{"id":15481,"date":"2025-11-10T11:39:28","date_gmt":"2025-11-10T11:39:28","guid":{"rendered":"http:\/\/in-sist.si\/networks-and-security-2\/"},"modified":"2026-03-18T13:13:13","modified_gmt":"2026-03-18T13:13:13","slug":"networks-and-security-2","status":"publish","type":"page","link":"https:\/\/in-sist.si\/en\/networks-and-security-2\/","title":{"rendered":"Networks and security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15481\" class=\"elementor elementor-15481 elementor-13937\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63040e54 e-con-full e-flex e-con e-child\" data-id=\"63040e54\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd1ee54 navigation-breadcrumbs-custom split-breadcrumbs-y elementor-widget elementor-widget-global elementor-global-15262 elementor-global-13719 elementor-widget-the7-breadcrumb\" data-id=\"bd1ee54\" data-element_type=\"widget\" data-widget_type=\"the7-breadcrumb.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"assistive-text\">You are here:<\/div><ol class=\"breadcrumbs text-small rcrumbs\" itemscope itemtype=\"https:\/\/schema.org\/BreadcrumbList\"><li itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><a itemprop=\"item\" href=\"https:\/\/in-sist.si\/en\/\" title=\"Home\"><span itemprop=\"name\">Home<\/span><\/a><meta itemprop=\"position\" content=\"1\" \/><\/li><li class=\"current\" itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\"><span itemprop=\"name\">Page<\/span><meta itemprop=\"position\" content=\"2\" \/><\/li><\/ol>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2904968c elementor-widget elementor-widget-slider_revolution\" data-id=\"2904968c\" data-element_type=\"widget\" data-widget_type=\"slider_revolution.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"wp-block-themepunch-revslider\">\n\t\t\t\t<p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t\t<sr7-module data-alias=\"network-security\" data-id=\"70\" id=\"SR7_70_1\" class=\"rs-ov-hidden\" data-version=\"6.7.37\">\n\t\t\t\t\t<sr7-adjuster><\/sr7-adjuster>\n\t\t\t\t\t<sr7-content>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_70_1-196\" data-key=\"196\">\n\t\t\t\t\t\t\t<sr7-txt id=\"SR7_70_1-196-2\" class=\"sr7-layer\">Network and Security<\/sr7-txt>\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t\t<sr7-slide id=\"SR7_70_1-161\" data-key=\"161\">\n\t\t\t\t\t\t<\/sr7-slide>\n\t\t\t\t\t<\/sr7-content>\n\t\t\t\t\t<image_lists style=\"display:none\">\n\t\t\t\t\t\t<img data-src=\"\/\/in-sist.si\/wp-content\/uploads\/2025\/09\/Slider-3.jpg\" data-libid=\"13566\" data-lib=\"medialibrary\" title=\"Slider 3\" width=\"0\" height=\"0\" data-dbsrc=\"Ly9pbi1zaXN0LnNpL3dwLWNvbnRlbnQvdXBsb2Fkcy8yMDI1LzA5L1NsaWRlci0zLmpwZw==\"\/>\n\t\t\t\t\t<\/image_lists>\n\t\t\t\t<\/sr7-module>\n\t\t\t\t<script>\n\t\t\t\t\tSR7.PMH ??={}; SR7.PMH[\"SR7_70_1\"] = {cn:100,state:false,fn: function() { if (_tpt!==undefined && _tpt.prepareModuleHeight !== undefined) {  _tpt.prepareModuleHeight({id:\"SR7_70_1\",el:[400,400,410,960,193],type:'hero',shdw:'0',gh:[400,400,410,313,193],gw:[1240,1240,1024,778,480],vpt:['-100px&#039;,&#039;-100px&#039;,&#039;-100px&#039;,&#039;-100px&#039;,&#039;-100px'],size:{fullWidth:true, fullHeight:false},mh:'0',onh:0,onw:0,bg:{color:'{\"orig\":\"transparent\",\"type\":\"solid\",\"string\":\"transparent\"}'}});   SR7.PMH[\"SR7_70_1\"].state=true;} else if(SR7.PMH[\"SR7_70_1\"].cn-->0)\tsetTimeout( SR7.PMH[\"SR7_70_1\"].fn,19);}};SR7.PMH[\"SR7_70_1\" ].fn();\n\t\t\t\t<\/script>\n<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-10565312 main-container e-flex e-con-boxed e-con e-parent\" data-id=\"10565312\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-721d1ce4 e-con-full div-bellow-hero e-flex e-con e-child\" data-id=\"721d1ce4\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-1d4d0f04 e-con-fit text-bellow-hero e-flex e-con e-child\" data-id=\"1d4d0f04\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a5dffb1 elementor-widget elementor-widget-heading\" data-id=\"4a5dffb1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Networks and security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b013db5 elementor-widget elementor-widget-text-editor\" data-id=\"4b013db5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The project was implemented to create a secure, stable and scalable network and server infrastructure that enables reliable connectivity between sites, the protection of business data and the smooth operation of key IT systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ec6308d e-con-fit e-flex e-con e-child\" data-id=\"6ec6308d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ebc63ee elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"7ebc63ee\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-thisisengineering-3912976-768x512.jpg\" class=\"attachment-medium_large size-medium_large wp-image-16334\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-thisisengineering-3912976-768x512.jpg 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-thisisengineering-3912976-300x200.jpg 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-thisisengineering-3912976-1024x683.jpg 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-thisisengineering-3912976-1536x1025.jpg 1536w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-thisisengineering-3912976-2048x1366.jpg 2048w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-thisisengineering-3912976-900x600.jpg 900w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-thisisengineering-3912976-1200x800.jpg 1200w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a52a334 e-con-full e-flex e-con e-child\" data-id=\"a52a334\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-241ff6ff elementor-widget elementor-widget-heading\" data-id=\"241ff6ff\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Project Summary  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51fa21a5 elementor-widget elementor-widget-text-editor\" data-id=\"51fa21a5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"1050\" data-end=\"1122\"><p data-start=\"1052\" data-end=\"1122\"><strong data-start=\"498\" data-end=\"513\">Industry:<\/strong> manufacturing \/ services<\/p><\/li><li data-start=\"1050\" data-end=\"1122\"><p data-start=\"1052\" data-end=\"1122\"><strong data-start=\"539\" data-end=\"561\">Company size:<\/strong> multiple locations, centralised IT infrastructure<\/p><\/li><li data-start=\"1050\" data-end=\"1122\"><p data-start=\"1052\" data-end=\"1122\"><strong data-start=\"610\" data-end=\"626\">Time to implement:<\/strong> phased project<\/p><\/li><li data-start=\"1050\" data-end=\"1122\"><p data-start=\"1052\" data-end=\"1122\"><strong data-start=\"643\" data-end=\"666\">Tools used:<\/strong><br data-start=\"666\" data-end=\"669\">NGFW Firewall &#8211; <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Sophos<\/span><\/span> XGS 118<br data-start=\"733\" data-end=\"736\">IPSEC VPN<br data-start=\"745\" data-end=\"748\">Virtualization &#8211; <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">VMware<\/span><\/span> ESXi<br data-start=\"807\" data-end=\"810\">Backup &#8211; <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Synology<\/span><\/span>, <span class=\"hover:entity-accent entity-underline inline cursor-pointer align-baseline\"><span class=\"whitespace-normal\">Veeam<\/span><\/span><\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f0a3606 e-con-full e-flex e-con e-child\" data-id=\"1f0a3606\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cc95cb3 elementor-widget elementor-widget-heading\" data-id=\"4cc95cb3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Client challenges<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c567670 elementor-widget elementor-widget-text-editor\" data-id=\"5c567670\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-start=\"927\" data-end=\"983\">The need for a high level of network and data security<\/li><li data-start=\"927\" data-end=\"983\">Connecting multiple sites to a single network environment<\/li><li data-start=\"927\" data-end=\"983\">Unclear or insufficiently defined security policies<\/li><li data-start=\"927\" data-end=\"983\">Risk of unauthorised access and security incidents<\/li><li data-start=\"927\" data-end=\"983\">The need for a stable and scalable server infrastructure<\/li><li data-start=\"927\" data-end=\"983\">Reliable backup and fast data recovery<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c4a8e24 e-con-full e-flex e-con e-child\" data-id=\"5c4a8e24\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-572c5995 elementor-widget elementor-widget-heading\" data-id=\"572c5995\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our solution<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c9ea208 elementor-widget elementor-widget-text-editor\" data-id=\"5c9ea208\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 data-start=\"1858\" data-end=\"1898\">The solution we have implemented<\/h3><h3 data-start=\"1361\" data-end=\"1391\">Introduction of the NGFW firewall<\/h3><ul data-start=\"1392\" data-end=\"1741\"><li data-start=\"1392\" data-end=\"1480\"><p data-start=\"1394\" data-end=\"1480\">Implementing Sophos XGS 118 Advanced Firewall as a central security point<\/p><\/li><li data-start=\"1481\" data-end=\"1559\"><p data-start=\"1483\" data-end=\"1559\">Monitoring and filtering network traffic at application and user level<\/p><\/li><li data-start=\"1560\" data-end=\"1630\"><p data-start=\"1562\" data-end=\"1630\">Protect against intrusions, malicious connections and attacks from the internet<\/p><\/li><li data-start=\"1631\" data-end=\"1691\"><p data-start=\"1633\" data-end=\"1691\">Control access to internet services and external resources<\/p><\/li><li data-start=\"1692\" data-end=\"1741\"><p data-start=\"1694\" data-end=\"1741\">Secure separation of individual network segments<\/p><\/li><\/ul><p data-start=\"1743\" data-end=\"1840\">The solution is tailored to business and production environments where stability and security are key.<\/p><h3 data-start=\"1847\" data-end=\"1893\">Security policies and network segmentation<\/h3><ul data-start=\"1894\" data-end=\"2168\"><li data-start=\"1894\" data-end=\"1974\"><p data-start=\"1896\" data-end=\"1974\">Definition of clear and transparent security policies according to roles and systems<\/p><\/li><li data-start=\"1975\" data-end=\"2168\"><p data-start=\"1977\" data-end=\"2002\">Network segmentation between:<\/p><ul data-start=\"2005\" data-end=\"2168\"><li data-start=\"2005\" data-end=\"2037\"><p data-start=\"2007\" data-end=\"2037\">administrative users<\/p><\/li><li data-start=\"2040\" data-end=\"2069\"><p data-start=\"2042\" data-end=\"2069\">server infrastructure<\/p><\/li><li data-start=\"2072\" data-end=\"2100\"><p data-start=\"2074\" data-end=\"2100\">video surveillance system<\/p><\/li><li data-start=\"2103\" data-end=\"2142\"><p data-start=\"2105\" data-end=\"2142\">IoT and other connected devices<\/p><\/li><li data-start=\"2145\" data-end=\"2168\"><p data-start=\"2147\" data-end=\"2168\">to a hosted network<\/p><\/li><\/ul><\/li><\/ul><p data-start=\"2170\" data-end=\"2258\">This design significantly reduces security risks and limits the impact of potential incidents.<\/p><h3 data-start=\"2265\" data-end=\"2300\">Connecting sites with IPSEC VPN<\/h3><ul data-start=\"2301\" data-end=\"2543\"><li data-start=\"2301\" data-end=\"2370\"><p data-start=\"2303\" data-end=\"2370\">Establish a secure and encrypted IPSEC VPN connection between sites<\/p><\/li><li data-start=\"2371\" data-end=\"2427\"><p data-start=\"2373\" data-end=\"2427\">Secure communication and real-time data transfer<\/p><\/li><li data-start=\"2428\" data-end=\"2476\"><p data-start=\"2430\" data-end=\"2476\">Centralised access to server services<\/p><\/li><li data-start=\"2477\" data-end=\"2543\"><p data-start=\"2479\" data-end=\"2543\">A single network environment regardless of the physical location of users<\/p><\/li><\/ul><p data-start=\"2545\" data-end=\"2626\">The solution enables stable operation even under heavy workloads and company growth.<\/p><h3 data-start=\"2633\" data-end=\"2662\">Server infrastructure<\/h3><ul data-start=\"2663\" data-end=\"2914\"><li data-start=\"2663\" data-end=\"2745\"><p data-start=\"2665\" data-end=\"2745\">Setting up a virtualised server infrastructure on the VMware ESXi platform<\/p><\/li><li data-start=\"2746\" data-end=\"2798\"><p data-start=\"2748\" data-end=\"2798\">Separating individual services into virtual environments<\/p><\/li><li data-start=\"2799\" data-end=\"2860\"><p data-start=\"2801\" data-end=\"2860\">High availability and better capacity control<\/p><\/li><li data-start=\"2861\" data-end=\"2914\"><p data-start=\"2863\" data-end=\"2914\">Easy to upgrade and extend your infrastructure<\/p><\/li><\/ul><p data-start=\"2916\" data-end=\"2988\">The virtual environment provides a stable base for all business applications.<\/p><h3 data-start=\"2995\" data-end=\"3022\">Backup system<\/h3><ul data-start=\"3023\" data-end=\"3344\"><li data-start=\"3023\" data-end=\"3069\"><p data-start=\"3025\" data-end=\"3069\">Centralised backup system<\/p><\/li><li data-start=\"3070\" data-end=\"3121\"><p data-start=\"3072\" data-end=\"3121\">Using Synology as a local storage environment<\/p><\/li><li data-start=\"3122\" data-end=\"3181\"><p data-start=\"3124\" data-end=\"3181\">Automated backups using Veeam<\/p><\/li><li data-start=\"3182\" data-end=\"3230\"><p data-start=\"3184\" data-end=\"3230\">Regular backups of virtual servers<\/p><\/li><li data-start=\"3231\" data-end=\"3290\"><p data-start=\"3233\" data-end=\"3290\">Rapid recovery in the event of an outage, fault or security incident<\/p><\/li><li data-start=\"3291\" data-end=\"3344\"><p data-start=\"3293\" data-end=\"3344\">Protection against data loss and ransomware attacks<\/p><\/li><\/ul><h2 data-start=\"3351\" data-end=\"3372\">Project results<\/h2><p data-start=\"3374\" data-end=\"3442\">By deploying a comprehensive network and security solution, the client gained:<\/p><ul data-start=\"3444\" data-end=\"3680\"><li data-start=\"3444\" data-end=\"3484\"><p data-start=\"3446\" data-end=\"3484\">a secure and segmented network environment<\/p><\/li><li data-start=\"3485\" data-end=\"3527\"><p data-start=\"3487\" data-end=\"3527\">reliable connectivity between sites<\/p><\/li><li data-start=\"3528\" data-end=\"3573\"><p data-start=\"3530\" data-end=\"3573\">a high level of protection for business data<\/p><\/li><li data-start=\"3574\" data-end=\"3627\"><p data-start=\"3576\" data-end=\"3627\">a stable and scalable server infrastructure<\/p><\/li><li data-start=\"3628\" data-end=\"3680\"><p data-start=\"3630\" data-end=\"3680\">a reliable backup and recovery system<\/p><\/li><\/ul><h2 data-start=\"3687\" data-end=\"3699\">Conclusion<\/h2><p data-start=\"3701\" data-end=\"3983\">The Network Security and Connectivity project provides a solid basis for a stable and secure IT environment. The combination of an advanced firewall, VPN connections, virtualised server infrastructure and backups enables long-term data protection and supports the company&#8217;s continued growth. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4585449e e-con-full e-flex e-con e-parent\" data-id=\"4585449e\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c64ed7e e-con-full e-flex e-con e-child\" data-id=\"c64ed7e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-2adc2a9f e-con-full e-flex e-con e-child\" data-id=\"2adc2a9f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5649b68e elementor-widget elementor-widget-heading\" data-id=\"5649b68e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why with us?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a818a0 elementor-widget elementor-widget-text-editor\" data-id=\"a818a0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We are a certified partner with extensive experience in ERP implementations and business digitalization. We understand the technological and human challenges of implementing such a system, ensuring a professionally managed project that focuses on the end user and long-term value. <\/p><p>Whether you&#8217;re a micro-business or a manufacturing company with complex processes &#8211; with Pantheon ERP, you get a tool that grows with you.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f804a1a elementor-widget elementor-widget-button\" data-id=\"1f804a1a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More about us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d711b83 e-con-full e-flex e-con e-child\" data-id=\"d711b83\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-ae5adb e-con-full e-flex e-con e-child\" data-id=\"ae5adb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-263a06d0 elementor-widget elementor-widget-heading\" data-id=\"263a06d0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Want to know more or schedule a consultation?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c454038 elementor-widget elementor-widget-text-editor\" data-id=\"7c454038\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Contact us and we will be happy to make you a presentation or a concrete offer.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c2458e8 main-container e-flex e-con-boxed e-con e-parent\" data-id=\"4c2458e8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d4eace1 e-con-full e-flex e-con e-child\" data-id=\"d4eace1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f1fb748 elementor-widget elementor-widget-heading\" data-id=\"6f1fb748\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">They trust us<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-72c92d36 e-con-full e-flex e-con e-child\" data-id=\"72c92d36\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1ab0b1cc e-grid e-con-full trust-us e-con e-child\" data-id=\"1ab0b1cc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-86751bb elementor-widget elementor-widget-image\" data-id=\"86751bb\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"119\" height=\"35\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/petpak-black-1_gray.svg\" class=\"attachment-large size-large wp-image-16107\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49becd7d elementor-widget elementor-widget-image\" data-id=\"49becd7d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"240\" height=\"91\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/skisea.png\" class=\"attachment-large size-large wp-image-16106\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-474530a6 elementor-widget elementor-widget-image\" data-id=\"474530a6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"100\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/logo-rogaska.png\" class=\"attachment-large size-large wp-image-16103\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b6f1789 elementor-widget elementor-widget-image\" data-id=\"6b6f1789\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"65\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/preline-e1756895215330.jpg\" class=\"attachment-full size-full wp-image-16105\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5723f5de elementor-widget elementor-widget-image\" data-id=\"5723f5de\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1181\" height=\"113\" src=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/Metal-product-logo.jpg\" class=\"attachment-full size-full wp-image-16104\" alt=\"\" srcset=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/Metal-product-logo.jpg 1181w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/Metal-product-logo-300x29.jpg 300w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/Metal-product-logo-1024x98.jpg 1024w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/Metal-product-logo-768x73.jpg 768w, https:\/\/in-sist.si\/wp-content\/uploads\/2025\/11\/Metal-product-logo-900x86.jpg 900w\" sizes=\"(max-width: 1181px) 100vw, 1181px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Tukaj ste: Domov Networks and security The project was implemented to create a secure, stable and scalable network and server infrastructure that enables reliable connectivity between sites, the protection of business data and the smooth operation of key IT systems. Project Summary Industry: manufacturing \/ services Company size: multiple locations, centralised IT infrastructure Time to&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"give_campaign_id":0,"footnotes":""},"class_list":["post-15481","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Networks and security - In.Sist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/in-sist.si\/en\/networks-and-security-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Networks and security - In.Sist\" \/>\n<meta property=\"og:description\" content=\"Tukaj ste: Domov Networks and security The project was implemented to create a secure, stable and scalable network and server infrastructure that enables reliable connectivity between sites, the protection of business data and the smooth operation of key IT systems. Project Summary Industry: manufacturing \/ services Company size: multiple locations, centralised IT infrastructure Time to&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/in-sist.si\/en\/networks-and-security-2\/\" \/>\n<meta property=\"og:site_name\" content=\"In.Sist\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T13:13:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-thisisengineering-3912976-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1708\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/in-sist.si\/en\/networks-and-security-2\/\",\"url\":\"https:\/\/in-sist.si\/en\/networks-and-security-2\/\",\"name\":\"Networks and security - In.Sist\",\"isPartOf\":{\"@id\":\"https:\/\/in-sist.si\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/in-sist.si\/en\/networks-and-security-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/in-sist.si\/en\/networks-and-security-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-thisisengineering-3912976-768x512.jpg\",\"datePublished\":\"2025-11-10T11:39:28+00:00\",\"dateModified\":\"2026-03-18T13:13:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/in-sist.si\/en\/networks-and-security-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/in-sist.si\/en\/networks-and-security-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/in-sist.si\/en\/networks-and-security-2\/#primaryimage\",\"url\":\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-thisisengineering-3912976-768x512.jpg\",\"contentUrl\":\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-thisisengineering-3912976-768x512.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/in-sist.si\/en\/networks-and-security-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/in-sist.si\/en\/main-page\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Networks and security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/in-sist.si\/en\/#website\",\"url\":\"https:\/\/in-sist.si\/en\/\",\"name\":\"In.Sist\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/in-sist.si\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/in-sist.si\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/in-sist.si\/en\/#organization\",\"name\":\"In.Sist\",\"url\":\"https:\/\/in-sist.si\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/in-sist.si\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png\",\"contentUrl\":\"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png\",\"width\":350,\"height\":100,\"caption\":\"In.Sist\"},\"image\":{\"@id\":\"https:\/\/in-sist.si\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Networks and security - In.Sist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/in-sist.si\/en\/networks-and-security-2\/","og_locale":"en_US","og_type":"article","og_title":"Networks and security - In.Sist","og_description":"Tukaj ste: Domov Networks and security The project was implemented to create a secure, stable and scalable network and server infrastructure that enables reliable connectivity between sites, the protection of business data and the smooth operation of key IT systems. Project Summary Industry: manufacturing \/ services Company size: multiple locations, centralised IT infrastructure Time to&hellip;","og_url":"https:\/\/in-sist.si\/en\/networks-and-security-2\/","og_site_name":"In.Sist","article_modified_time":"2026-03-18T13:13:13+00:00","og_image":[{"width":2560,"height":1708,"url":"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-thisisengineering-3912976-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/in-sist.si\/en\/networks-and-security-2\/","url":"https:\/\/in-sist.si\/en\/networks-and-security-2\/","name":"Networks and security - In.Sist","isPartOf":{"@id":"https:\/\/in-sist.si\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/in-sist.si\/en\/networks-and-security-2\/#primaryimage"},"image":{"@id":"https:\/\/in-sist.si\/en\/networks-and-security-2\/#primaryimage"},"thumbnailUrl":"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-thisisengineering-3912976-768x512.jpg","datePublished":"2025-11-10T11:39:28+00:00","dateModified":"2026-03-18T13:13:13+00:00","breadcrumb":{"@id":"https:\/\/in-sist.si\/en\/networks-and-security-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/in-sist.si\/en\/networks-and-security-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/in-sist.si\/en\/networks-and-security-2\/#primaryimage","url":"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-thisisengineering-3912976-768x512.jpg","contentUrl":"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/12\/pexels-thisisengineering-3912976-768x512.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/in-sist.si\/en\/networks-and-security-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/in-sist.si\/en\/main-page\/"},{"@type":"ListItem","position":2,"name":"Networks and security"}]},{"@type":"WebSite","@id":"https:\/\/in-sist.si\/en\/#website","url":"https:\/\/in-sist.si\/en\/","name":"In.Sist","description":"","publisher":{"@id":"https:\/\/in-sist.si\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/in-sist.si\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/in-sist.si\/en\/#organization","name":"In.Sist","url":"https:\/\/in-sist.si\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/in-sist.si\/en\/#\/schema\/logo\/image\/","url":"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png","contentUrl":"https:\/\/in-sist.si\/wp-content\/uploads\/2025\/04\/smallerinsistia.png","width":350,"height":100,"caption":"In.Sist"},"image":{"@id":"https:\/\/in-sist.si\/en\/#\/schema\/logo\/image\/"}}]}},"campaignId":"","_links":{"self":[{"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/pages\/15481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/comments?post=15481"}],"version-history":[{"count":8,"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/pages\/15481\/revisions"}],"predecessor-version":[{"id":17120,"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/pages\/15481\/revisions\/17120"}],"wp:attachment":[{"href":"https:\/\/in-sist.si\/en\/wp-json\/wp\/v2\/media?parent=15481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}