{"id":723,"date":"2018-08-08T10:10:29","date_gmt":"2018-08-08T10:10:29","guid":{"rendered":"https:\/\/panel.p2pmk.xyz\/~kabtel\/?page_id=723"},"modified":"2025-02-20T09:58:29","modified_gmt":"2025-02-20T08:58:29","slug":"it-security","status":"publish","type":"page","link":"https:\/\/kabtel.mk\/en\/solutions\/it-security\/","title":{"rendered":"IT Security"},"content":{"rendered":"<p>[vc_section css=\u201d.vc_custom_1599862355982{background: #276af6 url(https:\/\/panel.p2pmk.xyz\/~kabtel\/wp-content\/uploads\/2020\/08\/Blog-2-2000\u00d71200-1.jpg?id=2759) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u201d el_class=\u201dmask\u201d][vc_row css=\u201d.vc_custom_1599862191370{padding-top: 50px !important;padding-bottom: 50px !important;}\u201d][vc_column width=\u201d1\/6\u2033][\/vc_column][vc_column width=\u201d2\/3\u2033][vc_empty_space height=\u201d20px\u201d][vc_custom_heading text=\u201dIT Security\u201d font_container=\u201dtag:h2|font_size:6rem|text_align:center|color:%23ffffff|line_height:0.9\u2033 use_theme_fonts=\u201dyes\u201d css_animation=\u201dfadeInUp\u201d el_class=\u201dcustom-hd delay-2\u2033][vc_separator color=\u201dwhite\u201d border_width=\u201d5\u2033 el_width=\u201d10\u2033 css_animation=\u201dfadeInUp\u201d el_class=\u201ddelay-4\u2033 css=\u201d.vc_custom_1540433855289{margin-bottom: 50px !important;padding-top: 15px !important;}\u201d][vc_column_text css_animation=\u201dfadeInUp\u201d css=\u201d.vc_custom_1602062971530{margin-left: 3px !important;}\u201d el_class=\u201ddelay-3\u2033]<\/p>\n<p style=\"text-align: center;\"><a class=\"button line\" href=\"https:\/kabtel.mk\/company\/contact-us\/\">Get a solution quote<\/a><\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u201d1\/6\u2033][\/vc_column][\/vc_row][\/vc_section][vc_row css=\u201d.vc_custom_1599574747385{background-color: #ffffff !important;}\u201d][vc_column offset=\u201dvc_hidden-sm vc_hidden-xs\u201d][vc_widget_sidebar sidebar_id=\u201dsidebar-5b93349ec234c\u201d][\/vc_column][\/vc_row][vc_section css_animation=\u201dnone\u201d el_id=\u201doverview\u201d][vc_row el_class=\u201dgradient2\u2033][vc_column width=\u201d1\/6\u2033][\/vc_column][vc_column width=\u201d2\/3\u2033][vc_empty_space height=\u201d100px\u201d][vc_custom_heading text=\u201doverview\u201d font_container=\u201dtag:h6|font_size:10px|text_align:center|color:%23627792\u2033 use_theme_fonts=\u201dyes\u201d el_class=\u201dstyle1\u2033][vc_empty_space height=\u201d6px\u201d][vc_custom_heading text=\u201dIT Security solutions for every organization\u201d font_container=\u201dtag:h3|text_align:center\u201d use_theme_fonts=\u201dyes\u201d][vc_empty_space height=\u201d20px\u201d][vc_column_text]IT Security can oftentimes be overlooked or completely neglected. With a fast growing need for digitalization on one side, and an increasing threatscape both in volume and complexity on the other, no organization is immune to cyber attacks that can cause significant financial losses, reputation damage and in severe cases a complete shut down of the business.<\/p>\n<p>Our portfolio of IT Security solutions addresses every security pain point in your organization:<\/p>\n<ul>\n<li>Protection of endpoints, servers and mobile devices.<\/li>\n<li>Protection of the perimeter and the entire network.<\/li>\n<li>Increased automation and response to complex threats.<\/li>\n<li>Authentication and secured access to resources.<\/li>\n<li>Protection of critical infrastructure and services.<\/li>\n<li>Professional on-demand cybersecurity services.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=\u201d50px\u201d][\/vc_column][vc_column width=\u201d1\/6\u2033][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=\u201dstretch_row\u201d el_id=\u201dendpoint\u201d][vc_row gap=\u201d35\u2033 content_placement=\u201dmiddle\u201d css=\u201d.vc_custom_1599862604321{padding-top: 50px !important;padding-bottom: 30px !important;background-color: #ffffff !important;}\u201d][vc_column width=\u201d1\/6\u2033][vc_single_image image=\u201d3602\u2033 alignment=\u201dcenter\u201d css_animation=\u201dfadeInLeft\u201d][vc_empty_space height=\u201d20px\u201d css=\u201d.vc_custom_1600865089931{padding-top: 0px !important;padding-bottom: 0px !important;}\u201d][\/vc_column][vc_column css_animation=\u201dfadeIn\u201d width=\u201d1\/2\u2033 el_class=\u201ddelay-1\u2033 css=\u201d.vc_custom_1600865845192{margin-right: -90px !important;}\u201d offset=\u201dvc_col-xs-9\u2033][vc_custom_heading text=\u201dEndpoint Protection\u201d font_container=\u201dtag:h6|font_size:15px|text_align:center|color:%23627792\u2033 use_theme_fonts=\u201dyes\u201d el_class=\u201dstyle1\u2033][vc_empty_space height=\u201d30px\u201d][vc_column_text]<\/p>\n<p style=\"text-align: justify;\">With more of your business operations going digital, you need to protect every server, laptop and mobile device on your network. Our endpoint protection solutions incorporate multi-layered protection technologies to help you stay protected from common threats and ransomware, as well as application, web and device controls to protect your sensitive data on every endpoint. Additionally, flexible cloud or on-premise management makes it easy to install, configure and manage your security solutions from one spot.<\/p>\n<p style=\"text-align: justify;\">Enriched with powerful EDR capabilities for IT operations and threat hunting, it allows you to quickly identify and remediate any potential issues before they can harm your organization.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u201d1\/3\u2033][vc_empty_space height=\u201d20px\u201d css=\u201d.vc_custom_1600865249621{padding-top: 0px !important;padding-bottom: 0px !important;}\u201d][vc_custom_heading text=\u201dProvided by our partners:\u201d font_container=\u201dtag:h6|font_size:15px|text_align:center|color:%23627792\u2033 use_theme_fonts=\u201dyes\u201d el_class=\u201dstyle2\u2033][vc_empty_space height=\u201d30px\u201d][vc_single_image image=\u201d2777\u2033 img_size=\u201d1170\u00d7700\u2033 alignment=\u201dcenter\u201d style=\u201dvc_box_shadow\u201d onclick=\u201dcustom_link\u201d css_animation=\u201dfadeInRight\u201d link=\u201dhttps:\/\/kabtel.mk\/partners\/kaspersky\u201d][vc_single_image image=\u201d2782\u2033 img_size=\u201d1170\u00d7700\u2033 alignment=\u201dcenter\u201d style=\u201dvc_box_shadow\u201d onclick=\u201dcustom_link\u201d css_animation=\u201dfadeInRight\u201d link=\u201dhttps:\/\/kabtel.mk\/partners\/sophos\u201d][vc_single_image image=\u201d11177\u2033 img_size=\u201d1170\u00d7700\u2033 alignment=\u201dcenter\u201d style=\u201dvc_box_shadow\u201d onclick=\u201dcustom_link\u201d css_animation=\u201dfadeInRight\u201d link=\u201dhttps:\/\/kabtel.mk\/partners\/sophos\u201d][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=\u201dstretch_row\u201d el_id=\u201dfirewall\u201d][vc_row gap=\u201d35\u2033 content_placement=\u201dmiddle\u201d css=\u201d.vc_custom_1599862615478{padding-top: 50px !important;padding-bottom: 30px !important;background-color: #ffffff !important;}\u201d][vc_column width=\u201d1\/6\u2033][vc_single_image image=\u201d3604\u2033 alignment=\u201dcenter\u201d css_animation=\u201dfadeInLeft\u201d][vc_empty_space height=\u201d20px\u201d css=\u201d.vc_custom_1600865366091{padding-top: 0px !important;padding-bottom: 0px !important;}\u201d][\/vc_column][vc_column css_animation=\u201dfadeIn\u201d width=\u201d1\/2\u2033 el_class=\u201ddelay-1\u2033 css=\u201d.vc_custom_1600866002508{margin-right: -90px !important;}\u201d offset=\u201dvc_col-xs-9\u2033][vc_custom_heading text=\u201dNext-Gen Firewall\u201d font_container=\u201dtag:h6|font_size:15px|text_align:center|color:%23627792\u2033 use_theme_fonts=\u201dyes\u201d el_class=\u201dstyle1\u2033][vc_empty_space height=\u201d30px\u201d][vc_column_text]<\/p>\n<p style=\"text-align: justify;\">Network firewalls are evolving, and the latest generation is very different from its predecessors. We continue to see a shift in the threat landscape, and a dramatic rise in the number and complexity of security systems that protect against cyberattacks. These changes, combined with the overwhelming amount of data produced, have created a dangerous situation that requires a much different approach to network security, one that makes it essential security systems work together, simplify and streamline workflows, and parse through enormous volumes of data to focus attention on exactly what\u2019s important without negatively impacting performance. It also requires new approaches to security integration, new management systems, and new ways of identifying and responding to risks and threats.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u201d1\/3\u2033][vc_empty_space height=\u201d20px\u201d css=\u201d.vc_custom_1600865384906{padding-top: 0px !important;padding-bottom: 0px !important;}\u201d][vc_custom_heading text=\u201dProvided by our partners:\u201d font_container=\u201dtag:h6|font_size:15px|text_align:center|color:%23627792\u2033 use_theme_fonts=\u201dyes\u201d el_class=\u201dstyle2\u2033][vc_empty_space height=\u201d30px\u201d][vc_single_image image=\u201d2782\u2033 img_size=\u201d1170\u00d7700\u2033 alignment=\u201dcenter\u201d style=\u201dvc_box_shadow\u201d onclick=\u201dcustom_link\u201d css_animation=\u201dfadeInRight\u201d link=\u201dhttps:\/\/kabtel.mk\/partners\/sophos\u201d][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=\u201dstretch_row\u201d el_id=\u201demail\u201d][vc_row gap=\u201d35\u2033 content_placement=\u201dmiddle\u201d css=\u201d.vc_custom_1599862626303{padding-top: 50px !important;padding-bottom: 30px !important;background-color: #ffffff !important;}\u201d][vc_column width=\u201d1\/6\u2033][vc_single_image image=\u201d3605\u2033 alignment=\u201dcenter\u201d css_animation=\u201dfadeInLeft\u201d][vc_empty_space height=\u201d20px\u201d css=\u201d.vc_custom_1600865411337{padding-top: 0px !important;padding-bottom: 0px !important;}\u201d][\/vc_column][vc_column css_animation=\u201dfadeIn\u201d width=\u201d1\/2\u2033 el_class=\u201ddelay-1\u2033 css=\u201d.vc_custom_1600866150689{margin-right: -90px !important;}\u201d offset=\u201dvc_col-xs-9\u2033][vc_custom_heading text=\u201dMail Protection\u201d font_container=\u201dtag:h6|font_size:15px|text_align:center|color:%23627792\u2033 use_theme_fonts=\u201dyes\u201d el_class=\u201dstyle1\u2033][vc_empty_space height=\u201d30px\u201d][vc_column_text]<\/p>\n<p style=\"text-align: justify;\">Email communication is mission-critical for every business. Unfortunately, it can be abused \u2013 from unscrupulous spam-based marketing to targeted phishing with financial fraud and infrastructure penetration in mind.<\/p>\n<p style=\"text-align: justify;\">Our Mail Protection solutions provide a rock-solid frontline defense for corporate mail server infrastructure by filtering out incoming spam and protecting users from malicious emails carrying malware, fraudulent requests and phishing URLs \u2013 while helping to prevent sensitive data from leaving the perimeter.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u201d1\/3\u2033][vc_empty_space height=\u201d20px\u201d css=\u201d.vc_custom_1600865426376{padding-top: 0px !important;padding-bottom: 0px !important;}\u201d][vc_custom_heading text=\u201dProvided by our partners:\u201d font_container=\u201dtag:h6|font_size:15px|text_align:center|color:%23627792\u2033 use_theme_fonts=\u201dyes\u201d el_class=\u201dstyle2\u2033][vc_empty_space height=\u201d30px\u201d][vc_single_image image=\u201d2777\u2033 img_size=\u201d1170\u00d7700\u2033 alignment=\u201dcenter\u201d style=\u201dvc_box_shadow\u201d onclick=\u201dcustom_link\u201d css_animation=\u201dfadeInRight\u201d link=\u201dhttps:\/\/kabtel.mk\/partners\/kaspersky\u201d][vc_single_image image=\u201d2782\u2033 img_size=\u201d1170\u00d7700\u2033 alignment=\u201dcenter\u201d style=\u201dvc_box_shadow\u201d onclick=\u201dcustom_link\u201d css_animation=\u201dfadeInRight\u201d link=\u201dhttps:\/\/kabtel.mk\/partners\/sophos\u201d][vc_single_image image=\u201d11177\u2033 img_size=\u201d1170\u00d7700\u2033 alignment=\u201dcenter\u201d style=\u201dvc_box_shadow\u201d onclick=\u201dcustom_link\u201d css_animation=\u201dfadeInRight\u201d link=\u201dhttps:\/\/kabtel.mk\/partners\/sophos\u201d][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=\u201dstretch_row\u201d el_id=\u201dadvanced\u201d][vc_row gap=\u201d35\u2033 content_placement=\u201dmiddle\u201d css=\u201d.vc_custom_1599862640359{padding-top: 50px !important;padding-bottom: 30px !important;background-color: #ffffff !important;}\u201d][vc_column width=\u201d1\/6\u2033][vc_single_image image=\u201d3607\u2033 alignment=\u201dcenter\u201d css_animation=\u201dfadeInLeft\u201d][vc_empty_space height=\u201d20px\u201d css=\u201d.vc_custom_1600865449259{padding-top: 0px !important;padding-bottom: 0px !important;}\u201d][\/vc_column][vc_column css_animation=\u201dfadeIn\u201d width=\u201d1\/2\u2033 el_class=\u201ddelay-1\u2033 css=\u201d.vc_custom_1600866191721{margin-right: -90px !important;}\u201d offset=\u201dvc_col-xs-9\u2033][vc_custom_heading text=\u201dAdvanced Cybersecurity\u201d font_container=\u201dtag:h6|font_size:15px|text_align:center|color:%23627792\u2033 use_theme_fonts=\u201dyes\u201d el_class=\u201dstyle1\u2033][vc_empty_space height=\u201d30px\u201d][vc_column_text]<\/p>\n<p style=\"text-align: justify;\">Today\u2019s businesses need to combat the growing number and complexity of modern threats that bypass existing antivirus and EPP-class solutions, such as unknown malware, new viruses and ransomware, zero-day exploits and others. At the same time, there is a global shortage of skilled cybersecurity professionals, which can make it tough and expensive to hire them. Companies are looking for ways to automate the detection and response to advanced threats as much as possible. Our advanced cybersecurity solutions harness the best expert practices in combating complex threats and APT-level attacks, providing advanced threat protection without the need of stretching your resources. Make use of our Sandbox, SIEM and Anti Targeted Attack solutions to quickly identify, investigate and respond to complex threats in automated and effective manner.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u201d1\/3\u2033][vc_empty_space height=\u201d20px\u201d css=\u201d.vc_custom_1600865483504{padding-top: 0px !important;padding-bottom: 0px !important;}\u201d][vc_custom_heading text=\u201dProvided by our partners:\u201d font_container=\u201dtag:h6|font_size:15px|text_align:center|color:%23627792\u2033 use_theme_fonts=\u201dyes\u201d el_class=\u201dstyle2\u2033][vc_empty_space height=\u201d30px\u201d][vc_single_image image=\u201d2777\u2033 img_size=\u201d1170\u00d7700\u2033 alignment=\u201dcenter\u201d style=\u201dvc_box_shadow\u201d onclick=\u201dcustom_link\u201d css_animation=\u201dfadeInRight\u201d link=\u201dhttps:\/\/kabtel.mk\/partners\/kaspersky\u201d][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=\u201dstretch_row\u201d el_id=\u201dpki\u201d][vc_row gap=\u201d35\u2033 content_placement=\u201dmiddle\u201d css=\u201d.vc_custom_1599862654524{padding-top: 50px !important;padding-bottom: 30px !important;background-color: #ffffff !important;}\u201d][vc_column width=\u201d1\/6\u2033][vc_single_image image=\u201d3609\u2033 alignment=\u201dcenter\u201d css_animation=\u201dfadeInLeft\u201d][vc_empty_space height=\u201d20px\u201d css=\u201d.vc_custom_1600866278134{padding-top: 0px !important;padding-bottom: 0px !important;}\u201d][\/vc_column][vc_column css_animation=\u201dfadeIn\u201d width=\u201d1\/2\u2033 el_class=\u201ddelay-1\u2033 css=\u201d.vc_custom_1600866315750{margin-right: -90px !important;}\u201d offset=\u201dvc_col-xs-9\u2033][vc_custom_heading text=\u201dPKI\u201d font_container=\u201dtag:h6|font_size:15px|text_align:center|color:%23627792\u2033 use_theme_fonts=\u201dyes\u201d el_class=\u201dstyle1\u2033][vc_empty_space height=\u201d30px\u201d][vc_column_text]<\/p>\n<p style=\"text-align: justify;\">The Public key infrastructure (PKI) is the set of hardware, software, policies, processes, and procedures required to create, manage, distribute, use, store, and revoke digital certificates and public-keys. PKIs are the foundation that enables the use of technologies, such as digital signatures and encryption, across large user populations. PKIs help establish the identity of people, devices, and services \u2013 enabling controlled access to systems and resources, protection of data, and accountability in transactions. Next generation business applications are becoming more reliant on PKI technology to guarantee high assurance, because evolving business models are becoming more dependent on electronic interaction requiring online authentication and compliance with stricter data security regulations.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u201d1\/3\u2033][vc_empty_space height=\u201d20px\u201d css=\u201d.vc_custom_1600866292452{padding-top: 0px !important;padding-bottom: 0px !important;}\u201d][vc_custom_heading text=\u201dProvided by our partners:\u201d font_container=\u201dtag:h6|font_size:15px|text_align:center|color:%23627792\u2033 use_theme_fonts=\u201dyes\u201d el_class=\u201dstyle2\u2033][vc_empty_space height=\u201d30px\u201d][vc_single_image image=\u201d2783\u2033 img_size=\u201d1170\u00d7700\u2033 alignment=\u201dcenter\u201d style=\u201dvc_box_shadow\u201d onclick=\u201dcustom_link\u201d css_animation=\u201dfadeInRight\u201d link=\u201dhttps:\/\/kabtel.mk\/partners\/thales\u201d][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=\u201dstretch_row\u201d el_id=\u201dindustrial\u201d][vc_row gap=\u201d35\u2033 content_placement=\u201dmiddle\u201d css=\u201d.vc_custom_1599862664861{padding-top: 50px !important;padding-bottom: 30px !important;background-color: #ffffff !important;}\u201d][vc_column width=\u201d1\/6\u2033][vc_single_image image=\u201d3618\u2033 alignment=\u201dcenter\u201d css_animation=\u201dfadeInLeft\u201d][vc_empty_space height=\u201d20px\u201d css=\u201d.vc_custom_1600866365265{padding-top: 0px !important;padding-bottom: 0px !important;}\u201d][\/vc_column][vc_column css_animation=\u201dfadeIn\u201d width=\u201d1\/2\u2033 el_class=\u201ddelay-1\u2033 css=\u201d.vc_custom_1600866384859{margin-right: -90px !important;}\u201d offset=\u201dvc_col-xs-9\u2033][vc_custom_heading text=\u201dIndustrial Cybersecurity\u201d font_container=\u201dtag:h6|font_size:15px|text_align:center|color:%23627792\u2033 use_theme_fonts=\u201dyes\u201d el_class=\u201dstyle1\u2033][vc_empty_space height=\u201d30px\u201d][vc_column_text]<\/p>\n<p style=\"text-align: justify;\">There may be some overlap in the threats, but there are huge differences between the cybersecurity requirements of ICS environments and those of general business.<br \/>\nCorporate environments focus on protecting confidential data; when it comes to industrial systems, where every minute of downtime or error counts, uninterrupted operations are the ultimate priority. This is what distinguishes industrial cybersecurity from other domains \u2013 and makes implementing the right security solution so important.<br \/>\nThere\u2019s no out-of-box industrial cybersecurity, it\u2019s a process that moves through gradual roll-out with no disruption. Our solution is designed specifically for OT needs. Fault-tolerant and non-disruptive, it can work in air-gap conditions.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u201d1\/3\u2033][vc_empty_space height=\u201d20px\u201d css=\u201d.vc_custom_1600866402884{padding-top: 0px !important;padding-bottom: 0px !important;}\u201d][vc_custom_heading text=\u201dProvided by our partners:\u201d font_container=\u201dtag:h6|font_size:15px|text_align:center|color:%23627792\u2033 use_theme_fonts=\u201dyes\u201d el_class=\u201dstyle2\u2033][vc_empty_space height=\u201d30px\u201d][vc_single_image image=\u201d2777\u2033 img_size=\u201d1170\u00d7700\u2033 alignment=\u201dcenter\u201d style=\u201dvc_box_shadow\u201d onclick=\u201dcustom_link\u201d css_animation=\u201dfadeInRight\u201d link=\u201dhttps:\/\/kabtel.mk\/partners\/kaspersky\u201d][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=\u201dstretch_row\u201d el_id=\u201dservices\u201d][vc_row gap=\u201d35\u2033 content_placement=\u201dmiddle\u201d css=\u201d.vc_custom_1599862680140{padding-top: 50px !important;padding-bottom: 30px !important;background-color: #ffffff !important;}\u201d][vc_column width=\u201d1\/6\u2033][vc_single_image image=\u201d3616\u2033 alignment=\u201dcenter\u201d css_animation=\u201dfadeInLeft\u201d][vc_empty_space height=\u201d20px\u201d css=\u201d.vc_custom_1600866433053{padding-top: 0px !important;padding-bottom: 0px !important;}\u201d][\/vc_column][vc_column css_animation=\u201dfadeIn\u201d width=\u201d1\/2\u2033 el_class=\u201ddelay-1\u2033 css=\u201d.vc_custom_1600866476317{margin-right: -90px !important;}\u201d offset=\u201dvc_col-xs-9\u2033][vc_custom_heading text=\u201dCybersecurity Services\u201d font_container=\u201dtag:h6|font_size:15px|text_align:center|color:%23627792\u2033 use_theme_fonts=\u201dyes\u201d el_class=\u201dstyle1\u2033][vc_empty_space height=\u201d30px\u201d][vc_column_text]<\/p>\n<p style=\"text-align: justify;\">With a global shortage of cyber security experts on the market and IT Security not being the primary concern for administrators, organizations fail to tackle more complex and demanding tasks in order to keep their infrastructures, services and processes up and running.<br \/>\nOur Cyber Security Services is here to help in preventing, investigating, responding to, or predicting future threats that might be associated with one organization. Customers can use top notch Threat Intelligence and Reporting to enrich their existing security solutions and plan new investments, train their IT staff and employees through Cyber Security Trainings on various subjects, or they can rely on the best in the field experts for services such as Incident Response, Digital Forensics and other. With the Managed Detection and Response offering, customers can oftentimes even outsource their whole security operations and focus on the primary goal of their business.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=\u201d1\/3\u2033][vc_empty_space height=\u201d20px\u201d css=\u201d.vc_custom_1600866492360{padding-top: 0px !important;padding-bottom: 0px !important;}\u201d][vc_custom_heading text=\u201dProvided by our partners:\u201d font_container=\u201dtag:h6|font_size:15px|text_align:center|color:%23627792\u2033 use_theme_fonts=\u201dyes\u201d el_class=\u201dstyle2\u2033][vc_empty_space height=\u201d30px\u201d][vc_single_image image=\u201d2777\u2033 img_size=\u201d1170\u00d7700\u2033 alignment=\u201dcenter\u201d style=\u201dvc_box_shadow\u201d onclick=\u201dcustom_link\u201d css_animation=\u201dfadeInRight\u201d link=\u201dhttps:\/\/kabtel.mk\/partners\/kaspersky\u201d][vc_single_image image=\u201d2782\u2033 img_size=\u201d1170\u00d7700\u2033 alignment=\u201dcenter\u201d style=\u201dvc_box_shadow\u201d onclick=\u201dcustom_link\u201d css_animation=\u201dfadeInRight\u201d link=\u201dhttps:\/\/kabtel.mk\/partners\/sophos\u201d][vc_single_image image=\u201d11177\u2033 img_size=\u201d1170\u00d7700\u2033 alignment=\u201dcenter\u201d style=\u201dvc_box_shadow\u201d onclick=\u201dcustom_link\u201d css_animation=\u201dfadeInRight\u201d link=\u201dhttps:\/\/kabtel.mk\/partners\/sophos\u201d][\/vc_column][\/vc_row][\/vc_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_section css=\u201d.vc_custom_1599862355982{background: #276af6 url(https:\/\/panel.p2pmk.xyz\/~kabtel\/wp-content\/uploads\/2020\/08\/Blog-2-2000\u00d71200-1.jpg?id=2759) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u201d el_class=\u201dmask\u201d][vc_row css=\u201d.vc_custom_1599862191370{padding-top: 50px !important;padding-bottom: 50px !important;}\u201d][vc_column width=\u201d1\/6\u2033][\/vc_column][vc_column width=\u201d2\/3\u2033][vc_empty_space height=\u201d20px\u201d][vc_custom_heading text=\u201dIT Security\u201d font_container=\u201dtag:h2|font_size:6rem|text_align:center|color:%23ffffff|line_height:0.9\u2033 use_theme_fonts=\u201dyes\u201d css_animation=\u201dfadeInUp\u201d el_class=\u201dcustom-hd delay-2\u2033][vc_separator color=\u201dwhite\u201d border_width=\u201d5\u2033 el_width=\u201d10\u2033 css_animation=\u201dfadeInUp\u201d el_class=\u201ddelay-4\u2033 css=\u201d.vc_custom_1540433855289{margin-bottom: 50px !important;padding-top: 15px !important;}\u201d][vc_column_text css_animation=\u201dfadeInUp\u201d css=\u201d.vc_custom_1602062971530{margin-left: 3px !important;}\u201d el_class=\u201ddelay-3\u2033] Get a solution quote [\/vc_column_text][\/vc_column][vc_column width=\u201d1\/6\u2033][\/vc_column][\/vc_row][\/vc_section][vc_row css=\u201d.vc_custom_1599574747385{background-color: #ffffff !important;}\u201d][vc_column offset=\u201dvc_hidden-sm vc_hidden-xs\u201d][vc_widget_sidebar sidebar_id=\u201dsidebar-5b93349ec234c\u201d][\/vc_column][\/vc_row][vc_section css_animation=\u201dnone\u201d [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":721,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"tmpl\/template-fullwidth.php","meta":{"footnotes":""},"class_list":["post-723","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT Cyber Security portfolio - KABTEL - www.kabtel.mk<\/title>\n<meta name=\"description\" content=\"No organization is immune to cyber attacks - cause financial losses, reputation damage&amp;even complete shut down. KABTEL - IT Security portfolio.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kabtel.mk\/en\/solutions\/it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Cyber Security portfolio - KABTEL - www.kabtel.mk\" \/>\n<meta property=\"og:description\" content=\"No organization is immune to cyber attacks - cause financial losses, reputation damage&amp;even complete shut down. KABTEL - IT Security portfolio.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kabtel.mk\/en\/solutions\/it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"KABTEL\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Kabtelgroup\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-20T08:58:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kabtel.mk\/wp-content\/uploads\/2020\/10\/KABTEL-wemakeITwork-web2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1438\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Kabtel\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/solutions\\\/it-security\\\/\",\"url\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/solutions\\\/it-security\\\/\",\"name\":\"IT Cyber Security portfolio - KABTEL - www.kabtel.mk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/#website\"},\"datePublished\":\"2018-08-08T10:10:29+00:00\",\"dateModified\":\"2025-02-20T08:58:29+00:00\",\"description\":\"No organization is immune to cyber attacks - cause financial losses, reputation damage&even complete shut down. KABTEL - IT Security portfolio.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/solutions\\\/it-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kabtel.mk\\\/en\\\/solutions\\\/it-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/solutions\\\/it-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/\",\"name\":\"KABTEL\",\"description\":\"We make IT work\",\"publisher\":{\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/#organization\",\"name\":\"KABTEL dooel\",\"url\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/kabtel.mk\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/cropped-logo-20-goini-KABTEL-kocka.png\",\"contentUrl\":\"https:\\\/\\\/kabtel.mk\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/cropped-logo-20-goini-KABTEL-kocka.png\",\"width\":512,\"height\":512,\"caption\":\"KABTEL dooel\"},\"image\":{\"@id\":\"https:\\\/\\\/kabtel.mk\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Kabtelgroup\",\"https:\\\/\\\/x.com\\\/Kabtel\",\"https:\\\/\\\/www.instagram.com\\\/kabtel.mk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/377487\\\/admin\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCleLLF47J_M1VL2m3m0nKxw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Cyber Security portfolio - KABTEL - www.kabtel.mk","description":"No organization is immune to cyber attacks - cause financial losses, reputation damage&even complete shut down. KABTEL - IT Security portfolio.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kabtel.mk\/en\/solutions\/it-security\/","og_locale":"en_US","og_type":"article","og_title":"IT Cyber Security portfolio - KABTEL - www.kabtel.mk","og_description":"No organization is immune to cyber attacks - cause financial losses, reputation damage&even complete shut down. KABTEL - IT Security portfolio.","og_url":"https:\/\/kabtel.mk\/en\/solutions\/it-security\/","og_site_name":"KABTEL","article_publisher":"https:\/\/www.facebook.com\/Kabtelgroup","article_modified_time":"2025-02-20T08:58:29+00:00","og_image":[{"width":1438,"height":425,"url":"https:\/\/kabtel.mk\/wp-content\/uploads\/2020\/10\/KABTEL-wemakeITwork-web2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@Kabtel","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kabtel.mk\/en\/solutions\/it-security\/","url":"https:\/\/kabtel.mk\/en\/solutions\/it-security\/","name":"IT Cyber Security portfolio - KABTEL - www.kabtel.mk","isPartOf":{"@id":"https:\/\/kabtel.mk\/en\/#website"},"datePublished":"2018-08-08T10:10:29+00:00","dateModified":"2025-02-20T08:58:29+00:00","description":"No organization is immune to cyber attacks - cause financial losses, reputation damage&even complete shut down. KABTEL - IT Security portfolio.","breadcrumb":{"@id":"https:\/\/kabtel.mk\/en\/solutions\/it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kabtel.mk\/en\/solutions\/it-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kabtel.mk\/en\/solutions\/it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kabtel.mk\/en\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/kabtel.mk\/en\/solutions\/"},{"@type":"ListItem","position":3,"name":"IT Security"}]},{"@type":"WebSite","@id":"https:\/\/kabtel.mk\/en\/#website","url":"https:\/\/kabtel.mk\/en\/","name":"KABTEL","description":"We make IT work","publisher":{"@id":"https:\/\/kabtel.mk\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kabtel.mk\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kabtel.mk\/en\/#organization","name":"KABTEL dooel","url":"https:\/\/kabtel.mk\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kabtel.mk\/en\/#\/schema\/logo\/image\/","url":"https:\/\/kabtel.mk\/wp-content\/uploads\/2021\/10\/cropped-logo-20-goini-KABTEL-kocka.png","contentUrl":"https:\/\/kabtel.mk\/wp-content\/uploads\/2021\/10\/cropped-logo-20-goini-KABTEL-kocka.png","width":512,"height":512,"caption":"KABTEL dooel"},"image":{"@id":"https:\/\/kabtel.mk\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Kabtelgroup","https:\/\/x.com\/Kabtel","https:\/\/www.instagram.com\/kabtel.mk\/","https:\/\/www.linkedin.com\/company\/377487\/admin\/","https:\/\/www.youtube.com\/channel\/UCleLLF47J_M1VL2m3m0nKxw"]}]}},"_links":{"self":[{"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/pages\/723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/comments?post=723"}],"version-history":[{"count":22,"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/pages\/723\/revisions"}],"predecessor-version":[{"id":11551,"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/pages\/723\/revisions\/11551"}],"up":[{"embeddable":true,"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/pages\/721"}],"wp:attachment":[{"href":"https:\/\/kabtel.mk\/en\/wp-json\/wp\/v2\/media?parent=723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}