{"id":10790,"date":"2019-01-14T16:00:54","date_gmt":"2019-01-14T15:00:54","guid":{"rendered":"https:\/\/systemat.com\/solutions\/it-security\/"},"modified":"2025-02-11T15:45:54","modified_gmt":"2025-02-11T14:45:54","slug":"it-security","status":"publish","type":"page","link":"https:\/\/www.systemat.com\/nl\/solutions\/it-security\/","title":{"rendered":"IT-Beveiliging"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1547211507476{background-image: url(https:\/\/systemat.com\/wp-content\/uploads\/2019\/01\/BannerSolutionSECURITY.jpg?id=10500) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;wk-bkg-grayscale&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1547129648383{background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221;][vc_column_inner width=&#8221;3\/4&#8243;][vc_single_image image=&#8221;9418&#8243; css_animation=&#8221;fadeIn&#8221;]\r\n        <div class=\"rs-heading   vc_custom_1547544303784 txtbanner bkgwhite \">\r\n        \t<div class=\"title-inner\">\r\n\t            <span style=\"color: #ffffff\" class=\"sub-text\">Veiligheid in het DNA van uw informaticasysteem<\/span>\r\n\t            \r\n\t        <\/div><\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243; css=&#8221;.vc_custom_1547129930963{padding-top: 130px !important;padding-bottom: 90px !important;background-image: url(https:\/\/systemat.com\/wp-content\/uploads\/2019\/01\/FondRondFleche.png?id=9763) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221;][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3 style=\"text-align: center;\"><span style=\"color: #0063ac;\">IT-BEVEILIGING<\/span><\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;none&#8221; css=&#8221;.vc_custom_1546961174660{padding-top: 40px !important;padding-bottom: 42px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;services-responsive&#8221;][vc_column el_class=&#8221;all-section-title&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;top&#8221; el_class=&#8221;wk-strech-box-container&#8221;][vc_column_inner width=&#8221;1\/3&#8243;]<div class=\"rs-services\"><div class=\"service-inner services-style-7 services-center  vc_custom_1547544350633 \">\r\n\t\t\t\t\t<div class=\"services-wrap\"> \r\n\t\t\t\t        <div class=\"services-item\">\r\n\t\t\t\t            <div class=\"services-icon\">\r\n\t\t\t\t                \r\n\t\t\t\t            <\/div>\r\n\t\t\t\t        \r\n\t\t\t\t\t\t\t<div class=\"services-desc\">\t\r\n\t\t\t\t\t\t\t\t<h2 class=\"services-title services-title2\"><a href=\"https:\/\/www.networkcomputing.com\/networking\/7-enterprise-networking-trends-2018\/1081393934\" title=\"\" target=\"_blank\">Cybersecurity<\/a><\/h2>\t\t\r\n\t\t\t\t\t\t\t\t2\/3<sup>de<\/sup> van de Belgische ondernemingen werd de afgelopen 12 maanden het slachtoffer van cybercriminaliteit \r\n\t\t\t\t\t\t\t<\/div>\t\t\r\n\t\t\t\t\t\t<\/div>\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div class=\"rs-services\"><div class=\"service-inner services-style-7 services-center  vc_custom_1547544365833 \">\r\n\t\t\t\t\t<div class=\"services-wrap\"> \r\n\t\t\t\t        <div class=\"services-item\">\r\n\t\t\t\t            <div class=\"services-icon\">\r\n\t\t\t\t                \r\n\t\t\t\t            <\/div>\r\n\t\t\t\t        \r\n\t\t\t\t\t\t\t<div class=\"services-desc\">\t\r\n\t\t\t\t\t\t\t\t<h2 class=\"services-title services-title2\"><a href=\"https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/white-paper-c11-741490.html#_Toc529314186\" title=\"\" target=\"_blank\">Diefstalkosten<\/a><\/h2>\t\t\r\n\t\t\t\t\t\t\t\tvolgens het instituut Ponemon bedragen de kosten van een diefstal 3,86 miljoen $ \r\n\t\t\t\t\t\t\t<\/div>\t\t\r\n\t\t\t\t\t\t<\/div>\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<div class=\"rs-services\"><div class=\"service-inner services-style-7 services-center  vc_custom_1547544391065 \">\r\n\t\t\t\t\t<div class=\"services-wrap\"> \r\n\t\t\t\t        <div class=\"services-item\">\r\n\t\t\t\t            <div class=\"services-icon\">\r\n\t\t\t\t                \r\n\t\t\t\t            <\/div>\r\n\t\t\t\t        \r\n\t\t\t\t\t\t\t<div class=\"services-desc\">\t\r\n\t\t\t\t\t\t\t\t<h2 class=\"services-title services-title2\"><a href=\"https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/white-paper-c11-741490.html#_Toc529314186\" title=\"\" target=\"_blank\">Veiligheid van de klantengegevens<\/a><\/h2>\t\t\r\n\t\t\t\t\t\t\t\twordt de GDPR-reglementering niet nageleefd, dan kunnen de boetes oplopen tot 20 miljoen euro en 4% van de omzet \r\n\t\t\t\t\t\t\t<\/div>\t\t\r\n\t\t\t\t\t\t<\/div>\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_id=&#8221;price-table&#8221; css=&#8221;.vc_custom_1546596574944{padding-top: 60px !important;padding-bottom: 60px !important;background-color: #eeeeee !important;}&#8221; el_class=&#8221;banner-price&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;10504&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_circle_2&#8243; el_class=&#8221;OverlayIMG&#8221;][\/vc_column][vc_column width=&#8221;2\/3&#8243;]\r\n        <div class=\"rs-heading    \">\r\n        \t<div class=\"title-inner\">\r\n\t            \r\n\t            <h2>Data zijn het zwarte goud van de 21ste eeuw!<\/h2>\r\n\t        <\/div><div class=\"description\"><p >Een echte informatiegoudmijn over uw klanten, partners, medewerkers, strategie\u00ebn, doelstellingen. Het beschermen van die waardevolle activa moet een absolute prioriteit van elke onderneming zijn.<\/p>\n<p>Veiligheid zit in het DNA van Systemat: alle oplossingen en diensten die we samen met onze klanten cre\u00ebren, werden ontworpen met het oog op een optimale veiligheid. Onze experts adviseren een benadering van de IT-veiligheid, de inplanting en werking ervan die perfect aansluit op de behoeften van de business van onze klanten.<\/p><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css_animation=&#8221;none&#8221; el_class=&#8221;whychoose&#8221; css=&#8221;.vc_custom_1546599718022{padding-top: 60px !important;padding-bottom: 60px !important;background-color: #ffffff !important;}&#8221; el_id=&#8221;why-choose-us&#8221;][vc_column el_class=&#8221;all-section-title&#8221;][vc_row_inner][vc_column_inner css=&#8221;.vc_custom_1531897888548{padding-left: 35px !important;}&#8221; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;]\r\n        <div class=\"rs-heading   vc_custom_1547544444118 quote-style center\">\r\n        \t<div class=\"title-inner\">\r\n\t            \r\n\t            <h2>Onze expertise in IT Security<\/h2>\r\n\t        <\/div><\/div>[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;]<div class=\"rs-services\"><div class=\"service-inner services-style-5 border_style services-center  \">\r\n\t\t\t\t\t<div class=\"services-wrap\"> \r\n\t\t\t\t        <div class=\"services-item\">\r\n\t\t\t\t            <div class=\"services-icon\">\r\n\t\t\t\t                \r\n\t\t\t\t            <\/div>\r\n\t\t\t\t        \r\n\t\t\t\t\t\t\t<div class=\"services-desc\">\t\r\n\t\t\t\t\t\t\t\t<h2 class=\"services-title services-title2\"><a href=\"#\" title=\"\">Threat protection<\/a><\/h2>\t\t\r\n\t\t\t\t\t\t\t\tBescherming tegen inbraak \r\n\t\t\t\t\t\t\t<\/div>\t\t\r\n\t\t\t\t\t\t<\/div>\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;]<div class=\"rs-services\"><div class=\"service-inner services-style-5 border_style services-center  \">\r\n\t\t\t\t\t<div class=\"services-wrap\"> \r\n\t\t\t\t        <div class=\"services-item\">\r\n\t\t\t\t            <div class=\"services-icon\">\r\n\t\t\t\t                \r\n\t\t\t\t            <\/div>\r\n\t\t\t\t        \r\n\t\t\t\t\t\t\t<div class=\"services-desc\">\t\r\n\t\t\t\t\t\t\t\t<h2 class=\"services-title services-title2\"><a href=\"https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/white-paper-c11-741490.html#_Toc529314186\" title=\"\" target=\"_blank\">Continu\u00efteit van de operaties<\/a><\/h2>\t\t\r\n\t\t\t\t\t\t\t\tBack-up, Disaster Recovery \r\n\t\t\t\t\t\t\t<\/div>\t\t\r\n\t\t\t\t\t\t<\/div>\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1546599698115{padding-top: 60px !important;padding-bottom: 60px !important;background-color: #eeeeee !important;}&#8221;][vc_column]\r\n        <div class=\"rs-heading    center\">\r\n        \t<div class=\"title-inner\">\r\n\t            \r\n\t            <h2>Een kaart van op maat gemaakte diensten<\/h2>\r\n\t        <\/div><\/div>[vc_tta_accordion active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Advies en engineering&#8221; tab_id=&#8221;1546598258051-1d735b04-eac4&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Kwetsbaarheidsaudits<\/li>\n<li>Risicoanalyse<\/li>\n<li>Veiligheids- en governancebeleid<\/li>\n<li>Permanent advies tijdens de operaties<\/li>\n<li>Hulp bij de selectie van beveiligingsoplossingen<\/li>\n<li>Uitwerking van veiligheidsconcepten voor alle aspecten van de ICT<\/li>\n<\/ul>\n<div id=\"gtx-trans\" style=\"position: absolute; left: 192px; top: -8.8px;\">\n<div class=\"gtx-trans-icon\"><\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Project &amp; integratie&#8221; tab_id=&#8221;1546598258082-edfb9c0a-663c&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Ontplooiing van beveiligingsoplossingen<\/li>\n<li>Project planning<\/li>\n<li>Installatie, configuratie en documentatie<\/li>\n<li>Ontplooiing van opslagdiensten en de replicatie van gegevens<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Outsourcing &amp; maintenance&#8221; tab_id=&#8221;1546598361651-aee02150-46eb&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Veiligheidsmaatregelen<\/li>\n<li>Operaties van de opslagdiensten en de replicatie van gegevens<\/li>\n<li>Hulp<\/li>\n<li>Monitoring<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;IT-Talenten Outsourcing&#8221; tab_id=&#8221;1546598379673-3c50628b-a18e&#8221;][vc_column_text]Ter beschikking stellen ter plaatse van gespecialiseerde beveiligingsexperts voor opdrachten van korte of lange duur[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;IT Financi\u00eble oplossingen&#8221; tab_id=&#8221;1546598391788-6d8b620a-845d&#8221;][vc_column_text]Besteed uw investeringen uit via onze flexibele oplossingen (OPEX, pay as you go, \u2026)[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221;][vc_column]\r\n        <div class=\"rs-heading   vc_custom_1546959956886  center\">\r\n        \t<div class=\"title-inner\">\r\n\t            \r\n\t            <h2>Managed Services<\/h2>\r\n\t        <\/div><\/div>[vc_tta_tabs style=&#8221;flat&#8221; active_section=&#8221;1&#8243; el_class=&#8221;wk-tab-container&#8221;][vc_tta_section title=&#8221;Backup as a service&#8221; tab_id=&#8221;1547024682755-19629849-5158&#8243;][vc_row_inner][vc_column_inner css=&#8221;.vc_custom_1547135392968{background-image: url(https:\/\/systemat.com\/wp-content\/uploads\/2019\/01\/Systemat_Cloud_wallpaper.jpg?id=10333) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1547211927058{margin-top: 80px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221; el_class=&#8221;shadow&#8221;]<\/p>\n<h2 style=\"text-align: center;\"><span style=\"color: #fff; background: rgba(0,0,0,0.3); padding: 10px;\">Backup as a service<\/span><\/h2>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1547544642320{margin-top: 40px !important;}&#8221;]<\/p>\n<h4 style=\"text-align: center;\"><span style=\"color: #fff; background: rgba(0,0,0,0.3); padding: 10px;\">Replicatie op maat van uw gegevens <\/span><\/h4>\n<p>[\/vc_column_text][vc_btn title=&#8221;Meer infos&#8221; style=&#8221;flat&#8221; color=&#8221;primary&#8221; align=&#8221;center&#8221; i_align=&#8221;right&#8221; i_type=&#8221;material&#8221; i_icon_material=&#8221;vc-material vc-material-keyboard_arrow_right&#8221; css=&#8221;.vc_custom_1547544708637{margin-bottom: 80px !important;}&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:%23|&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][vc_tta_section title=&#8221;Disaster recovery as a service&#8221; tab_id=&#8221;1547211964232-3a4a1dc1-ccab&#8221;][vc_column_text css=&#8221;.vc_custom_1547211992073{margin-top: 80px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: contain !important;}&#8221; el_class=&#8221;shadow&#8221;]<\/p>\n<h2 style=\"text-align: center;\"><span style=\"color: #fff; background: rgba(0,0,0,0.3); padding: 10px;\">Disaster recovery as a service<\/span><\/h2>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_tabs][vc_column_text css=&#8221;.vc_custom_1547544662909{margin-top: 40px !important;}&#8221;]<\/p>\n<h4 style=\"text-align: center;\"><span style=\"color: #fff; background: rgba(0,0,0,0.3); padding: 10px;\">De ogenblikkelijke herneming van uw operaties na een incident<\/span><\/h4>\n<p>[\/vc_column_text][\/vc_column][vc_column][vc_empty_space height=&#8221;10px&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column]\r\n        <div class=\"rs-heading    center\">\r\n        \t<div class=\"title-inner\">\r\n\t            \r\n\t            <h2>Uw voordelen<\/h2>\r\n\t        <\/div><\/div>[\/vc_column][vc_column][vc_row_inner][vc_column_inner el_class=&#8221;wk-benefits-container&#8221; width=&#8221;2\/3&#8243;][vc_empty_space height=&#8221;20px&#8221;][vc_empty_space height=&#8221;20px&#8221;]\r\n\t\t\t<div class=\"rs-services-style6  services-left  \"><div class=\"services-item\">\r\n\t\t\t\t    <div class=\"services-icon\">\r\n\t\t\t\t        <i class=\"vc_icon_element-icon vc-material vc-material-check\"><\/i>\r\n\t\t\t\t    <\/div>\r\n\t\t\t\t    <div class=\"services-desc\">\r\n\t\t\t\t        <h4 class=\"services-title\"><a ><\/a><\/h4>\r\n\t\t\t\t        <p>Een team van beveiligingsexperts tot uw dienst<\/p>\r\n\t\t\t\t    <\/div><\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t\t<div class=\"rs-services-style6  services-left  \"><div class=\"services-item\">\r\n\t\t\t\t    <div class=\"services-icon\">\r\n\t\t\t\t        <i class=\"vc_icon_element-icon vc-material vc-material-check\"><\/i>\r\n\t\t\t\t    <\/div>\r\n\t\t\t\t    <div class=\"services-desc\">\r\n\t\t\t\t        <h4 class=\"services-title\"><a ><\/a><\/h4>\r\n\t\t\t\t        <p>Complete beveiligings- en continu\u00efteitsoplossingen<\/p>\r\n\t\t\t\t    <\/div><\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t\t<div class=\"rs-services-style6  services-left  \"><div class=\"services-item\">\r\n\t\t\t\t    <div class=\"services-icon\">\r\n\t\t\t\t        <i class=\"vc_icon_element-icon vc-material vc-material-check\"><\/i>\r\n\t\t\t\t    <\/div>\r\n\t\t\t\t    <div class=\"services-desc\">\r\n\t\t\t\t        <h4 class=\"services-title\"><a ><\/a><\/h4>\r\n\t\t\t\t        <p>Diensten op maat afhankelijk van uw behoeften<\/p>\r\n\t\t\t\t    <\/div><\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\r\n\t\t\t<div class=\"rs-services-style6  services-left  \"><div class=\"services-item\">\r\n\t\t\t\t    <div class=\"services-icon\">\r\n\t\t\t\t        <i class=\"vc_icon_element-icon vc-material vc-material-check\"><\/i>\r\n\t\t\t\t    <\/div>\r\n\t\t\t\t    <div class=\"services-desc\">\r\n\t\t\t\t        <h4 class=\"services-title\"><a ><\/a><\/h4>\r\n\t\t\t\t        <p>Optimale integratie in uw IT-infrastructuur<\/p>\r\n\t\t\t\t    <\/div><\/div>\r\n\t\t\t<\/div>\r\n\t\t\t[vc_empty_space height=&#8221;20px&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;10601&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_circle_2&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_id=&#8221;rs-cta&#8221; el_class=&#8221;rs-cta overlay-major bg-fixed&#8221; css=&#8221;.vc_custom_1547550424688{padding-top: 50px !important;padding-bottom: 50px !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_cta h2=&#8221;Neem contact met ons op om meer te weten te komen! We kijken ernaar uit!&#8221; txt_align=&#8221;center&#8221; add_button=&#8221;right&#8221; btn_title=&#8221;Contacteer ons&#8221; btn_style=&#8221;classic&#8221; btn_link=&#8221;url:https%3A%2F%2Fsystemat.com%2Fnl%2Fcontacteer-ons%2F|||&#8221;][\/vc_cta][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; disable_element=&#8221;yes&#8221; css=&#8221;.vc_custom_1546613723648{background-color: #0078bb !important;}&#8221;][vc_column][vc_cta h2=&#8221;Virtual Workspace as a service My business. Anywhere, Anytime&#8221; style=&#8221;flat&#8221; color=&#8221;white&#8221; add_button=&#8221;right&#8221; btn_title=&#8221;Plus d&#8217;infos&#8221; btn_color=&#8221;vista-blue&#8221; css_animation=&#8221;fadeIn&#8221;][\/vc_cta][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1547211507476{background-image: url(https:\/\/systemat.com\/wp-content\/uploads\/2019\/01\/BannerSolutionSECURITY.jpg?id=10500) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;wk-bkg-grayscale&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1547129648383{background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221;][vc_column_inner width=&#8221;3\/4&#8243;][vc_single_image image=&#8221;9418&#8243; css_animation=&#8221;fadeIn&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/4&#8243;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":10785,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"rs_blank_template":"","rs_page_bg_color":"","slide_template_v7":"","footnotes":""},"class_list":["post-10790","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT-Beveiliging - Systemat<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.systemat.com\/nl\/solutions\/it-security\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.systemat.com\\\/nl\\\/solutions\\\/it-security\\\/\",\"url\":\"https:\\\/\\\/www.systemat.com\\\/nl\\\/solutions\\\/it-security\\\/\",\"name\":\"IT-Beveiliging - Systemat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.systemat.com\\\/#website\"},\"datePublished\":\"2019-01-14T15:00:54+00:00\",\"dateModified\":\"2025-02-11T14:45:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.systemat.com\\\/nl\\\/solutions\\\/it-security\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.systemat.com\\\/nl\\\/solutions\\\/it-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.systemat.com\\\/nl\\\/solutions\\\/it-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.systemat.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/www.systemat.com\\\/solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT-Beveiliging\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.systemat.com\\\/#website\",\"url\":\"https:\\\/\\\/www.systemat.com\\\/\",\"name\":\"Systemat\",\"description\":\"enabling your digital transformation\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.systemat.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.systemat.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.systemat.com\\\/#organization\",\"name\":\"Systemat\",\"url\":\"https:\\\/\\\/www.systemat.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/www.systemat.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.systemat.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/cropped-anneau-moebius-512x512-1.png\",\"contentUrl\":\"https:\\\/\\\/www.systemat.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/cropped-anneau-moebius-512x512-1.png\",\"width\":512,\"height\":512,\"caption\":\"Systemat\"},\"image\":{\"@id\":\"https:\\\/\\\/www.systemat.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT-Beveiliging - Systemat","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.systemat.com\/nl\/solutions\/it-security\/","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.systemat.com\/nl\/solutions\/it-security\/","url":"https:\/\/www.systemat.com\/nl\/solutions\/it-security\/","name":"IT-Beveiliging - Systemat","isPartOf":{"@id":"https:\/\/www.systemat.com\/#website"},"datePublished":"2019-01-14T15:00:54+00:00","dateModified":"2025-02-11T14:45:54+00:00","breadcrumb":{"@id":"https:\/\/www.systemat.com\/nl\/solutions\/it-security\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.systemat.com\/nl\/solutions\/it-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.systemat.com\/nl\/solutions\/it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.systemat.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/www.systemat.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"IT-Beveiliging"}]},{"@type":"WebSite","@id":"https:\/\/www.systemat.com\/#website","url":"https:\/\/www.systemat.com\/","name":"Systemat","description":"enabling your digital transformation","publisher":{"@id":"https:\/\/www.systemat.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.systemat.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/www.systemat.com\/#organization","name":"Systemat","url":"https:\/\/www.systemat.com\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.systemat.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.systemat.com\/wp-content\/uploads\/2025\/01\/cropped-anneau-moebius-512x512-1.png","contentUrl":"https:\/\/www.systemat.com\/wp-content\/uploads\/2025\/01\/cropped-anneau-moebius-512x512-1.png","width":512,"height":512,"caption":"Systemat"},"image":{"@id":"https:\/\/www.systemat.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.systemat.com\/nl\/wp-json\/wp\/v2\/pages\/10790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.systemat.com\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.systemat.com\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.systemat.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.systemat.com\/nl\/wp-json\/wp\/v2\/comments?post=10790"}],"version-history":[{"count":3,"href":"https:\/\/www.systemat.com\/nl\/wp-json\/wp\/v2\/pages\/10790\/revisions"}],"predecessor-version":[{"id":21426,"href":"https:\/\/www.systemat.com\/nl\/wp-json\/wp\/v2\/pages\/10790\/revisions\/21426"}],"up":[{"embeddable":true,"href":"https:\/\/www.systemat.com\/nl\/wp-json\/wp\/v2\/pages\/10785"}],"wp:attachment":[{"href":"https:\/\/www.systemat.com\/nl\/wp-json\/wp\/v2\/media?parent=10790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}