{"id":20693,"date":"2024-12-30T12:21:59","date_gmt":"2024-12-30T11:21:59","guid":{"rendered":"https:\/\/www.yoursec.cz\/companies-and-organisations\/"},"modified":"2025-01-13T21:03:11","modified_gmt":"2025-01-13T20:03:11","slug":"companies-and-organisations","status":"publish","type":"page","link":"https:\/\/www.yoursec.cz\/en\/companies-and-organisations\/","title":{"rendered":"Companies and organisations"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"20693\" class=\"elementor elementor-20693 elementor-20162\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-acc343c elementor-section-stretched scheme_default elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"acc343c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-cf95231 sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"cf95231\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9ff50ff sc_fly_static elementor-widget elementor-widget-trx_sc_title\" data-id=\"9ff50ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"trx_sc_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div\t\tclass=\"sc_title sc_title_default\" ><h2 class=\"sc_item_title sc_title_title sc_item_title_style_default sc_item_title_tag\"\n\t\t\t><span class=\"sc_item_title_text\"><b>Security expertise you can trust. <\/b> Protection for your business in the real and digital world.  <\/span><\/h2><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b643ab sc_height_small sc_fly_static elementor-widget elementor-widget-spacer\" data-id=\"0b643ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-600ad9e sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"600ad9e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a3a24a3 elementor-section-stretched scheme_default elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"a3a24a3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-267123d sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"267123d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-07137f0 sc_fly_static elementor-widget elementor-widget-spacer\" data-id=\"07137f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-c945016 sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"c945016\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e105b35 sc_height_small sc_layouts_hide_on_mobile sc_fly_static elementor-widget elementor-widget-spacer\" data-id=\"e105b35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4d367f sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"d4d367f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">In today&#8217;s dynamic and increasingly digital world, the <strong>security of corporate information, employees and physical premises<\/strong> is a necessity.<\/p><br>\n<br> \n<p style=\"text-align: left;\">  Our comprehensive security services help you protect everything that is valuable to your organisation. From in-depth <strong>security audits to IT penetration tests to employee and business partner background checks<\/strong>, we provide you with a comprehensive solution that gives you confidence every step of the way. To ensure maximum security, we also offer an infiltration agent that gathers information on-site and an advanced mobile camera system that monitors your key facilities 24\/7.<\/p><br>\n<br>  With our services, you get a <strong>comprehensive overview and the confidence<\/strong> that your business is protected from threats from outside and inside.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ca38a1 sc_fly_static elementor-widget elementor-widget-spacer\" data-id=\"3ca38a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a6ec14e elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"a6ec14e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-23d214d sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"23d214d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-414c398 sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"414c398\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-647d5e0 scheme_default elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"647d5e0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4250a6c sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"4250a6c\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e42f5f8 sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"e42f5f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><span style=\"color: #ffffff;\">FOR WHO?<\/span><\/h4>\n<ul class=\"trx_addons_list_success\">\n \t<li>Organizations that have large teams and complex security needs.  <\/li>\n \t<li>Companies operating in industries where sensitive information, trade secrets and confidential data are crucial.<\/li>\n \t<li>Companies that are aware of the risks not only from the external environment but also from internal threats.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3ea6f53 sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"3ea6f53\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-373b0dd sc_fly_static elementor-widget elementor-widget-text-editor\" data-id=\"373b0dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><span style=\"color: #ffffff;\">ADVANTAGES<\/span><\/h4>\n<ul class=\"trx_addons_list_success\">\n \t<li>Our services cover a wide range of security areas.<\/li>\n \t<li>Thanks to detailed analysis and screening, we can detect potential threats early.<\/li>\n \t<li>Conducting thorough background checks and audits increases your company&#8217;s credibility with clients, partners and employees.<\/li>\n \t\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b661abc elementor-section-boxed elementor-section-height-default elementor-section-height-default sc_fly_static\" data-id=\"b661abc\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-640637c sc_content_align_inherit sc_layouts_column_icons_position_left sc_fly_static\" data-id=\"640637c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80e1eeb sc_height_huge sc_fly_static elementor-widget elementor-widget-spacer\" data-id=\"80e1eeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2419d6 sc_fly_static elementor-widget elementor-widget-trx_sc_title\" data-id=\"b2419d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"trx_sc_title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div\t\tclass=\"sc_title sc_title_default\" ><span class=\"sc_item_subtitle sc_title_subtitle sc_align_center sc_item_subtitle_above sc_item_title_style_default\">our services<\/span><h2 class=\"sc_item_title sc_title_title sc_align_center sc_item_title_style_default\"\n\t\t\t><span class=\"sc_item_title_text\"><b>Choose<\/b> and your business will be safe<\/span><\/h2><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1af192 sc_fly_static elementor-widget elementor-widget-trx_sc_icons\" data-id=\"f1af192\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"trx_sc_icons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div \tclass=\"sc_icons sc_icons_divider2 sc_icons_size_small sc_align_center\" ><div class=\"sc_icons_columns_wrap sc_item_columns trx_addons_columns_wrap columns_padding_bottom\" ><div class=\"trx_addons_column-1_3 trx_addons_column-1_2-tablet\"><div class=\"sc_icons_item\"><div class=\"sc_icons_icon sc_icon_type_ icon-desktop\" style=\"color: #FF0000\" ><span class=\"sc_icon_type_ icon-desktop\" style=\"color: #FF0000\"><\/span><\/div><div class=\"sc_icons_item_details\"><h4 class=\"sc_icons_item_title\"><span>Cyber analysis<\/span><\/h4><div class=\"sc_icons_item_description\"><span>We perform penetration tests of your IT systems and physical premises to detect potential vulnerabilities.<\/span><\/div><\/div><\/div><\/div><div class=\"trx_addons_column-1_3 trx_addons_column-1_2-tablet\"><div class=\"sc_icons_item\"><div class=\"sc_icons_icon sc_icon_type_ icon-iphone\" style=\"color: #FF0000\" ><span class=\"sc_icon_type_ icon-iphone\" style=\"color: #FF0000\"><\/span><\/div><div class=\"sc_icons_item_details\"><h4 class=\"sc_icons_item_title\"><span>Mobile analysis<\/span><\/h4><div class=\"sc_icons_item_description\"><span>Mobile or laptop analytics is an advanced service aimed at obtaining and analyzing data from mobile devices.  <\/span><\/div><\/div><\/div><\/div><div class=\"trx_addons_column-1_3 trx_addons_column-1_2-tablet\"><div class=\"sc_icons_item\"><div class=\"sc_icons_icon sc_icon_type_ icon-security-camera\" style=\"color: #FF0000\" ><span class=\"sc_icon_type_ icon-security-camera\" style=\"color: #FF0000\"><\/span><\/div><div class=\"sc_icons_item_details\"><h4 class=\"sc_icons_item_title\"><span>Camera system<\/span><\/h4><div class=\"sc_icons_item_description\"><span>We provide a mobile system of hidden cameras that continuously monitor your objects of interest.<\/span><\/div><\/div><\/div><\/div><div class=\"trx_addons_column-1_3 trx_addons_column-1_2-tablet\"><div class=\"sc_icons_item\"><div class=\"sc_icons_icon sc_icon_type_ icon-users-group\" style=\"color: #FF0000\" ><span class=\"sc_icon_type_ icon-users-group\" style=\"color: #FF0000\"><\/span><\/div><div class=\"sc_icons_item_details\"><h4 class=\"sc_icons_item_title\"><span>Security audits<\/span><\/h4><div class=\"sc_icons_item_description\"><span>We offer comprehensive security audits focused on employee screening and security projects.  <\/span><\/div><\/div><\/div><\/div><div class=\"trx_addons_column-1_3 trx_addons_column-1_2-tablet\"><div class=\"sc_icons_item\"><div class=\"sc_icons_icon sc_icon_type_ icon-vcard\" style=\"color: #FF0000\" ><span class=\"sc_icon_type_ icon-vcard\" style=\"color: #FF0000\"><\/span><\/div><div class=\"sc_icons_item_details\"><h4 class=\"sc_icons_item_title\"><span>Corporate background checks<\/span><\/h4><div class=\"sc_icons_item_description\"><span>We screen applicants, employees and business partners to ensure your business is protected against risks.<\/span><\/div><\/div><\/div><\/div><div class=\"trx_addons_column-1_3 trx_addons_column-1_2-tablet\"><div class=\"sc_icons_item\"><div class=\"sc_icons_icon sc_icon_type_ icon-resume\" style=\"color: #FF0000\" ><span class=\"sc_icon_type_ icon-resume\" style=\"color: #FF0000\"><\/span><\/div><div class=\"sc_icons_item_details\"><h4 class=\"sc_icons_item_title\"><span>Agent infiltration<\/span><\/h4><div class=\"sc_icons_item_description\"><span>We provide a service to infiltrate a detective into your work team to gather information on site.<\/span><\/div><\/div><\/div><\/div><div class=\"trx_addons_column-1_3 trx_addons_column-1_2-tablet\"><div class=\"sc_icons_item\"><div class=\"sc_icons_icon sc_icon_type_ icon-phone-2\" style=\"color: #FF0000\" ><span class=\"sc_icon_type_ icon-phone-2\" style=\"color: #FF0000\"><\/span><\/div><div class=\"sc_icons_item_details\"><h4 class=\"sc_icons_item_title\"><span>Searching for wiretaps<\/span><\/h4><div class=\"sc_icons_item_description\"><span>We will find and remove hidden wiretaps to keep your privacy intact.<\/span><\/div><\/div><\/div><\/div><div class=\"trx_addons_column-1_3 trx_addons_column-1_2-tablet\"><div class=\"sc_icons_item\"><div class=\"sc_icons_icon sc_icon_type_ icon-car\" style=\"color: #FF0000\" ><span class=\"sc_icon_type_ icon-car\" style=\"color: #FF0000\"><\/span><\/div><div class=\"sc_icons_item_details\"><h4 class=\"sc_icons_item_title\"><span>Personal escorts  <\/span><\/h4><div class=\"sc_icons_item_description\"><span>We provide escorts on demanding and dangerous business trips at home and abroad.<\/span><\/div><\/div><\/div><\/div><div class=\"trx_addons_column-1_3 trx_addons_column-1_2-tablet\"><div class=\"sc_icons_item\"><div class=\"sc_icons_icon sc_icon_type_ icon-dropbox\" style=\"color: #FF0000\" ><span class=\"sc_icon_type_ icon-dropbox\" style=\"color: #FF0000\"><\/span><\/div><div class=\"sc_icons_item_details\"><h4 class=\"sc_icons_item_title\"><span>Guarding shipments<\/span><\/h4><div class=\"sc_icons_item_description\"><span>We will ensure delivery and guard your valuable shipments and protect them from theft or loss.<\/span><\/div><\/div><\/div><\/div><\/div><\/div><!-- \/.sc_icons -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90271f9 sc_height_huge sc_fly_static elementor-widget elementor-widget-spacer\" data-id=\"90271f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Security expertise you can trust. Protection for your business in the real and digital world. In today&#8217;s dynamic and increasingly digital world, the security of corporate information, employees and physical&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_theme","meta":{"footnotes":""},"class_list":["post-20693","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.yoursec.cz\/en\/wp-json\/wp\/v2\/pages\/20693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yoursec.cz\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.yoursec.cz\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.yoursec.cz\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yoursec.cz\/en\/wp-json\/wp\/v2\/comments?post=20693"}],"version-history":[{"count":1,"href":"https:\/\/www.yoursec.cz\/en\/wp-json\/wp\/v2\/pages\/20693\/revisions"}],"predecessor-version":[{"id":20694,"href":"https:\/\/www.yoursec.cz\/en\/wp-json\/wp\/v2\/pages\/20693\/revisions\/20694"}],"wp:attachment":[{"href":"https:\/\/www.yoursec.cz\/en\/wp-json\/wp\/v2\/media?parent=20693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}