{"id":2333,"date":"2023-09-15T13:02:32","date_gmt":"2023-09-15T13:02:32","guid":{"rendered":"https:\/\/infosec.rs\/2023\/?page_id=2333"},"modified":"2023-09-15T13:43:41","modified_gmt":"2023-09-15T13:43:41","slug":"partners","status":"publish","type":"page","link":"https:\/\/infosec.rs\/2023\/partners\/","title":{"rendered":"Partners"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2333\" class=\"elementor elementor-2333\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0fb9fb7 e-flex e-con-boxed e-con e-parent\" data-id=\"0fb9fb7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-92e3336 elementor-widget elementor-widget-heading\" data-id=\"92e3336\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.18.0 - 20-12-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">Partners<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-500836c e-con-full e-flex e-con e-parent\" data-id=\"500836c\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\" data-core-v316-plus=\"true\">\n\t\t<a class=\"elementor-element elementor-element-f60de00 e-con-full e-flex e-con e-parent\" data-id=\"f60de00\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\" data-core-v316-plus=\"true\" href=\"https:\/\/www.checkpoint.com\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9ab0b67 elementor-widget elementor-widget-image\" data-id=\"9ab0b67\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.18.0 - 20-12-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"300\" src=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Check-Point.png\" class=\"attachment-large size-large wp-image-2335\" alt=\"\" srcset=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Check-Point.png 600w, https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Check-Point-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-346a26b elementor-widget elementor-widget-text-editor\" data-id=\"346a26b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.18.0 - 20-12-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with their new Gen V advanced threat prevention that protects all networks, cloud and mobile operations of a business against all known attacks combined with the industry\u2019s most comprehensive and intuitive single point of control management system. Check Point protects over 100,000 organizations of all sizes.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-9b049c6 e-flex e-con-boxed e-con e-parent\" data-id=\"9b049c6\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<a class=\"elementor-element elementor-element-03e7b15 e-con-full e-flex e-con e-parent\" data-id=\"03e7b15\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\" data-core-v316-plus=\"true\" href=\"https:\/\/www.cognyte.com\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8b2804 elementor-widget elementor-widget-image\" data-id=\"b8b2804\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"600\" height=\"300\" src=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Cognyte.png\" class=\"attachment-large size-large wp-image-2336\" alt=\"\" srcset=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Cognyte.png 600w, https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Cognyte-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc41e6c elementor-widget elementor-widget-text-editor\" data-id=\"dc41e6c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The market leader in investigative analytics software that empowers a variety of government and other organizations with Actionable Intelligence for a Safer World\u2122.<\/p><p>The name reflects the field&#8217;s core mission: &#8220;We power artificial intelligence and analytics to generate actionable intelligence.&#8221;<\/p><p>To successfully respond to developing threats, organizations are looking to deploy investigative analytics software. Real-time insights powered by AI and predictive analytics hold the key to resolving investigations effectively.<\/p><p>This is where Cognyte comes into play.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<a class=\"elementor-element elementor-element-c633734 e-con-full e-flex e-con e-parent\" data-id=\"c633734\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\" data-core-v316-plus=\"true\" href=\"https:\/\/www.trendmicro.com\/en_vn\/business.html\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e9ffbbe elementor-widget elementor-widget-image\" data-id=\"e9ffbbe\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"600\" height=\"300\" src=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Trend-Micro.png\" class=\"attachment-large size-large wp-image-2337\" alt=\"\" srcset=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Trend-Micro.png 600w, https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Trend-Micro-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f52f34 elementor-widget elementor-widget-text-editor\" data-id=\"8f52f34\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>For nearly 30 years, Trend Micro\u2019s unwavering vision has been to make the world safe for exchanging digital information. Security is their entire focus, and it shows. This single-minded passion has inspired their innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats. The depth of their experience remains unmatched. From the endpoint to the network to the cloud, they\u2019ve got us covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds. Trend Micro is a leader in hybrid cloud, endpoint, and network security solutions. Their team works hard to ensure the best protection, performance, usability, and manageability.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f129e3 e-flex e-con-boxed e-con e-parent\" data-id=\"7f129e3\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<a class=\"elementor-element elementor-element-ebc01c3 e-con-full e-flex e-con e-parent\" data-id=\"ebc01c3\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\" data-core-v316-plus=\"true\" href=\"https:\/\/www.vmware.com\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cc7732b elementor-widget elementor-widget-image\" data-id=\"cc7732b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" src=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/VM-Ware.png\" class=\"attachment-large size-large wp-image-2338\" alt=\"\" srcset=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/VM-Ware.png 600w, https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/VM-Ware-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acc2b31 elementor-widget elementor-widget-text-editor\" data-id=\"acc2b31\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control. At the heart of everything we do lies the responsibility and the opportunity to build a sustainable, equitable and more secure future for all. As the trusted foundation to accelerate innovation, VMware meets customers where they are. Instead of tradeoffs and compromise, our software offers businesses the flexibility and choice they need to build the future.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<a class=\"elementor-element elementor-element-3cab66b e-con-full elementor-hidden-tablet e-flex e-con e-parent\" data-id=\"3cab66b\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\" data-core-v316-plus=\"true\" href=\"https:\/\/www.cohesity.com\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1c0c4d1 elementor-widget elementor-widget-image\" data-id=\"1c0c4d1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" src=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Cohesity.png\" class=\"attachment-large size-large wp-image-2339\" alt=\"\" srcset=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Cohesity.png 600w, https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Cohesity-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77c508a elementor-widget elementor-widget-text-editor\" data-id=\"77c508a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>At Cohesity, we believe technology should work harder and smarter for you, whether it&#8217;s reducing complexity, keeping your business secure, or delivering more value. We relentlessly innovate to build the leading data security and management platform to help you stay ahead of modern-day challenges.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c5f8e15 e-flex e-con-boxed e-con e-parent\" data-id=\"c5f8e15\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<a class=\"elementor-element elementor-element-4d9df9f e-con-full e-flex e-con e-parent\" data-id=\"4d9df9f\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\" data-core-v316-plus=\"true\" href=\"https:\/\/www.fortinet.com\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1307db3 elementor-widget elementor-widget-image\" data-id=\"1307db3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" src=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Fortinet.png\" class=\"attachment-large size-large wp-image-2340\" alt=\"\" srcset=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Fortinet.png 600w, https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Fortinet-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6eb5586 elementor-widget elementor-widget-text-editor\" data-id=\"6eb5586\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Founded more than 20 years ago in Sunnyvale, California, Fortinet continues to be a driving force in the evolution of cybersecurity and the convergence of networking and security. Their mission is to secure people, devices and data everywhere. To that end, their portfolio of over 50 enterprise-grade products is the largest integrated offering available, delivering proven cybersecurity everywhere you need it. More than 680,000 users trust Fortinet solutions, which are among the most deployed, patented and validated in the industry.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<a class=\"elementor-element elementor-element-969da1d e-con-full e-flex e-con e-parent\" data-id=\"969da1d\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\" data-core-v316-plus=\"true\" href=\"https:\/\/www.exclusive-networks.com\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0b0dd9e elementor-widget elementor-widget-image\" data-id=\"0b0dd9e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" src=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Exclusive-Network.png\" class=\"attachment-large size-large wp-image-2341\" alt=\"\" srcset=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Exclusive-Network.png 600w, https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Exclusive-Network-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36cf735 elementor-widget elementor-widget-text-editor\" data-id=\"36cf735\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Global trusted cybersecurity specialist helping to drive the transition to a totally trusted digital world for all people and organisations. Our distinctive approach to distribution gives partners more opportunity and more customer relevance. The Exclusive Networks story is a global one with a services-first ideology at its core, harnessing innovation and disruption to outstrip market growth. Exclusive Networks has a unique \u2018local sale, global scale\u2019 model, combining the extreme focus and value of local independents with the scale and service delivery of a single worldwide distribution powerhouse.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-43f154f e-flex e-con-boxed e-con e-parent\" data-id=\"43f154f\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<a class=\"elementor-element elementor-element-8b181bf e-con-full e-flex e-con e-parent\" data-id=\"8b181bf\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\" data-core-v316-plus=\"true\" href=\"https:\/\/www.ingrammicro.com\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f931bc elementor-widget elementor-widget-image\" data-id=\"2f931bc\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" src=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Ingram.png\" class=\"attachment-large size-large wp-image-2342\" alt=\"\" srcset=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Ingram.png 600w, https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Ingram-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9859987 elementor-widget elementor-widget-text-editor\" data-id=\"9859987\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Ingram Micro helps companies fully realize the promise of technology\u2122\u2014 maximizing the value of the technology they make, sell or use. They empower thousands of resellers, resellers and retail partners by customizing and delivering highly targeted solutions and services for industry verticals, business-to-business customers and commercial needs. Their huge global infrastructure enables business partners to operate more efficiently and successfully.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<a class=\"elementor-element elementor-element-c1de4ce e-con-full e-flex e-con e-parent\" data-id=\"c1de4ce\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\" data-core-v316-plus=\"true\" href=\"https:\/\/women4cyber.me\/en\/woman4cyber-en\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a0c36e elementor-widget elementor-widget-image\" data-id=\"2a0c36e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" src=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Women-4cyber.png\" class=\"attachment-large size-large wp-image-2343\" alt=\"\" srcset=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Women-4cyber.png 600w, https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/Women-4cyber-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a3ee90 elementor-widget elementor-widget-text-editor\" data-id=\"6a3ee90\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Women4Cyber is a non-profit European private foundation with the objective to promote, encourage and support the participation of women in the field of cybersecurity.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f16af36 e-flex e-con-boxed e-con e-parent\" data-id=\"f16af36\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<a class=\"elementor-element elementor-element-82979e3 e-con-full e-flex e-con e-parent\" data-id=\"82979e3\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\" data-core-v316-plus=\"true\" href=\"https:\/\/www.asadria.com\/en\/home-en\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t<div class=\"elementor-element elementor-element-440a876 elementor-widget elementor-widget-image\" data-id=\"440a876\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" src=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/AS-Adria.png\" class=\"attachment-large size-large wp-image-2344\" alt=\"\" srcset=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/AS-Adria.png 600w, https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/AS-Adria-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0fec6f elementor-widget elementor-widget-text-editor\" data-id=\"a0fec6f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Under the publishing house of Global Security d.o.o., a&amp;s Adria, the successor of the magazine &#8220;Za\u0161tita&#8221;, a monthly professional publication in the field of security and protection is published, acting as a licensed representative of the a&amp;s Group for the region of the following Southeastern European countries: Bosnia and Herzegovina, Montenegro, Croatia, Kosovo, Macedonia , Slovenia and Serbia.<\/p><p>Magazine a&amp;s Adria is read by professionals who work in security services or have general contact with the concept of protection on a business or private level, as well as company managers, who are exposed to increasing and diverse security risks every day.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t<a class=\"elementor-element elementor-element-62ac910 e-con-full e-flex e-con e-parent\" data-id=\"62ac910\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;full&quot;,&quot;background_background&quot;:&quot;classic&quot;}\" data-core-v316-plus=\"true\" href=\"https:\/\/www.csec.ba\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ccd6be1 elementor-widget elementor-widget-image\" data-id=\"ccd6be1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" src=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/CSEC.png\" class=\"attachment-large size-large wp-image-2345\" alt=\"\" srcset=\"https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/CSEC.png 600w, https:\/\/infosec.rs\/2023\/wp-content\/uploads\/2023\/09\/CSEC-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b98ec22 elementor-widget elementor-widget-text-editor\" data-id=\"b98ec22\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>CSEC has a main goal of improving the cyber security posture and cyber security resilience of its constituents. It accomplishes so with an array of services aimed toward assisting constituents to prepare for cyber security threats and help them respond to cyber security incidents. Additional CSEC activities will focus on education, workforce development and raising awareness of the importance of cyber security.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Partners Leading provider of cyber security solutions to corporate enterprises and governments globally. Its solutions protect customers from 5th-generation cyber-attacks with an industry leading catch rate of malware, ransomware and other targeted attacks. Check Point offers a multilevel security architecture with their new Gen V advanced threat prevention that protects all networks, cloud and mobile [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1199,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2333","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/infosec.rs\/2023\/wp-json\/wp\/v2\/pages\/2333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec.rs\/2023\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec.rs\/2023\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec.rs\/2023\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec.rs\/2023\/wp-json\/wp\/v2\/comments?post=2333"}],"version-history":[{"count":7,"href":"https:\/\/infosec.rs\/2023\/wp-json\/wp\/v2\/pages\/2333\/revisions"}],"predecessor-version":[{"id":2353,"href":"https:\/\/infosec.rs\/2023\/wp-json\/wp\/v2\/pages\/2333\/revisions\/2353"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec.rs\/2023\/wp-json\/wp\/v2\/media\/1199"}],"wp:attachment":[{"href":"https:\/\/infosec.rs\/2023\/wp-json\/wp\/v2\/media?parent=2333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}