{"id":6959,"date":"2025-12-18T00:03:15","date_gmt":"2025-12-18T00:03:15","guid":{"rendered":"https:\/\/ictsolutions.mk\/?page_id=6959"},"modified":"2026-01-04T20:17:53","modified_gmt":"2026-01-04T19:17:53","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/ictsolutions.mk\/mk\/cyber-security\/","title":{"rendered":"\u0421\u0430\u0458\u0431\u0435\u0440 \u0431\u0435\u0437\u0431\u0435\u0434\u043d\u043e\u0441\u0442"},"content":{"rendered":"<div id=\"services\"  data-column-margin=\"default\" data-midnight=\"dark\" data-bottom-percent=\"5%\"  class=\"wpb_row vc_row-fluid vc_row full-width-content vc_row-o-equal-height vc_row-flex vc_row-o-content-top\"  style=\"padding-top: 0px; padding-bottom: calc(100vw * 0.05); \"><div class=\"row-bg-wrap\" data-bg-animation=\"none\" data-bg-animation-delay=\"\" data-bg-overlay=\"false\"><div class=\"inner-wrap row-bg-layer\" ><div class=\"row-bg viewport-desktop using-bg-color\"  style=\"background-color: #f9f7f5; \"><\/div><\/div><\/div><div class=\"row_col_wrap_12 col span_12 dark left\">\n\t<div style=\"margin-bottom: 20px; \" class=\"vc_col-sm-12 wpb_column column_container vc_column_container col padding-4-percent inherit_tablet inherit_phone\"  data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t\t<div class=\"wpb_wrapper\">\n\t\t\t\t<div id=\"fws_69d2726823d34\" data-midnight=\"\" data-column-margin=\"default\" class=\"wpb_row vc_row-fluid vc_row inner_row\"  style=\"\"><div class=\"row-bg-wrap\"> <div class=\"row-bg\" ><\/div> <\/div><div class=\"row_col_wrap_12_inner col span_12  left\">\n\t<div  class=\"vc_col-sm-4 vc_col-lg-4 vc_col-md-12 wpb_column column_container vc_column_container col child_column has-animation padding-1-percent inherit_tablet inherit_phone\"   data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"grow-in\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"nectar-flip-box\" data-min-height=\"400\" data-flip-direction=\"horizontal-to-left\" data-h_text_align=\"center\" data-v_text_align=\"center\"><div class=\"flip-box-front\"  data-bg-overlay=\"true\" data-text-color=\"light\" style=\"background-color: #ffffff; min-height: 400px;\"> <div class=\"inner\"><\/p>\n<h3>WithSecure<br \/>\n<i><\/i><\/h3>\n<p><\/div> <\/div><div class=\"flip-box-back\"  data-bg-overlay=\"\" data-text-color=\"light\" style=\"background-color: #1239ff; min-height: 400px;\"> <div class=\"inner\">\n<h1><span dir=\"auto\">Business protection solutions<\/span><\/h1>\n<p><span dir=\"auto\">A complete selection of award-winning information security products that ensure the safety of users worldwide. You need a partner with experience, reliable technology and a secure approach to ensure your business gets the results it needs.<\/span><\/div> <\/div><\/div>\n\t\t<\/div> \n\t<\/div>\n\t<\/div> \n\n\t<div  class=\"vc_col-sm-4 vc_col-lg-4 vc_col-md-12 wpb_column column_container vc_column_container col child_column has-animation padding-1-percent inherit_tablet inherit_phone\"   data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"grow-in\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"nectar-flip-box\" data-min-height=\"400\" data-flip-direction=\"horizontal-to-left\" data-h_text_align=\"center\" data-v_text_align=\"center\"><div class=\"flip-box-front\"  data-bg-overlay=\"true\" data-text-color=\"light\" style=\"background-image: url('https:\/\/ictsolutions.mk\/wp-content\/uploads\/2025\/12\/nakivo-vector-logo.png'); background-color: #ffffff; min-height: 400px;\"> <div class=\"inner\"><\/p>\n<h3>NAKIVO<br \/>\n<i>BACKUP&amp;REPLICATION<\/i><\/h3>\n<p><\/div> <\/div><div class=\"flip-box-back\"  data-bg-overlay=\"\" data-text-color=\"light\" style=\"background-color: #1239ff; min-height: 400px;\"> <div class=\"inner\">\n<h1><span dir=\"auto\">The best solution for fast and affordable backup<\/span><\/h1>\n<p><span dir=\"auto\">NAKIVO Backup &amp; Replication is an all-in-one solution for backup, replication, ransomware protection, disaster recovery, and virtual machine monitoring that meets even the most demanding data protection requirements in today&#8217;s virtual and hybrid environments.<\/span><\/div> <\/div><\/div>\n\t\t<\/div> \n\t<\/div>\n\t<\/div> \n\n\t<div  class=\"vc_col-sm-4 vc_col-lg-4 vc_col-md-12 wpb_column column_container vc_column_container col child_column has-animation padding-1-percent inherit_tablet inherit_phone\"   data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"grow-in\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"nectar-flip-box\" data-min-height=\"400\" data-flip-direction=\"horizontal-to-left\" data-h_text_align=\"center\" data-v_text_align=\"center\"><div class=\"flip-box-front\"  data-bg-overlay=\"true\" data-text-color=\"light\" style=\"background-image: url('https:\/\/ictsolutions.mk\/wp-content\/uploads\/2025\/12\/brandefense-logo-2-scaled.png'); background-color: #ffffff; min-height: 400px;\"> <div class=\"inner\"><\/p>\n<h3>Branfence<br \/>\n<i><\/i><\/h3>\n<p><\/div> <\/div><div class=\"flip-box-back\"  data-bg-overlay=\"\" data-text-color=\"light\" style=\"background-color: #1239ff; min-height: 400px;\"> <div class=\"inner\">\n<h1>Digital Risk Protection Services<\/h1>\n<p><span dir=\"auto\">The Brandefense platform provides digital risk protection services (DRPS) by protecting critical digital assets and data from external threats. It monitors the surface, deep\/dark web, social media and networks, and app marketplaces to identify potential threats.<\/span><\/div> <\/div><\/div>\n\t\t<\/div> \n\t<\/div>\n\t<\/div> \n<\/div><\/div><div id=\"fws_69d272682492b\" data-midnight=\"\" data-column-margin=\"default\" class=\"wpb_row vc_row-fluid vc_row inner_row\"  style=\"\"><div class=\"row-bg-wrap\"> <div class=\"row-bg\" ><\/div> <\/div><div class=\"row_col_wrap_12_inner col span_12  left\">\n\t<div  class=\"vc_col-sm-4 vc_col-lg-4 vc_col-md-12 wpb_column column_container vc_column_container col child_column has-animation padding-1-percent inherit_tablet inherit_phone\"   data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"grow-in\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"nectar-flip-box\" data-min-height=\"400\" data-flip-direction=\"horizontal-to-left\" data-h_text_align=\"center\" data-v_text_align=\"center\"><div class=\"flip-box-front\"  data-bg-overlay=\"true\" data-text-color=\"light\" style=\"background-image: url('https:\/\/ictsolutions.mk\/wp-content\/uploads\/2025\/12\/Logotipo-seQura-pastilla.png'); background-color: #ffffff; min-height: 400px;\"> <div class=\"inner\"><\/p>\n<h3>\u0421\u0435\u043a\u0443\u0440\u0430<br \/>\n<i><\/i><\/h3>\n<p><\/div> <\/div><div class=\"flip-box-back\"  data-bg-overlay=\"\" data-text-color=\"light\" style=\"background-color: #1239ff; min-height: 400px;\"> <div class=\"inner\">\n<h1><span dir=\"auto\">Digital sovereignty is a fundamental right for citizens, institutions and society<\/span><\/h1>\n<p><span dir=\"auto\">We strive to ensure the sovereignty of companies in everyday processes and privileged information. To this end, we work against data theft by tracing the actions of administrators on networks, servers, databases and various devices. In addition, we strive to comply with audit requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/span><\/div> <\/div><\/div>\n\t\t<\/div> \n\t<\/div>\n\t<\/div> \n\n\t<div  class=\"vc_col-sm-4 vc_col-lg-4 vc_col-md-12 wpb_column column_container vc_column_container col child_column has-animation padding-1-percent inherit_tablet inherit_phone\"   data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"grow-in\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"nectar-flip-box\" data-min-height=\"400\" data-flip-direction=\"horizontal-to-left\" data-h_text_align=\"center\" data-v_text_align=\"center\"><div class=\"flip-box-front\"  data-bg-overlay=\"true\" data-text-color=\"light\" style=\"background-image: url('https:\/\/ictsolutions.mk\/wp-content\/uploads\/2025\/12\/download.png'); background-color: #ffffff; min-height: 400px;\"> <div class=\"inner\"><\/p>\n<h3>Genians<br \/>\n<i><\/i><\/h3>\n<p><\/div> <\/div><div class=\"flip-box-back\"  data-bg-overlay=\"\" data-text-color=\"light\" style=\"background-color: #1239ff; min-height: 400px;\"> <div class=\"inner\">\n<h1>Zero Trust Access Platform<\/h1>\n<p><span dir=\"auto\">Genians scans and monitors user devices as they connect to the network, looking for data and behavior that could impact security. Whether threats are from internal or external sources, detection and prevention occurs in real time.<\/span><\/div> <\/div><\/div>\n\t\t<\/div> \n\t<\/div>\n\t<\/div> \n\n\t<div  class=\"vc_col-sm-4 vc_col-lg-4 vc_col-md-12 wpb_column column_container vc_column_container col child_column has-animation padding-1-percent inherit_tablet inherit_phone\"   data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"grow-in\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"nectar-flip-box\" data-min-height=\"400\" data-flip-direction=\"horizontal-to-left\" data-h_text_align=\"center\" data-v_text_align=\"center\"><div class=\"flip-box-front\"  data-bg-overlay=\"true\" data-text-color=\"light\" style=\"background-image: url('https:\/\/ictsolutions.mk\/wp-content\/uploads\/2025\/12\/losing.jpg'); background-color: #ffffff; min-height: 400px;\"> <div class=\"inner\"><\/p>\n<h3>Logsign SIEM<i><\/i><\/h3>\n<p><\/div> <\/div><div class=\"flip-box-back\"  data-bg-overlay=\"\" data-text-color=\"light\" style=\"background-color: #1239ff; min-height: 400px;\"> <div class=\"inner\">\n<h1><span dir=\"auto\">Full network monitoring with Logsign SIEM<\/span><\/h1>\n<p><span dir=\"auto\">Logsign SIEM is an advanced solution with centralized monitoring of corporate infrastructure. Gain full visibility and control over your data. Automate and organize the processes for detecting and responding to attacks to reduce the mean time to recovery and improve workforce efficiency.<\/span><\/div> <\/div><\/div>\n\t\t<\/div> \n\t<\/div>\n\t<\/div> \n<\/div><\/div><div id=\"fws_69d2726825310\" data-midnight=\"\" data-column-margin=\"default\" class=\"wpb_row vc_row-fluid vc_row inner_row\"  style=\"\"><div class=\"row-bg-wrap\"> <div class=\"row-bg\" ><\/div> <\/div><div class=\"row_col_wrap_12_inner col span_12  left\">\n\t<div  class=\"vc_col-sm-4 vc_col-lg-4 vc_col-md-12 wpb_column column_container vc_column_container col child_column has-animation padding-1-percent inherit_tablet inherit_phone\"   data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"grow-in\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"nectar-flip-box\" data-min-height=\"400\" data-flip-direction=\"horizontal-to-left\" data-h_text_align=\"center\" data-v_text_align=\"center\"><div class=\"flip-box-front\"  data-bg-overlay=\"true\" data-text-color=\"light\" style=\"background-image: url('https:\/\/ictsolutions.mk\/wp-content\/uploads\/2025\/12\/F-SECURE_LOGO_HORIZONTAL_BLACK_RGB-1.png'); background-color: #ffffff; min-height: 400px;\"> <div class=\"inner\"><\/p>\n<h3>F-Secure<br \/>\n<i><\/i><\/h3>\n<p><\/div> <\/div><div class=\"flip-box-back\"  data-bg-overlay=\"\" data-text-color=\"light\" style=\"background-color: #1239ff; min-height: 400px;\"> <div class=\"inner\">\n<h1><span dir=\"auto\">Digital sovereignty is a fundamental right for citizens, institutions and society<\/span><\/h1>\n<p><span dir=\"auto\">We strive to ensure the sovereignty of companies in everyday processes and privileged information. To this end, we work against data theft by tracing the actions of administrators on networks, servers, databases and various devices. In addition, we strive to comply with audit requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/span><\/div> <\/div><\/div>\n\t\t<\/div> \n\t<\/div>\n\t<\/div> \n\n\t<div  class=\"vc_col-sm-4 vc_col-lg-4 vc_col-md-12 wpb_column column_container vc_column_container col child_column has-animation padding-1-percent inherit_tablet inherit_phone\"   data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"grow-in\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"nectar-flip-box\" data-min-height=\"400\" data-flip-direction=\"horizontal-to-left\" data-h_text_align=\"center\" data-v_text_align=\"center\"><div class=\"flip-box-front\"  data-bg-overlay=\"true\" data-text-color=\"light\" style=\"background-image: url('https:\/\/ictsolutions.mk\/wp-content\/uploads\/2025\/12\/Fortinet-Logo.wine_-scaled.png'); background-color: #ffffff; min-height: 400px;\"> <div class=\"inner\"><\/p>\n<h3>Fortinet<br \/>\n<i><\/i><\/h3>\n<p><\/div> <\/div><div class=\"flip-box-back\"  data-bg-overlay=\"\" data-text-color=\"light\" style=\"background-color: #1239ff; min-height: 400px;\"> <div class=\"inner\">\n<h1><span dir=\"auto\">Fortinet, information security solutions<\/span><\/h1>\n<p><span dir=\"auto\">The variety of products is tightly integrated into one automated, high-performance platform that spans endpoints, on-premises and hybrid networks.<\/span><\/div> <\/div><\/div>\n\t\t<\/div> \n\t<\/div>\n\t<\/div> \n\n\t<div  class=\"vc_col-sm-4 vc_col-lg-4 vc_col-md-12 wpb_column column_container vc_column_container col child_column has-animation padding-1-percent inherit_tablet inherit_phone\"   data-padding-pos=\"all\" data-has-bg-color=\"false\" data-bg-color=\"\" data-bg-opacity=\"1\" data-animation=\"grow-in\" data-delay=\"0\" >\n\t\t<div class=\"vc_column-inner\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"nectar-flip-box\" data-min-height=\"400\" data-flip-direction=\"horizontal-to-left\" data-h_text_align=\"center\" data-v_text_align=\"center\"><div class=\"flip-box-front\"  data-bg-overlay=\"true\" data-text-color=\"light\" style=\"background-image: url('https:\/\/ictsolutions.mk\/wp-content\/uploads\/2025\/12\/ITSMINE.jpg'); background-color: #ffffff; min-height: 400px;\"> <div class=\"inner\"><\/p>\n<h3>ItsMine<i><\/i><\/h3>\n<p><\/div> <\/div><div class=\"flip-box-back\"  data-bg-overlay=\"\" data-text-color=\"light\" style=\"background-color: #1239ff; min-height: 400px;\"> <div class=\"inner\">\n<h1><span dir=\"auto\">Beyond DLP solution for protecting critical company resources<\/span><\/h1>\n<p><span dir=\"auto\">A DLP solution with unique technology that allows you to track and protect company data wherever it is located<\/span><\/div> <\/div><\/div>\n\t\t<\/div> \n\t<\/div>\n\t<\/div> \n<\/div><\/div>\n\t\t\t<\/div> \n\t\t<\/div>\n\t<\/div> \n<\/div><\/div>","protected":false},"excerpt":{"rendered":"WithSecure Business protection solutions A complete selection of award-winning information security products that ensure the safety of users worldwide. You need a partner with experience, reliable technology and a secure...","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6959","page","type-page","status-publish"],"jetpack_sharing_enabled":false,"_links":{"self":[{"href":"https:\/\/ictsolutions.mk\/mk\/wp-json\/wp\/v2\/pages\/6959","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ictsolutions.mk\/mk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ictsolutions.mk\/mk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ictsolutions.mk\/mk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ictsolutions.mk\/mk\/wp-json\/wp\/v2\/comments?post=6959"}],"version-history":[{"count":14,"href":"https:\/\/ictsolutions.mk\/mk\/wp-json\/wp\/v2\/pages\/6959\/revisions"}],"predecessor-version":[{"id":7109,"href":"https:\/\/ictsolutions.mk\/mk\/wp-json\/wp\/v2\/pages\/6959\/revisions\/7109"}],"wp:attachment":[{"href":"https:\/\/ictsolutions.mk\/mk\/wp-json\/wp\/v2\/media?parent=6959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}