{"id":5949,"date":"2022-07-30T10:12:33","date_gmt":"2022-07-30T10:12:33","guid":{"rendered":"https:\/\/netvisor.hu\/?page_id=5949"},"modified":"2022-09-09T11:55:03","modified_gmt":"2022-09-09T11:55:03","slug":"it-security-solutions","status":"publish","type":"page","link":"https:\/\/netvisor.hu\/en\/services\/it-security-solutions\/","title":{"rendered":"IT security solutions"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row height_ratio=&#8221;40&#8243; padding_top_multiplier=&#8221;custom&#8221; padding_bottom_multiplier=&#8221;custom&#8221; rc_bg_type=&#8221;image&#8221; rc_bg_image=&#8221;5838&#8243; padding_top=&#8221;12vh&#8221; padding_bottom=&#8221;8vh&#8221;][vc_column content_width=&#8221;95&#8243; horizontal_content_position=&#8221;center&#8221; vertical_content_position=&#8221;middle&#8221; rc_heading_color=&#8221;light&#8221; rc_font_color=&#8221;#ffffff&#8221;]<div class=\"eut-empty-space eut-height-1x\" style=\"\"><\/div><h1 class=\"eut-element eut-title eut-align-center eut-appear-down eut-duration-slow eut-appear-animation eut-h1\" style=\"margin-bottom: 0px;\" data-delay=\"100\"><span>IT security solutions<\/span><\/h1><div class=\"eut-empty-space eut-height-1x\" style=\"\"><\/div>[\/vc_column][\/vc_row][vc_row padding_top_multiplier=&#8221;2x&#8221; rc_bg_type=&#8221;color&#8221; rc_bg_color=&#8221;#f4f4f4&#8243;][vc_column content_width=&#8221;75&#8243; horizontal_content_position=&#8221;center&#8221; vertical_content_position=&#8221;middle&#8221; text_align=&#8221;center&#8221; tablet_sm_content_width=&#8221;reset&#8221; mobile_content_width=&#8221;reset&#8221;]<h3 class=\"eut-element eut-title eut-align-inherit eut-h5\" style=\"margin-bottom: 0px;\"><span>Design and implementation of multi-level and comprehensive IT protection systems<\/span><\/h3>[\/vc_column][\/vc_row][vc_row padding_top_multiplier=&#8221;&#8221; rc_bg_type=&#8221;color&#8221; rc_bg_color=&#8221;#f4f4f4&#8243;][vc_column content_width=&#8221;80&#8243; horizontal_content_position=&#8221;center&#8221; vertical_content_position=&#8221;middle&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]We design and develop protection systems, implement secure data connections and remote access to networks, and perform security audits. Whether the task is the protection of the entire IT system or the implementation of some special sub-function, in all cases we cooperate with our customers, assess their needs and supplement it with our many years of experience to help in the development of IT security functions.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]The tasks below are performed based on the IT security rule system available from the Customer. If this is not available or is incomplete, we undertake its assessment and creation as a consultancy.<\/p>\n<p>When developing our corporate solutions, we primarily use the product families of Cisco, EMC\/RSA, IBM, F5, and Fortinet.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row padding_top_multiplier=&#8221;2x&#8221; rc_bg_type=&#8221;color&#8221; rc_bg_color=&#8221;#f4f4f4&#8243;][vc_column content_width=&#8221;75&#8243; horizontal_content_position=&#8221;center&#8221; vertical_content_position=&#8221;middle&#8221; text_align=&#8221;center&#8221; tablet_sm_content_width=&#8221;reset&#8221; mobile_content_width=&#8221;reset&#8221;]<h3 class=\"eut-element eut-title eut-align-inherit eut-h5\" style=\"margin-bottom: 0px;\"><span>IT security solutions and activities<\/span><\/h3>[\/vc_column][\/vc_row][vc_row rc_bg_type=&#8221;color&#8221; rc_bg_color=&#8221;#f4f4f4&#8243;][vc_column width=&#8221;1\/3&#8243;]<div class=\"eut-element eut-image eut-align-left\" style=\"\"><div class=\"eut-image-wrapper eut-popup-item\" style=\"max-width:60px;\"><div class=\"eut-thumbnail-wrapper\"  style=\"max-width: 60px;\"><div class=\"eut-thumbnail\"  style=\"padding-top: 101.667%;\"><img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/netvisor.hu\/wp-content\/uploads\/2022\/07\/ikon-remote.svg\" class=\"attachment-full size-full\" alt=\"\" data-eutf-filter=\"yes\" \/><\/div><\/div>  <\/div><\/div>[vc_column_text css=&#8221;.vc_custom_1662389902640{padding-top: 20px !important;}&#8221;]<strong>Secure remote access, Border protection solutions<\/strong><\/p>\n<p>Firewall, VPN, secure connection of sites, web content filters, network intrusion protection[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;]<div class=\"eut-element eut-image eut-align-left\" style=\"\"><div class=\"eut-image-wrapper eut-popup-item\" style=\"max-width:60px;\"><div class=\"eut-thumbnail-wrapper\"  style=\"max-width: 60px;\"><div class=\"eut-thumbnail\"  style=\"padding-top: 101.667%;\"><img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/netvisor.hu\/wp-content\/uploads\/2022\/07\/ikon-auth.svg\" class=\"attachment-full size-full\" alt=\"\" data-eutf-filter=\"yes\" \/><\/div><\/div>  <\/div><\/div>[vc_column_text css=&#8221;.vc_custom_1662389918480{padding-top: 20px !important;}&#8221;]<strong>User identification<\/strong><\/p>\n<p>Simple and multi-factor identification, creation of authorization rules, SSO systems[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;]<div class=\"eut-element eut-image eut-align-left\" style=\"\"><div class=\"eut-image-wrapper eut-popup-item\" style=\"max-width:60px;\"><div class=\"eut-thumbnail-wrapper\"  style=\"max-width: 60px;\"><div class=\"eut-thumbnail\"  style=\"padding-top: 100%;\"><img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/netvisor.hu\/wp-content\/uploads\/2022\/07\/ikon_datacenter.svg\" class=\"attachment-full size-full\" alt=\"\" data-eutf-filter=\"yes\" \/><\/div><\/div>  <\/div><\/div>[vc_column_text css=&#8221;.vc_custom_1662389935292{padding-top: 20px !important;}&#8221;]<strong>Protection of data centers<\/strong><\/p>\n<p>Datacenter security, physical protection of racks, VM security, development of security services that can be recommended to customers[\/vc_column_text][\/vc_column][\/vc_row][vc_row rc_bg_type=&#8221;color&#8221; rc_bg_color=&#8221;#f4f4f4&#8243;][vc_column width=&#8221;1\/3&#8243;]<div class=\"eut-element eut-image eut-align-left\" style=\"\"><div class=\"eut-image-wrapper eut-popup-item\" style=\"max-width:60px;\"><div class=\"eut-thumbnail-wrapper\"  style=\"max-width: 60px;\"><div class=\"eut-thumbnail\"  style=\"padding-top: 100%;\"><img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/netvisor.hu\/wp-content\/uploads\/2022\/07\/ikon_LAN.svg\" class=\"attachment-full size-full\" alt=\"\" data-eutf-filter=\"yes\" \/><\/div><\/div>  <\/div><\/div>[vc_column_text css=&#8221;.vc_custom_1662389953348{padding-top: 20px !important;}&#8221;]<strong>Protection of wired LAN and Wi-Fi networks<\/strong><\/p>\n<p>NAC system (IDM), BYOND and MDM management of mobile devices, implementation of guest access[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;]<div class=\"eut-element eut-image eut-align-left\" style=\"\"><div class=\"eut-image-wrapper eut-popup-item\" style=\"max-width:60px;\"><div class=\"eut-thumbnail-wrapper\"  style=\"max-width: 60px;\"><div class=\"eut-thumbnail\"  style=\"padding-top: 100%;\"><img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/netvisor.hu\/wp-content\/uploads\/2022\/07\/ikon-smngmt.svg\" class=\"attachment-full size-full\" alt=\"\" data-eutf-filter=\"yes\" \/><\/div><\/div>  <\/div><\/div>[vc_column_text css=&#8221;.vc_custom_1662389967986{padding-top: 20px !important;}&#8221;]<strong>Security management<\/strong><\/p>\n<p>Log collection \/ storage \/ reporting \/ alarm, creation of SIEM systems, BCP and DRP[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;]<div class=\"eut-element eut-image eut-align-left\" style=\"\"><div class=\"eut-image-wrapper eut-popup-item\" style=\"max-width:60px;\"><div class=\"eut-thumbnail-wrapper\"  style=\"max-width: 60px;\"><div class=\"eut-thumbnail\"  style=\"padding-top: 100%;\"><img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/netvisor.hu\/wp-content\/uploads\/2022\/07\/ikon_audit.svg\" class=\"attachment-full size-full\" alt=\"\" data-eutf-filter=\"yes\" \/><\/div><\/div>  <\/div><\/div>[vc_column_text css=&#8221;.vc_custom_1662389984848{padding-top: 20px !important;}&#8221;]<strong>Security audit of system elements and sub-areas<\/strong><\/p>\n<p>Auditing and compliance testing of system components from an IT security point of view[\/vc_column_text][\/vc_column][\/vc_row][vc_row padding_top_multiplier=&#8221;2x&#8221; padding_bottom_multiplier=&#8221;3x&#8221; rc_bg_type=&#8221;color&#8221; rc_bg_color=&#8221;#f4f4f4&#8243;][vc_column]<div class=\"eut-element eut-align-center\"><a href=\"\/en\/products\/\" title=\"Term\u00e9kek\" class=\"eut-btn eut-btn-medium eut-square eut-bg-black eut-bg-hover-primary-1 eut-btn-line\"><span>Go To Products<\/span><\/a><\/div>[\/vc_column][\/vc_row][vc_row padding_top_multiplier=&#8221;2x&#8221; padding_bottom_multiplier=&#8221;2x&#8221;][vc_column text_align=&#8221;center&#8221;]<h3 class=\"eut-element eut-title eut-align-inherit eut-h3\" style=\"margin-bottom: 0px;\"><span>References<\/span><\/h3>[\/vc_column][\/vc_row][vc_row padding_top_multiplier=&#8221;&#8221; padding_bottom_multiplier=&#8221;&#8221; rc_bg_type=&#8221;color&#8221; columns_gap=&#8221;none&#8221; mobile_columns_vertical_gap=&#8221;none&#8221; rc_bg_color=&#8221;#323232&#8243;][vc_column width=&#8221;1\/2&#8243; vertical_content_position=&#8221;middle&#8221; rc_heading_color=&#8221;light&#8221; mobile_column_order=&#8221;2&#8243; rc_font_color=&#8221;#ffffff&#8221;]<div class=\"eut-empty-space eut-height-2x\" style=\"\"><\/div><h3 class=\"eut-element eut-title eut-align-inherit eut-h4\" style=\"\"><span>M\u00c1V Zrt. line reconstruction<\/span><\/h3>[vc_row_inner padding_top_multiplier=&#8221;custom&#8221; padding_bottom_multiplier=&#8221;&#8221; padding_top=&#8221;1vh&#8221;][vc_column_inner content_width=&#8221;85&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Development of a platform supporting the telecommunications tasks of infrastructure development<\/li>\n<li>Preparation of the high-level system plan of the optical network, the IP\/MPLS and DWDM transmission network, and the operation support system of the GSMR-2 system<\/li>\n<li>Construction of an IP\/MPLS and DWDM transmission network<\/li>\n<li>Detailed planning (licensing and implementation) of the construction of a fiber-optic cable network<\/li>\n<li>Implementation of the GSM-R 2 system operation support system<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner]<div class=\"eut-empty-space eut-height-2x\" style=\"\"><\/div>[\/vc_column][vc_column width=&#8221;1\/2&#8243; full_height=&#8221;yes&#8221; rc_bg_type=&#8221;image&#8221; rc_bg_image=&#8221;5670&#8243; expand_column_bg=&#8221;expand-bg-right&#8221;]<div class=\"eut-empty-space\" style=\"height: 53vh;\"><\/div>[\/vc_column][\/vc_row][vc_row padding_top_multiplier=&#8221;&#8221; padding_bottom_multiplier=&#8221;&#8221; rc_bg_type=&#8221;color&#8221; columns_gap=&#8221;none&#8221; mobile_columns_vertical_gap=&#8221;none&#8221; rc_bg_color=&#8221;#323232&#8243;][vc_column width=&#8221;1\/2&#8243; full_height=&#8221;yes&#8221; rc_bg_type=&#8221;image&#8221; rc_bg_image=&#8221;5671&#8243; expand_column_bg=&#8221;expand-bg-left&#8221;]<div class=\"eut-empty-space\" style=\"height: 53vh;\"><\/div>[\/vc_column][vc_column width=&#8221;1\/2&#8243; vertical_content_position=&#8221;middle&#8221; rc_heading_color=&#8221;light&#8221; css=&#8221;.vc_custom_1658555736032{padding-left: 7vh !important;}&#8221; rc_font_color=&#8221;#ffffff&#8221;]<div class=\"eut-empty-space eut-height-2x\" style=\"\"><\/div><h3 class=\"eut-element eut-title eut-align-inherit eut-h4\" style=\"\"><span>KIF\u00dc Superfast Internet Project<\/span><\/h3>[vc_row_inner padding_top_multiplier=&#8221;custom&#8221; padding_bottom_multiplier=&#8221;&#8221; padding_top=&#8221;1vh&#8221;][vc_column_inner content_width=&#8221;85&#8243;][vc_column_text]<strong>The Network Development Support and Monitoring System supported all phases of the &#8220;Superfast Internet Project&#8221;:<\/strong><\/p>\n<ul>\n<li>Mapping: service mapping, infrastructure mapping<\/li>\n<li>Strategic planning<\/li>\n<li>Tendering<\/li>\n<li>Implementation planning support<\/li>\n<li>Implementation project monitoring<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner]<div class=\"eut-empty-space eut-height-2x\" style=\"\"><\/div>[\/vc_column][\/vc_row][vc_row padding_top_multiplier=&#8221;&#8221; padding_bottom_multiplier=&#8221;&#8221; rc_bg_type=&#8221;color&#8221; columns_gap=&#8221;none&#8221; mobile_columns_vertical_gap=&#8221;none&#8221; rc_bg_color=&#8221;#323232&#8243;][vc_column width=&#8221;1\/2&#8243; vertical_content_position=&#8221;middle&#8221; rc_heading_color=&#8221;light&#8221; mobile_column_order=&#8221;2&#8243; rc_font_color=&#8221;#ffffff&#8221;]<div class=\"eut-empty-space eut-height-2x\" style=\"\"><\/div><h3 class=\"eut-element eut-title eut-align-inherit eut-h4\" style=\"\"><span>Hungarian National Chamber of Notaries<\/span><\/h3>[vc_row_inner padding_top_multiplier=&#8221;custom&#8221; padding_bottom_multiplier=&#8221;&#8221; padding_top=&#8221;1vh&#8221;][vc_column_inner content_width=&#8221;85&#8243;][vc_column_text]<strong>Development, expansion and support of the IT infrastructure since 2012<\/strong><\/p>\n<ul>\n<li>Expert operation support service with 24\/7 availability<\/li>\n<li>Creating storage replication<\/li>\n<li>Participation in the establishment of a new data center (establishment of cabling, power supply, network, basic infrastructure)<\/li>\n<li>Implementation of an IP telephone system<\/li>\n<li>Creation of a disaster-resistant operation with 2 sites<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner]<div class=\"eut-empty-space eut-height-2x\" style=\"\"><\/div>[\/vc_column][vc_column width=&#8221;1\/2&#8243; full_height=&#8221;yes&#8221; rc_bg_type=&#8221;image&#8221; rc_bg_image=&#8221;6399&#8243; expand_column_bg=&#8221;expand-bg-right&#8221;]<div class=\"eut-empty-space\" style=\"height: 53vh;\"><\/div>[\/vc_column][\/vc_row][vc_row padding_top_multiplier=&#8221;2x&#8221; padding_bottom_multiplier=&#8221;&#8221;][vc_column vertical_content_position=&#8221;middle&#8221; text_align=&#8221;center&#8221;]<h3 class=\"eut-element eut-title eut-align-inherit eut-h3\" style=\"margin-bottom: 0px;\"><span>Further services<\/span><\/h3>[\/vc_column][\/vc_row][vc_row padding_top_multiplier=&#8221;&#8221; rc_bg_type=&#8221;color&#8221; columns_gap=&#8221;none&#8221; tablet_sm_visibility=&#8221;hide&#8221; mobile_visibility=&#8221;hide&#8221;][vc_column][vc_row_inner padding_bottom_multiplier=&#8221;&#8221; columns_gap=&#8221;none&#8221;][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1659426793234{margin-right: -10px !important;margin-left: 20px !important;}&#8221;][vc_column_text el_class=&#8221;default&#8221;]<\/p>\n<h3 style=\"font-size: 7px; line-height: 8px;\"><span style=\"color: #ffffff;\">ICT Strategy and concept creation, audit<\/span><\/h3>\n<p style=\"font-size: 7px;\"><span style=\"color: #ffffff;\">IT and telecommunications strategic consulting,<\/span><br \/>\n<span style=\"color: #ffffff;\">concept development, system audits<\/span><\/p>\n<p>[\/vc_column_text][vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1659426801266{margin-left: 10px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1662530546035{margin-bottom: 12px !important;}&#8221; el_class=&#8221;default&#8221;]<\/p>\n<h3 style=\"font-size: 7px; line-height: 8px;\"><span style=\"color: #ffffff;\">ICT Infrastructure<br \/>\nplanning<\/span><\/h3>\n<p style=\"font-size: 7px;\"><span style=\"color: #ebeaea;\"><span style=\"color: #ffffff;\">Design of ICT networks and data centers<\/span><br \/>\n<\/span><\/p>\n<p>[\/vc_column_text][vc_raw_html]JTNDYSUyMGhyZWYlM0QlMjIlMkZlbiUyRnNlcnZpY2VzJTJGaWN0LWluZnJhc3RydWN0dXJlLXBsYW5uaW5nJTJGJTIyJTNFJTNDaW1nJTBBJTIwJTIwb25tb3VzZW92ZXIlM0QlMjJ0aGlzLnNyYyUzRCUyNyUyRndwLWNvbnRlbnQlMkZ1cGxvYWRzJTJGMjAyMiUyRjA5JTJGSUNUX2luZnJhX2hvdmVyLnN2ZyUyNyUyMiUwQSUyMCUyMG9ubW91c2VvdXQlM0QlMjJ0aGlzLnNyYyUzRCUyNyUyRndwLWNvbnRlbnQlMkZ1cGxvYWRzJTJGMjAyMiUyRjA5JTJGSUNUX0luZnJhLnN2ZyUyNyUyMiUwQSUyMCUyMHNyYyUzRCUyMiUyRndwLWNvbnRlbnQlMkZ1cGxvYWRzJTJGMjAyMiUyRjA5JTJGSUNUX0luZnJhLnN2ZyUyMiUwQSUyRiUzRSUzQyUyRmElM0U=[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_column_text el_class=&#8221;default&#8221;]<\/p>\n<h3 style=\"font-size: 7px; line-height: 8px;\"><span style=\"color: #ffffff;\">ICT System Integration<\/span><\/h3>\n<p style=\"font-size: 7px;\"><span style=\"color: #ffffff;\">Implementation and integration of hardware and software systems of leading manufacturers, managed with our support systems<\/span><\/p>\n<p>[\/vc_column_text][vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1659426818377{margin-right: 10px !important;margin-left: -10px !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1662530561658{margin-bottom: 20px !important;}&#8221; el_class=&#8221;default&#8221;]<\/p>\n<h3 style=\"font-size: 7px; line-height: 8px;\"><span style=\"color: #ffffff;\">System operation, outsourcing or in the form of SaaS<\/span><\/h3>\n<p style=\"font-size: 7px;\"><span style=\"color: #ffffff;\">Operation of ICT systems with customer service, expert and manufacturer support<\/span><\/p>\n<p>[\/vc_column_text][vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner padding_top_multiplier=&#8221;custom&#8221; columns_gap=&#8221;none&#8221; padding_top=&#8221;10px&#8221;][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658566026001{margin-right: -10px !important;margin-left: 20px !important;}&#8221;][vc_raw_html]JTNDYSUyMGhyZWYlM0QlMjIlMkZlbiUyRnNlcnZpY2VzJTJGaWN0LXNlcnZpY2UtbWFuYWdlbWVudCUyRiUyMiUzRSUzQ2ltZyUwQSUyMCUyMG9ubW91c2VvdmVyJTNEJTIydGhpcy5zcmMlM0QlMjclMkZ3cC1jb250ZW50JTJGdXBsb2FkcyUyRjIwMjIlMkYwOSUyRjVfU00uc3ZnJTI3JTIyJTBBJTIwJTIwb25tb3VzZW91dCUzRCUyMnRoaXMuc3JjJTNEJTI3JTJGd3AtY29udGVudCUyRnVwbG9hZHMlMkYyMDIyJTJGMDklMkZJQ1RfU00uc3ZnJTI3JTIyJTBBJTIwJTIwc3JjJTNEJTIyJTJGd3AtY29udGVudCUyRnVwbG9hZHMlMkYyMDIyJTJGMDklMkZJQ1RfU00uc3ZnJTIyJTBBJTJGJTNFJTNDJTJGYSUzRQ==[\/vc_raw_html][vc_column_text el_class=&#8221;default&#8221;]<\/p>\n<h3 style=\"font-size: 7px; line-height: 8px;\"><span style=\"color: #ffffff;\">ICT Service management<\/span><\/h3>\n<p style=\"font-size: 7px;\"><span style=\"color: #ffffff;\">Performance monitoring, infrastructure inventories, fault detection, quality management, creation of management dashboards<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658566003567{margin-left: 10px !important;}&#8221;][vc_raw_html]JTNDYSUyMGhyZWYlM0QlMjIlMkZlbiUyRnNlcnZpY2VzJTJGY3VzdG9tLXNvZnR3YXJlLWRldmVsb3BtZW50JTJGJTIyJTNFJTNDaW1nJTBBJTIwJTIwb25tb3VzZW92ZXIlM0QlMjJ0aGlzLnNyYyUzRCUyNyUyRndwLWNvbnRlbnQlMkZ1cGxvYWRzJTJGMjAyMiUyRjA5JTJGNl9kZXYuc3ZnJTI3JTIyJTBBJTIwJTIwb25tb3VzZW91dCUzRCUyMnRoaXMuc3JjJTNEJTI3JTJGd3AtY29udGVudCUyRnVwbG9hZHMlMkYyMDIyJTJGMDklMkZDdXN0b21fZGV2LnN2ZyUyNyUyMiUwQSUyMCUyMHNyYyUzRCUyMiUyRndwLWNvbnRlbnQlMkZ1cGxvYWRzJTJGMjAyMiUyRiUyRjA5JTJGQ3VzdG9tX2Rldi5zdmclMjIlMEElMkYlM0UlM0MlMkZhJTNF[\/vc_raw_html][vc_column_text el_class=&#8221;default&#8221;]<\/p>\n<h3 style=\"font-size: 7px; line-height: 8px;\"><span style=\"color: #ffffff;\">Custom software development<\/span><\/h3>\n<p style=\"font-size: 7px;\"><span style=\"color: #ffffff;\">Development and implementation of unique software solutions, applications<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_raw_html]JTNDYSUyMGhyZWYlM0QlMjIlMkZlbiUyRnNlcnZpY2VzJTJGaXQtc2VjdXJpdHktc29sdXRpb25zJTJGJTIyJTNFJTNDaW1nJTBBJTIwJTIwb25tb3VzZW92ZXIlM0QlMjJ0aGlzLnNyYyUzRCUyNyUyRndwLWNvbnRlbnQlMkZ1cGxvYWRzJTJGMjAyMiUyRjA5JTJGN19zZWMuc3ZnJTI3JTIyJTBBJTIwJTIwb25tb3VzZW91dCUzRCUyMnRoaXMuc3JjJTNEJTI3JTJGd3AtY29udGVudCUyRnVwbG9hZHMlMkYyMDIyJTJGMDklMkZJVF9zZWN1cml0eS5zdmclMjclMjIlMEElMjAlMjBzcmMlM0QlMjIlMkZ3cC1jb250ZW50JTJGdXBsb2FkcyUyRjIwMjIlMkYwOSUyRklUX3NlY3VyaXR5LnN2ZyUyMiUwQSUyRiUzRSUzQyUyRmElM0U=[\/vc_raw_html][vc_column_text el_class=&#8221;default&#8221;]<\/p>\n<h3 style=\"font-size: 7px; line-height: 8px;\"><span style=\"color: #ffffff;\">IT security solutions<\/span><\/h3>\n<p style=\"font-size: 7px;\"><span style=\"color: #ffffff;\">Design and implementation of multi-level and comprehensive IT protection systems<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1658565953794{margin-right: 10px !important;margin-left: -10px !important;}&#8221;][vc_raw_html]JTNDYSUyMGhyZWYlM0QlMjIlMkZlbiUyRnNlcnZpY2VzJTJGaW5kdXN0cnktNC0wLWFuZC1yZCUyRiUyMiUzRSUzQ2ltZyUwQSUyMCUyMG9ubW91c2VvdmVyJTNEJTIydGhpcy5zcmMlM0QlMjclMkZ3cC1jb250ZW50JTJGdXBsb2FkcyUyRjIwMjIlMkYwOSUyRjhfaW5kdXN0cnkuc3ZnJTI3JTIyJTBBJTIwJTIwb25tb3VzZW91dCUzRCUyMnRoaXMuc3JjJTNEJTI3JTJGd3AtY29udGVudCUyRnVwbG9hZHMlMkYyMDIyJTJGMDklMkZpbmR1c3RyeTQuc3ZnJTI3JTIyJTBBJTIwJTIwc3JjJTNEJTIyJTJGd3AtY29udGVudCUyRnVwbG9hZHMlMkYyMDIyJTJGMDklMkZpbmR1c3RyeTQuc3ZnJTIyJTBBJTJGJTNFJTNDJTJGYSUzRQ==[\/vc_raw_html][vc_column_text el_class=&#8221;default&#8221;]<\/p>\n<h3 style=\"font-size: 7px; line-height: 8px;\"><span style=\"color: #ffffff;\">Industry 4.0 and R&amp;D<\/span><\/h3>\n<p style=\"font-size: 7px;\"><span style=\"color: #ffffff;\">Industry 4.0 solutions for the entire production process, R&amp;D ecosystem value creation capability<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row rc_bg_type=&#8221;color&#8221; desktop_visibility=&#8221;hide&#8221; tablet_visibility=&#8221;hide&#8221; rc_bg_color=&#8221;#ebeaea&#8221;][vc_column][vc_row_inner padding_bottom_multiplier=&#8221;&#8221;][vc_column_inner width=&#8221;1\/4&#8243; mobile_width=&#8221;1-2&#8243;][vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243; mobile_width=&#8221;1-2&#8243;][vc_raw_html]JTNDYSUyMGhyZWYlM0QlMjIlMkZlbiUyRnNlcnZpY2VzJTJGaWN0LWluZnJhc3RydWN0dXJlLXBsYW5uaW5nJTJGJTIyJTNFJTNDaW1nJTBBJTIwJTIwb25tb3VzZW92ZXIlM0QlMjJ0aGlzLnNyYyUzRCUyNyUyRndwLWNvbnRlbnQlMkZ1cGxvYWRzJTJGMjAyMiUyRjA5JTJGSUNUX2luZnJhX2hvdmVyLnN2ZyUyNyUyMiUwQSUyMCUyMG9ubW91c2VvdXQlM0QlMjJ0aGlzLnNyYyUzRCUyNyUyRndwLWNvbnRlbnQlMkZ1cGxvYWRzJTJGMjAyMiUyRjA5JTJGSUNUX0luZnJhLnN2ZyUyNyUyMiUwQSUyMCUyMHNyYyUzRCUyMiUyRndwLWNvbnRlbnQlMkZ1cGxvYWRzJTJGMjAyMiUyRjA5JTJGSUNUX0luZnJhLnN2ZyUyMiUwQSUyRiUzRSUzQyUyRmElM0U=[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243; mobile_width=&#8221;1-2&#8243;][vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243; mobile_width=&#8221;1-2&#8243;][vc_raw_html]JTNDYSUyMGhyZWYlM0QlMjIlMkZlbiUyRnNlcnZpY2VzJTJGc3lzdGVtLW9wZXJhdGlvbi1vdXRzb3VyY2luZy1vci1pbi10aGUtZm9ybS1vZi1zYWFzJTJGJTIyJTNFJTNDaW1nJTBBJTIwJTIwb25tb3VzZW92ZXIlM0QlMjJ0aGlzLnNyYyUzRCUyNyUyRndwLWNvbnRlbnQlMkZ1cGxvYWRzJTJGMjAyMiUyRjA5JTJGNF9TYWFTLnN2ZyUyNyUyMiUwQSUyMCUyMG9ubW91c2VvdXQlM0QlMjJ0aGlzLnNyYyUzRCUyNyUyRndwLWNvbnRlbnQlMkZ1cGxvYWRzJTJGMjAyMiUyRjA5JTJGSUNUX1NhYVMuc3ZnJTI3JTIyJTBBJTIwJTIwc3JjJTNEJTIyJTJGd3AtY29udGVudCUyRnVwbG9hZHMlMkYyMDIyJTJGMDklMkZJQ1RfU2FhUy5zdmclMjIlMEElMkYlM0UlM0MlMkZhJTNF[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner padding_top_multiplier=&#8221;custom&#8221; padding_top=&#8221;10px&#8221;][vc_column_inner width=&#8221;1\/4&#8243; mobile_width=&#8221;1-2&#8243;][vc_raw_html]JTNDYSUyMGhyZWYlM0QlMjIlMkZlbiUyRnNlcnZpY2VzJTJGaWN0LXNlcnZpY2UtbWFuYWdlbWVudCUyRiUyMiUzRSUzQ2ltZyUwQSUyMCUyMG9ubW91c2VvdmVyJTNEJTIydGhpcy5zcmMlM0QlMjclMkZ3cC1jb250ZW50JTJGdXBsb2FkcyUyRjIwMjIlMkYwOSUyRjVfU00uc3ZnJTI3JTIyJTBBJTIwJTIwb25tb3VzZW91dCUzRCUyMnRoaXMuc3JjJTNEJTI3JTJGd3AtY29udGVudCUyRnVwbG9hZHMlMkYyMDIyJTJGMDklMkZJQ1RfU00uc3ZnJTI3JTIyJTBBJTIwJTIwc3JjJTNEJTIyJTJGd3AtY29udGVudCUyRnVwbG9hZHMlMkYyMDIyJTJGMDklMkZJQ1RfU00uc3ZnJTIyJTBBJTJGJTNFJTNDJTJGYSUzRQ==[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243; mobile_width=&#8221;1-2&#8243;][vc_raw_html]JTNDYSUyMGhyZWYlM0QlMjIlMkZlbiUyRnNlcnZpY2VzJTJGY3VzdG9tLXNvZnR3YXJlLWRldmVsb3BtZW50JTJGJTIyJTNFJTNDaW1nJTBBJTIwJTIwb25tb3VzZW92ZXIlM0QlMjJ0aGlzLnNyYyUzRCUyNyUyRndwLWNvbnRlbnQlMkZ1cGxvYWRzJTJGMjAyMiUyRjA5JTJGNl9kZXYuc3ZnJTI3JTIyJTBBJTIwJTIwb25tb3VzZW91dCUzRCUyMnRoaXMuc3JjJTNEJTI3JTJGd3AtY29udGVudCUyRnVwbG9hZHMlMkYyMDIyJTJGMDklMkZDdXN0b21fZGV2LnN2ZyUyNyUyMiUwQSUyMCUyMHNyYyUzRCUyMiUyRndwLWNvbnRlbnQlMkZ1cGxvYWRzJTJGMjAyMiUyRiUyRjA5JTJGQ3VzdG9tX2Rldi5zdmclMjIlMEElMkYlM0UlM0MlMkZhJTNF[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243; mobile_width=&#8221;1-2&#8243;][vc_raw_html]JTNDYSUyMGhyZWYlM0QlMjIlMkZlbiUyRnNlcnZpY2VzJTJGaXQtc2VjdXJpdHktc29sdXRpb25zJTJGJTIyJTNFJTNDaW1nJTBBJTIwJTIwb25tb3VzZW92ZXIlM0QlMjJ0aGlzLnNyYyUzRCUyNyUyRndwLWNvbnRlbnQlMkZ1cGxvYWRzJTJGMjAyMiUyRjA5JTJGN19zZWMuc3ZnJTI3JTIyJTBBJTIwJTIwb25tb3VzZW91dCUzRCUyMnRoaXMuc3JjJTNEJTI3JTJGd3AtY29udGVudCUyRnVwbG9hZHMlMkYyMDIyJTJGMDklMkZJVF9zZWN1cml0eS5zdmclMjclMjIlMEElMjAlMjBzcmMlM0QlMjIlMkZ3cC1jb250ZW50JTJGdXBsb2FkcyUyRjIwMjIlMkYwOSUyRklUX3NlY3VyaXR5LnN2ZyUyMiUwQSUyRiUzRSUzQyUyRmElM0U=[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243; mobile_width=&#8221;1-2&#8243;][vc_raw_html]JTNDYSUyMGhyZWYlM0QlMjIlMkZlbiUyRnNlcnZpY2VzJTJGaW5kdXN0cnktNC0wLWFuZC1yZCUyRiUyMiUzRSUzQ2ltZyUwQSUyMCUyMG9ubW91c2VvdmVyJTNEJTIydGhpcy5zcmMlM0QlMjclMkZ3cC1jb250ZW50JTJGdXBsb2FkcyUyRjIwMjIlMkYwOSUyRjhfaW5kdXN0cnkuc3ZnJTI3JTIyJTBBJTIwJTIwb25tb3VzZW91dCUzRCUyMnRoaXMuc3JjJTNEJTI3JTJGd3AtY29udGVudCUyRnVwbG9hZHMlMkYyMDIyJTJGMDklMkZpbmR1c3RyeTQuc3ZnJTI3JTIyJTBBJTIwJTIwc3JjJTNEJTIyJTJGd3AtY29udGVudCUyRnVwbG9hZHMlMkYyMDIyJTJGMDklMkZpbmR1c3RyeTQuc3ZnJTIyJTBBJTJGJTNFJTNDJTJGYSUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row rc_bg_type=&#8221;image&#8221; rc_bg_image=&#8221;5663&#8243; rc_margin_bottom=&#8221;0&#8243; rc_bg_color=&#8221;#191919&#8243;][vc_column][vc_row_inner padding_top_multiplier=&#8221;2x&#8221; padding_bottom_multiplier=&#8221;2x&#8221;][vc_column_inner width=&#8221;4\/6&#8243; vertical_content_position=&#8221;middle&#8221; rc_font_color=&#8221;#ffffff&#8221;][vc_column_text text_style=&#8221;leader-text&#8221;]Contact us about our services[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;]<div class=\"eut-element eut-align-inherit\"><a href=\"\/en\/contact\" title=\"Contact\" class=\"eut-btn eut-btn-medium eut-square eut-bg-white eut-bg-hover-primary-1 eut-btn-line\"><span>Contact<\/span><\/a><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row height_ratio=&#8221;40&#8243; padding_top_multiplier=&#8221;custom&#8221; padding_bottom_multiplier=&#8221;custom&#8221; rc_bg_type=&#8221;image&#8221; rc_bg_image=&#8221;5838&#8243; padding_top=&#8221;12vh&#8221; padding_bottom=&#8221;8vh&#8221;][vc_column content_width=&#8221;95&#8243; horizontal_content_position=&#8221;center&#8221; vertical_content_position=&#8221;middle&#8221; rc_heading_color=&#8221;light&#8221; rc_font_color=&#8221;#ffffff&#8221;][\/vc_column][\/vc_row][vc_row padding_top_multiplier=&#8221;2x&#8221; rc_bg_type=&#8221;color&#8221; rc_bg_color=&#8221;#f4f4f4&#8243;][vc_column content_width=&#8221;75&#8243; horizontal_content_position=&#8221;center&#8221; vertical_content_position=&#8221;middle&#8221; text_align=&#8221;center&#8221; tablet_sm_content_width=&#8221;reset&#8221; mobile_content_width=&#8221;reset&#8221;][\/vc_column][\/vc_row][vc_row padding_top_multiplier=&#8221;&#8221; rc_bg_type=&#8221;color&#8221; rc_bg_color=&#8221;#f4f4f4&#8243;][vc_column content_width=&#8221;80&#8243; horizontal_content_position=&#8221;center&#8221; vertical_content_position=&#8221;middle&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]We design and develop protection systems, implement secure data connections and remote access to networks, and perform security audits. Whether the task is the protection of the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":5754,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-5949","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT security solutions - Netvisor<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netvisor.hu\/en\/services\/it-security-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT security solutions - Netvisor\" \/>\n<meta property=\"og:description\" content=\"[vc_row height_ratio=&#8221;40&#8243; padding_top_multiplier=&#8221;custom&#8221; padding_bottom_multiplier=&#8221;custom&#8221; rc_bg_type=&#8221;image&#8221; rc_bg_image=&#8221;5838&#8243; padding_top=&#8221;12vh&#8221; padding_bottom=&#8221;8vh&#8221;][vc_column content_width=&#8221;95&#8243; horizontal_content_position=&#8221;center&#8221; vertical_content_position=&#8221;middle&#8221; rc_heading_color=&#8221;light&#8221; rc_font_color=&#8221;#ffffff&#8221;][\/vc_column][\/vc_row][vc_row padding_top_multiplier=&#8221;2x&#8221; rc_bg_type=&#8221;color&#8221; rc_bg_color=&#8221;#f4f4f4&#8243;][vc_column content_width=&#8221;75&#8243; horizontal_content_position=&#8221;center&#8221; vertical_content_position=&#8221;middle&#8221; text_align=&#8221;center&#8221; tablet_sm_content_width=&#8221;reset&#8221; mobile_content_width=&#8221;reset&#8221;][\/vc_column][\/vc_row][vc_row padding_top_multiplier=&#8221;&#8221; rc_bg_type=&#8221;color&#8221; rc_bg_color=&#8221;#f4f4f4&#8243;][vc_column content_width=&#8221;80&#8243; horizontal_content_position=&#8221;center&#8221; vertical_content_position=&#8221;middle&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]We design and develop protection systems, implement secure data connections and remote access to networks, and perform security audits. Whether the task is the protection of the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netvisor.hu\/en\/services\/it-security-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"Netvisor\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-09T11:55:03+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netvisor.hu\\\/en\\\/services\\\/it-security-solutions\\\/\",\"url\":\"https:\\\/\\\/netvisor.hu\\\/en\\\/services\\\/it-security-solutions\\\/\",\"name\":\"IT security solutions - Netvisor\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netvisor.hu\\\/#website\"},\"datePublished\":\"2022-07-30T10:12:33+00:00\",\"dateModified\":\"2022-09-09T11:55:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netvisor.hu\\\/en\\\/services\\\/it-security-solutions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netvisor.hu\\\/en\\\/services\\\/it-security-solutions\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netvisor.hu\\\/en\\\/services\\\/it-security-solutions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Kezd\u0151lap\",\"item\":\"https:\\\/\\\/netvisor.hu\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\\\/\\\/netvisor.hu\\\/en\\\/services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT security solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netvisor.hu\\\/#website\",\"url\":\"https:\\\/\\\/netvisor.hu\\\/\",\"name\":\"Netvisor\",\"description\":\"Informatikai \u00e9s Kommunik\u00e1ci\u00f3s Zrt.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netvisor.hu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT security solutions - Netvisor","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netvisor.hu\/en\/services\/it-security-solutions\/","og_locale":"en_US","og_type":"article","og_title":"IT security solutions - Netvisor","og_description":"[vc_row height_ratio=&#8221;40&#8243; padding_top_multiplier=&#8221;custom&#8221; padding_bottom_multiplier=&#8221;custom&#8221; rc_bg_type=&#8221;image&#8221; rc_bg_image=&#8221;5838&#8243; padding_top=&#8221;12vh&#8221; padding_bottom=&#8221;8vh&#8221;][vc_column content_width=&#8221;95&#8243; horizontal_content_position=&#8221;center&#8221; vertical_content_position=&#8221;middle&#8221; rc_heading_color=&#8221;light&#8221; rc_font_color=&#8221;#ffffff&#8221;][\/vc_column][\/vc_row][vc_row padding_top_multiplier=&#8221;2x&#8221; rc_bg_type=&#8221;color&#8221; rc_bg_color=&#8221;#f4f4f4&#8243;][vc_column content_width=&#8221;75&#8243; horizontal_content_position=&#8221;center&#8221; vertical_content_position=&#8221;middle&#8221; text_align=&#8221;center&#8221; tablet_sm_content_width=&#8221;reset&#8221; mobile_content_width=&#8221;reset&#8221;][\/vc_column][\/vc_row][vc_row padding_top_multiplier=&#8221;&#8221; rc_bg_type=&#8221;color&#8221; rc_bg_color=&#8221;#f4f4f4&#8243;][vc_column content_width=&#8221;80&#8243; horizontal_content_position=&#8221;center&#8221; vertical_content_position=&#8221;middle&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]We design and develop protection systems, implement secure data connections and remote access to networks, and perform security audits. Whether the task is the protection of the [&hellip;]","og_url":"https:\/\/netvisor.hu\/en\/services\/it-security-solutions\/","og_site_name":"Netvisor","article_modified_time":"2022-09-09T11:55:03+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/netvisor.hu\/en\/services\/it-security-solutions\/","url":"https:\/\/netvisor.hu\/en\/services\/it-security-solutions\/","name":"IT security solutions - Netvisor","isPartOf":{"@id":"https:\/\/netvisor.hu\/#website"},"datePublished":"2022-07-30T10:12:33+00:00","dateModified":"2022-09-09T11:55:03+00:00","breadcrumb":{"@id":"https:\/\/netvisor.hu\/en\/services\/it-security-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netvisor.hu\/en\/services\/it-security-solutions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/netvisor.hu\/en\/services\/it-security-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Kezd\u0151lap","item":"https:\/\/netvisor.hu\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/netvisor.hu\/en\/services\/"},{"@type":"ListItem","position":3,"name":"IT security solutions"}]},{"@type":"WebSite","@id":"https:\/\/netvisor.hu\/#website","url":"https:\/\/netvisor.hu\/","name":"Netvisor","description":"Informatikai \u00e9s Kommunik\u00e1ci\u00f3s Zrt.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netvisor.hu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/netvisor.hu\/en\/wp-json\/wp\/v2\/pages\/5949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netvisor.hu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/netvisor.hu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/netvisor.hu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/netvisor.hu\/en\/wp-json\/wp\/v2\/comments?post=5949"}],"version-history":[{"count":18,"href":"https:\/\/netvisor.hu\/en\/wp-json\/wp\/v2\/pages\/5949\/revisions"}],"predecessor-version":[{"id":7461,"href":"https:\/\/netvisor.hu\/en\/wp-json\/wp\/v2\/pages\/5949\/revisions\/7461"}],"up":[{"embeddable":true,"href":"https:\/\/netvisor.hu\/en\/wp-json\/wp\/v2\/pages\/5754"}],"wp:attachment":[{"href":"https:\/\/netvisor.hu\/en\/wp-json\/wp\/v2\/media?parent=5949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}