{"id":27461,"date":"2022-12-06T16:11:59","date_gmt":"2022-12-06T15:11:59","guid":{"rendered":"https:\/\/proid.cz\/produkty\/zavedeni-nastroju-a-rizeni-bezpecnosti-pro-nis2\/"},"modified":"2024-01-03T13:47:18","modified_gmt":"2024-01-03T12:47:18","slug":"implementation-of-tools-and-security-management-for-nis2","status":"publish","type":"dt_portfolio","link":"https:\/\/proid.cz\/en\/produkty\/implementation-of-tools-and-security-management-for-nis2\/","title":{"rendered":"Implementation of tools and security management for NIS2"},"content":{"rendered":"<p>[vc_row type=&#8221;vc_default&#8221;][vc_column][vc_empty_space height=&#8221;60&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space height=&#8221;40&#8243;][vc_column_text]<\/p>\n<h4 style=\"color: #00b4a0;\">Mandatory legislation<\/h4>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][vc_column_text]<\/p>\n<h1>Implementation of tools and security management for NIS2<\/h1>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30&#8243;][vc_column_text]<\/p>\n<h5>Tools, processes and security policies<\/h5>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30&#8243;]<style type=\"text\/css\" data-type=\"the7_shortcodes-inline-css\">#default-btn-56cbd51407ede8962af6fb3fb3a76c23.ico-right-side > i {\n  margin-right: 0px;\n  margin-left: 8px;\n}\n#default-btn-56cbd51407ede8962af6fb3fb3a76c23 > i {\n  margin-right: 8px;\n}\n<\/style><a href=\"#!\/popis\" class=\"default-btn-shortcode dt-btn dt-btn-l link-hover-off anchor-link btn-inline-left \" id=\"default-btn-56cbd51407ede8962af6fb3fb3a76c23\"><span>Learn more<\/span><\/a>[vc_empty_space height=&#8221;20&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;17117&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; image_hovers=&#8221;false&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row anchor=&#8221;popis2&#8243;][vc_column][vc_empty_space height=&#8221;50&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h2 style=\"text-align: center;\">We will help you solve the processes and technologies for NIS 2. Fast and comprehensive.<\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: center;\">We offer many years of experience from dozens of implemented projects that were in compliance with the strictest legislation (NIS 1, eIDAS, Cyber Security Act, etc.).<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;20&#8243;][\/vc_column][\/vc_row][vc_row anchor=&#8221;popis2&#8243;][vc_column][vc_empty_space height=&#8221;50&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;26843&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_empty_space height=&#8221;20&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h3>NIS 2 as the basis for EU and your organisation&#8217;s&nbsp;cybersecurity<\/h3>\n<p>Over the past few years, the number of cyberattacks on critical government organizations and private entities has increased dramatically. These attacks caused long-term outages and huge financial damage.<\/p>\n<p>The new EU Cybersecurity Strategy (NIS 2) aims to improve tools and resources to ensure security at the level of the organisations themselves.<\/p>\n<p>The NIS 2 Directive will be mandatory and will apply to 150,000 entities in the European Union. It will also include completely new industries, such as the food industry and manufacturing companies. The maximum fine for non-compliance will be \u20ac10,000,000, or 2% of the company&#8217;s&nbsp;total worldwide annual turnover.<br \/>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; disable_element=&#8221;yes&#8221; css=&#8221;.vc_custom_1695111056022{padding-right: 50px !important;padding-left: 50px !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row anchor=&#8221;popis2&#8243;][vc_column][vc_empty_space height=&#8221;70&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h3 style=\"text-align: center;\">Compliance with NIS 2 requires detailed knowledge of processes, legislation and technical solutions. We have it.<\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243;][vc_row_inner equal_height=&#8221;yes&#8221; gap=&#8221;20&#8243;][vc_column_inner width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1659615389198{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 20px !important;padding-right: 20px !important;padding-left: 20px !important;border-left-color: #d5d5d5 !important;border-left-style: solid !important;border-right-color: #d5d5d5 !important;border-right-style: solid !important;border-top-color: #d5d5d5 !important;border-top-style: solid !important;border-bottom-color: #d5d5d5 !important;border-bottom-style: solid !important;border-radius: 25px !important;}&#8221;][vc_single_image image=&#8221;16537&#8243; img_size=&#8221;50&#215;50&#8243; alignment=&#8221;right&#8221;][vc_empty_space height=&#8221;20&#8243;][vc_column_text]<\/p>\n<h4>Certification<\/h4>\n<p>Our solutions, the companies involved and our consultants meet Czech and EU certifications.[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1659615606769{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 20px !important;padding-right: 20px !important;padding-left: 20px !important;border-left-color: #d5d5d5 !important;border-left-style: solid !important;border-right-color: #d5d5d5 !important;border-right-style: solid !important;border-top-color: #d5d5d5 !important;border-top-style: solid !important;border-bottom-color: #d5d5d5 !important;border-bottom-style: solid !important;border-radius: 25px !important;}&#8221;][vc_single_image image=&#8221;17457&#8243; img_size=&#8221;50&#215;50&#8243; alignment=&#8221;right&#8221;][vc_empty_space height=&#8221;20&#8243;][vc_column_text]<\/p>\n<h4>Experience<\/h4>\n<p>We have implemented dozens of projects for the largest authorities, hospitals and small companies.[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243; css=&#8221;.vc_custom_1659615887078{border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;padding-top: 20px !important;padding-right: 20px !important;padding-left: 20px !important;border-left-color: #d5d5d5 !important;border-left-style: solid !important;border-right-color: #d5d5d5 !important;border-right-style: solid !important;border-top-color: #d5d5d5 !important;border-top-style: solid !important;border-bottom-color: #d5d5d5 !important;border-bottom-style: solid !important;border-radius: 25px !important;}&#8221;][vc_single_image image=&#8221;26847&#8243; img_size=&#8221;50&#215;50&#8243; alignment=&#8221;right&#8221;][vc_empty_space height=&#8221;20&#8243;][vc_column_text css=&#8221;.vc_custom_1704285412283{padding-left: 0px !important;}&#8221;]<\/p>\n<h4>Hinterland<\/h4>\n<p>We have offices all over the Czech Republic and dozens of cybersecurity experts.[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row anchor=&#8221;popis&#8221;][vc_column][vc_empty_space height=&#8221;50&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h2 style=\"text-align: center;\">We can help you secure your organization and comply with mandatory regulations<\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;50&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243;][vc_row_inner content_placement=&#8221;middle&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;17445&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_rounded&#8221;][vc_empty_space height=&#8221;20&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div class=\"standard-arrow bullet-top\"><h3>Technical solutions for NIS 2<\/h3>\n<ul>\n<li>Implementing Two-Factor Authentication<\/li>\n<li>Implement strong cryptography and endpoint encryption<\/li>\n<li>Securing networks, applications, systems, and software<\/li>\n<li>Ensuring the physical and digital security of IT infrastructure<\/li>\n<li>Detection and assessment of cyber threats<\/li>\n<li>Ensuring data backup and eventual recovery<\/li>\n<\/ul>\n<\/div>[\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][vc_empty_space height=&#8221;50&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h3 style=\"text-align: center;\">Secure Two-Factor Login Tools<\/h3>\n<p style=\"text-align: center;\">The introduction of two-factor authentication into the organization&#8217;s&nbsp;systems is one of the basic requirements of both NIS 2 and ZKB. We will deliver and implement ProID technology to ensure secure access to your data.<\/p>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;50&#8243;][vc_empty_space height=&#8221;20&#8243;][vc_single_image image=&#8221;17852&#8243; img_size=&#8221;full&#8221; onclick=&#8221;link_image&#8221;][vc_single_image image=&#8221;17766&#8243; img_size=&#8221;full&#8221; onclick=&#8221;link_image&#8221;][vc_empty_space height=&#8221;20&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_empty_space height=&#8221;50&#8243;][vc_column_text]<\/p>\n<h3 style=\"text-align: center;\">Construction of PKI infrastructure and Certification Authorities<\/h3>\n<p style=\"text-align: center;\">PKI (Public Key Infrastructure) is a&nbsp;technology for managing digital certificates and for cryptographic operations (electronic signature, communication encryption, endpoint encryption, etc.). PKI is based on the Certification Authorities system. Within organizations, we most often build a&nbsp;two-tier PKI hierarchy, where one is the root Certification Authority and the others are subordinate.<\/p>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20&#8243;][vc_single_image image=&#8221;27465&#8243; img_size=&#8221;full&#8221;][vc_empty_space height=&#8221;20&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; disable_element=&#8221;yes&#8221;][vc_column][vc_empty_space height=&#8221;50&#8243;][vc_row_inner content_placement=&#8221;middle&#8221;][vc_column_inner el_class=&#8221;vc_col-sm-push-6&#8243; width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;639&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_rounded&#8221;][vc_empty_space height=&#8221;20&#8243;][\/vc_column_inner][vc_column_inner el_class=&#8221;vc_col-sm-pull-6&#8243; width=&#8221;1\/2&#8243;]<div class=\"standard-arrow bullet-top\"><h3>Procesy a&nbsp;intern\u00ed mechanismy<\/h3>\n<ul>\n<li>Anal\u00fdza rizik a&nbsp;bezpe\u010dnosti informa\u010dn\u00edch syst\u00e9m\u016f<\/li>\n<li>\u0158\u00edzen\u00ed kontinuity provozu<\/li>\n<li>Zabezpe\u010den\u00ed dodavatelsk\u00fdch \u0159et\u011bzc\u016f<\/li>\n<li>Zaji\u0161t\u011bn\u00ed \u00fadr\u017eby informa\u010dn\u00edch syst\u00e9m\u016f<\/li>\n<li>Vytvo\u0159en\u00ed politik a&nbsp;postup\u016f k&nbsp;\u0159\u00edzen\u00ed rizik<\/li>\n<li>Zaji\u0161t\u011bn\u00ed kontroly p\u0159\u00edstup\u016f a&nbsp;spr\u00e1va aktiv<\/li>\n<\/ul>\n<\/div>[\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; disable_element=&#8221;yes&#8221;][vc_column][vc_empty_space height=&#8221;50&#8243;][vc_row_inner content_placement=&#8221;middle&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;3453&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_rounded&#8221;][vc_empty_space height=&#8221;20&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div class=\"standard-arrow bullet-top\"><h3>Vzd\u011bl\u00e1v\u00e1n\u00ed a&nbsp;odborn\u00e1 podpora<\/h3>\n<ul>\n<li>Vzd\u011bl\u00e1v\u00e1n\u00ed managementu a&nbsp;zam\u011bstnanc\u016f<\/li>\n<li>Tvorba bezpe\u010dnost\u00ed dokumentace<\/li>\n<li>\u0160kolen\u00ed v&nbsp;oblasti kybernetick\u00e9 bezpe\u010dnosti<\/li>\n<li>Zaji\u0161t\u011bn\u00ed dokumentace pro pln\u011bn\u00ed po\u017eadavk\u016f<\/li>\n<li>Zaji\u0161t\u011bn\u00ed oznamovac\u00ed povinnosti incident\u016f<\/li>\n<\/ul>\n<\/div>[\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row anchor=&#8221;popis2&#8243;][vc_column][vc_empty_space height=&#8221;50&#8243;][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row type=&#8221;vc_default&#8221; bg_type=&#8221;bg_color&#8221; bg_override=&#8221;full&#8221; bg_color_value=&#8221;#f5f5f5&#8243; el_id=&#8221;kontakt&#8221;][vc_column][vc_empty_space height=&#8221;30&#8243;][vc_empty_space height=&#8221;50&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h2 style=\"text-align: left;\"><span style=\"color: #413b8d;\">Do you need help? Contact Us<\/span><\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30&#8243;]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f6425-o1\" lang=\"en-US\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/dt_portfolio\/27461#wpcf7-f6425-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"6425\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.7.6\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f6425-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/div>\n<div class=\"one-half\">\n\t<p><label> Your name*<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n\t<\/p>\n<\/div>\n<div class=\"one-half last\">\n\t<p><label> Your email*<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n\t<\/p>\n<\/div>\n<div class=\"one-half\">\n\t<p><label> Your phone*<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"tel-946\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-tel wpcf7-validates-as-required wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"tel\" name=\"tel-946\" \/><\/span><\/label>\n\t<\/p>\n<\/div>\n<div class=\"one-half last\">\n\t<p><label> Company*<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-subject\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-subject\" \/><\/span> <\/label>\n\t<\/p>\n<\/div>\n<p>By filling in the form you agree to the <a href=\"https:\/\/www.monetplus.cz\/zasady-zpracovani-osobnich-udaju\" target=\"_blank\">processing of your personal data<\/a>.\n<\/p>\n<p><input class=\"wpcf7-form-control has-spinner wpcf7-submit\" type=\"submit\" value=\"Submit\" \/>\n<\/p><input type='hidden' class='wpcf7-pum' value='{\"closepopup\":false,\"closedelay\":0,\"openpopup\":false,\"openpopup_id\":0}' \/><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[vc_empty_space height=&#8221;20&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We can help you solve processes and technologies for NIS 2 and meet mandatory regulations. Quickly and comprehensively.<\/p>\n","protected":false},"author":1,"featured_media":16538,"comment_status":"closed","ping_status":"closed","template":"","dt_portfolio_category":[61],"dt_portfolio_tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Implementation of tools and security management for NIS2 &ndash; ProID<\/title>\n<meta name=\"description\" content=\"We can help you solve processes and technologies for NIS 2 and meet mandatory regulations. Quickly and comprehensively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/proid.cz\/en\/produkty\/implementation-of-tools-and-security-management-for-nis2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Implementation of tools and security management for NIS2 &ndash; ProID\" \/>\n<meta property=\"og:description\" content=\"We can help you solve processes and technologies for NIS 2 and meet mandatory regulations. Quickly and comprehensively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/proid.cz\/en\/produkty\/implementation-of-tools-and-security-management-for-nis2\/\" \/>\n<meta property=\"og:site_name\" content=\"ProID\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-03T12:47:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/proid.cz\/wp-content\/uploads\/2020\/06\/streamline-icon-crime-seal-forfeit@140x140.png\" \/>\n\t<meta property=\"og:image:width\" content=\"140\" \/>\n\t<meta property=\"og:image:height\" content=\"140\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/proid.cz\/en\/produkty\/implementation-of-tools-and-security-management-for-nis2\/\",\"url\":\"https:\/\/proid.cz\/en\/produkty\/implementation-of-tools-and-security-management-for-nis2\/\",\"name\":\"Implementation of tools and security management for NIS2 &ndash; ProID\",\"isPartOf\":{\"@id\":\"https:\/\/proid.cz\/en\/#website\"},\"datePublished\":\"2022-12-06T15:11:59+00:00\",\"dateModified\":\"2024-01-03T12:47:18+00:00\",\"description\":\"We can help you solve processes and technologies for NIS 2 and meet mandatory regulations. Quickly and comprehensively.\",\"breadcrumb\":{\"@id\":\"https:\/\/proid.cz\/en\/produkty\/implementation-of-tools-and-security-management-for-nis2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/proid.cz\/en\/produkty\/implementation-of-tools-and-security-management-for-nis2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/proid.cz\/en\/produkty\/implementation-of-tools-and-security-management-for-nis2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Dom\u016f\",\"item\":\"https:\/\/proid.cz\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Portfolio\",\"item\":\"https:\/\/proid.cz\/en\/produkty\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Implementation of tools and security management for NIS2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/proid.cz\/en\/#website\",\"url\":\"https:\/\/proid.cz\/en\/\",\"name\":\"ProID\",\"description\":\"Ultimate Digital Identity for Employees and Organisations\",\"publisher\":{\"@id\":\"https:\/\/proid.cz\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/proid.cz\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/proid.cz\/en\/#organization\",\"name\":\"ProID by MONET+\",\"url\":\"https:\/\/proid.cz\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/proid.cz\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/proid.cz\/wp-content\/uploads\/2021\/06\/logo_proid_1200x1200_white-680.png\",\"contentUrl\":\"https:\/\/proid.cz\/wp-content\/uploads\/2021\/06\/logo_proid_1200x1200_white-680.png\",\"width\":680,\"height\":680,\"caption\":\"ProID by MONET+\"},\"image\":{\"@id\":\"https:\/\/proid.cz\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Implementation of tools and security management for NIS2 &ndash; ProID","description":"We can help you solve processes and technologies for NIS 2 and meet mandatory regulations. Quickly and comprehensively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/proid.cz\/en\/produkty\/implementation-of-tools-and-security-management-for-nis2\/","og_locale":"en_US","og_type":"article","og_title":"Implementation of tools and security management for NIS2 &ndash; ProID","og_description":"We can help you solve processes and technologies for NIS 2 and meet mandatory regulations. Quickly and comprehensively.","og_url":"https:\/\/proid.cz\/en\/produkty\/implementation-of-tools-and-security-management-for-nis2\/","og_site_name":"ProID","article_modified_time":"2024-01-03T12:47:18+00:00","og_image":[{"width":140,"height":140,"url":"https:\/\/proid.cz\/wp-content\/uploads\/2020\/06\/streamline-icon-crime-seal-forfeit@140x140.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/proid.cz\/en\/produkty\/implementation-of-tools-and-security-management-for-nis2\/","url":"https:\/\/proid.cz\/en\/produkty\/implementation-of-tools-and-security-management-for-nis2\/","name":"Implementation of tools and security management for NIS2 &ndash; ProID","isPartOf":{"@id":"https:\/\/proid.cz\/en\/#website"},"datePublished":"2022-12-06T15:11:59+00:00","dateModified":"2024-01-03T12:47:18+00:00","description":"We can help you solve processes and technologies for NIS 2 and meet mandatory regulations. Quickly and comprehensively.","breadcrumb":{"@id":"https:\/\/proid.cz\/en\/produkty\/implementation-of-tools-and-security-management-for-nis2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/proid.cz\/en\/produkty\/implementation-of-tools-and-security-management-for-nis2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/proid.cz\/en\/produkty\/implementation-of-tools-and-security-management-for-nis2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Dom\u016f","item":"https:\/\/proid.cz\/en\/"},{"@type":"ListItem","position":2,"name":"Portfolio","item":"https:\/\/proid.cz\/en\/produkty\/"},{"@type":"ListItem","position":3,"name":"Implementation of tools and security management for NIS2"}]},{"@type":"WebSite","@id":"https:\/\/proid.cz\/en\/#website","url":"https:\/\/proid.cz\/en\/","name":"ProID","description":"Ultimate Digital Identity for Employees and Organisations","publisher":{"@id":"https:\/\/proid.cz\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/proid.cz\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/proid.cz\/en\/#organization","name":"ProID by MONET+","url":"https:\/\/proid.cz\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/proid.cz\/en\/#\/schema\/logo\/image\/","url":"https:\/\/proid.cz\/wp-content\/uploads\/2021\/06\/logo_proid_1200x1200_white-680.png","contentUrl":"https:\/\/proid.cz\/wp-content\/uploads\/2021\/06\/logo_proid_1200x1200_white-680.png","width":680,"height":680,"caption":"ProID by MONET+"},"image":{"@id":"https:\/\/proid.cz\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/dt_portfolio\/27461"}],"collection":[{"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/dt_portfolio"}],"about":[{"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/types\/dt_portfolio"}],"author":[{"embeddable":true,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/comments?post=27461"}],"version-history":[{"count":5,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/dt_portfolio\/27461\/revisions"}],"predecessor-version":[{"id":27471,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/dt_portfolio\/27461\/revisions\/27471"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/media\/16538"}],"wp:attachment":[{"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/media?parent=27461"}],"wp:term":[{"taxonomy":"dt_portfolio_category","embeddable":true,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/dt_portfolio_category?post=27461"},{"taxonomy":"dt_portfolio_tags","embeddable":true,"href":"https:\/\/proid.cz\/en\/wp-json\/wp\/v2\/dt_portfolio_tags?post=27461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}