approach to protecting your network from internal and external threats and ensuring a reliable business environment. Data protection and the uninterrupted operation of your IT infrastructure are the&hellip;","og_url":"https:\/\/in-sist.si\/en\/implementing-network-security\/","og_site_name":"In.Sist","article_modified_time":"2025-11-24T08:38:54+00:00","og_image":[{"url":"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/07\/vecteezy_network-security-in-open-hands-data-protection_66608768-1024x574.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/in-sist.si\/en\/implementing-network-security\/","url":"https:\/\/in-sist.si\/en\/implementing-network-security\/","name":"Implementing network security - In.Sist","isPartOf":{"@id":"https:\/\/in-sist.si\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/in-sist.si\/en\/implementing-network-security\/#primaryimage"},"image":{"@id":"https:\/\/in-sist.si\/en\/implementing-network-security\/#primaryimage"},"thumbnailUrl":"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/07\/vecteezy_network-security-in-open-hands-data-protection_66608768-1024x574.jpg","datePublished":"2025-07-11T10:16:56+00:00","dateModified":"2025-11-24T08:38:54+00:00","breadcrumb":{"@id":"https:\/\/in-sist.si\/en\/implementing-network-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/in-sist.si\/en\/implementing-network-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/in-sist.si\/en\/implementing-network-security\/#primaryimage","url":"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/07\/vecteezy_network-security-in-open-hands-data-protection_66608768-1024x574.jpg","contentUrl":"http:\/\/in-sist.si\/wp-content\/uploads\/2025\/07\/vecteezy_network-security-in-open-hands-data-protection_66608768-1024x574.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/in-sist.si\/en\/implementing-network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/in-sist.si\/en\/main-page\/"},{"@type":"ListItem","position":2,"name":"Implementing network security"}]},{"@type":"WebSite","@id":"https:\/\/in-sist.si\/en\/#website","url":"https:\/\/in-sist.si\/en\/","name":"In.Sist","description":"","publisher":{"@id":"https:\/\/in-sist.si\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/in-sist.si\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/in-sist.si\/en\/#organization","name":"In.Sist","url":"https:\/\/in-sist.si\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/in-sist.si\/en\/#\/schema\/logo\/image\/","url":"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png","contentUrl":"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png","width":350,"height":100,"caption":"In.Sist"},"image":{"@id":"https:\/\/in-sist.si\/en\/#\/schema\/logo\/image\/"}}]}},"campaignId":"","_links":{"self":[{"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/pages\/15411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/comments?post=15411"}],"version-history":[{"count":1,"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/pages\/15411\/revisions"}],"predecessor-version":[{"id":15413,"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/pages\/15411\/revisions\/15413"}],"wp:attachment":[{"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/media?parent=15411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}