{"id":2019,"date":"2025-07-15T15:37:10","date_gmt":"2025-07-15T13:37:10","guid":{"rendered":"https:\/\/xevos.eu\/?post_type=nase-sluzby&#038;p=2019"},"modified":"2025-07-16T10:13:55","modified_gmt":"2025-07-16T08:13:55","slug":"konzultacni-sluzby","status":"publish","type":"nase-sluzby","link":"https:\/\/xevos.eu\/en\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/","title":{"rendered":"Konzulta\u010dn\u00ed slu\u017eby"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_section el_class=&#8221;page-header&#8221;][vc_row el_class=&#8221;page-header-row&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]\r\n<div class=\"page-header-content\">\r\n\r\n<span class=\"text-md text-blue\">Anal\u00fdza sou\u010dasn\u00e9ho stavu<\/span>\r\n<h2>Poskytneme v\u00e1m r\u00e1mcov\u00fd n\u00e1hled na zabezpe\u010den\u00ed<\/h2>\r\n<p class=\"none\">Anal\u00fdza sou\u010dasn\u00e9ho stavu poskytuje r\u00e1mcov\u00fd n\u00e1hled na zabezpe\u010den\u00ed aktiv syst\u00e9mu dle zvolen\u00e9ho \u00fahlu pohledu (nap\u0159. architektura s\u00edt\u011b, ochrana proti malware, spr\u00e1va u\u017eivatel\u016f a&nbsp;rol\u00ed, fyzick\u00e1 bezpe\u010dnost,&#8230;). N\u00e1sledn\u011b jsou predikov\u00e1ny potenci\u00e1ln\u011b problematick\u00e9 oblasti a&nbsp;navrhnuty mo\u017en\u00e9 kroky sm\u011b\u0159uj\u00edc\u00ed k&nbsp;jejich eliminaci. Dokument je v\u00fdchoz\u00edm podkladem k&nbsp;v\u011bt\u0161in\u011b konzulta\u010dn\u00edch a&nbsp;implementa\u010dn\u00edch \u010dinnost\u00ed.<\/p>\r\n\r\n<\/div>\r\n[\/vc_column_text][vc_column_text css=&#8221;&#8221;]\r\n<div class=\"page-header-buttons-wrapper\"><a class=\"btn btn-primary\" href=\"#\">M\u00e1m z\u00e1jem<\/a><a class=\"btn btn-secondary\" href=\"#\">Zjisti v\u00edce<\/a><\/div>\r\n[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;fakta switch&#8221;][vc_column_text css=&#8221;&#8221; el_class=&#8221;fs-16&#8243;]<img decoding=\"async\" class=\"header-img alignnone wp-image-2021\" src=\"https:\/\/xevos.eu\/wp-content\/uploads\/2025\/07\/celkove-vysledky-analyzy.png\" alt=\"\" width=\"300\" height=\"213\" \/>[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section el_class=&#8221;image-and-text&#8221;][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;2028&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]\r\n<h2>Anal\u00fdza rizik<\/h2>\r\nAnal\u00fdzu rizik lze ch\u00e1pat jako komplexn\u00ed a&nbsp;hloubkovou anal\u00fdzu sou\u010dasn\u00e9ho stavu. Prim\u00e1rn\u00edm c\u00edlem t\u00e9to \u010dinnosti je identifikace ve\u0161ker\u00fdch hardwarov\u00fdch, softwarov\u00fdch a&nbsp;informa\u010dn\u00edch (zpravidla nejhodnotn\u011bj\u0161\u00edch!) aktiv, jejich ohodnocen\u00ed, v\u00fd\u010det jejich zranitelnost\u00ed, v\u00fd\u010det mo\u017en\u00fdch hrozeb, odhad pravd\u011bpodobnosti, \u017ee dojde k&nbsp;jejich napln\u011bn\u00ed, a&nbsp;n\u00e1vrh \u00fa\u010dinn\u00fdch a&nbsp;dostupn\u00fdch \u0159e\u0161en\u00ed k&nbsp;jejich eliminaci. Jedn\u00e1 se o&nbsp;kl\u00ed\u010dov\u00fd dokument pro\u202fprocesy \u0159\u00edzen\u00ed bezpe\u010dnosti a&nbsp;\u0159\u00edzen\u00ed rizik.[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section el_class=&#8221;image-and-text&#8221;][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]\r\n<h2>Bezpe\u010dnostn\u00ed dokumentace<\/h2>\r\nVypracov\u00e1n\u00ed z\u00e1kladn\u00ed i&nbsp;roz\u0161i\u0159uj\u00edc\u00ed bezpe\u010dnostn\u00ed dokumentace pro procesy \u0159\u00edzen\u00ed bezpe\u010dnosti a&nbsp;\u0159\u00edzen\u00ed rizik. Jedn\u00e1 se nap\u0159\u00edklad o&nbsp;bezpe\u010dnostn\u00ed politiku, p\u0159\u00edru\u010dku u\u017eivatele \u010di spr\u00e1vce, pl\u00e1n z\u00e1lohov\u00e1n\u00ed a&nbsp;obnovy apod. Tyto dokumenty vych\u00e1z\u00ed ze\u202fz\u00e1v\u011br\u016f analytick\u00fdch \u010dinnost\u00ed, v\u00fdsledk\u016f test\u016f a&nbsp;audit\u016f, \u010di intern\u00edch pl\u00e1n\u016f a&nbsp;strategi\u00ed spole\u010dnosti. U\u017eity jsou n\u00e1sledn\u011b v&nbsp;ka\u017edodenn\u00ed praxi jako z\u00e1vazn\u00e9 dokumenty, dle kter\u00fdch jsou udr\u017eov\u00e1ny procesy \u0159\u00edzen\u00ed bezpe\u010dnosti a&nbsp;\u0159\u00edzen\u00ed rizik v&nbsp;souladu s&nbsp;definovan\u00fdmi pot\u0159ebami a&nbsp;c\u00edli.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;2028&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section el_class=&#8221;image-and-text&#8221;][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;2029&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]\r\n<h2>Fyzick\u00e1 bezpe\u010dnost<\/h2>\r\nKomplexn\u00ed zhodnocen\u00ed zabezpe\u010den\u00ed hardwarov\u00fdch aktiv p\u0159ed fyzick\u00fdm po\u0161kozen\u00edm, \u010di odcizen\u00edm. Mezi rizikov\u00e9 faktory pat\u0159\u00ed nap\u0159\u00edklad nevhodn\u00e1 teplota (syst\u00e9m chlazen\u00ed, klimatizace, protipo\u017e\u00e1rn\u00ed syst\u00e9m), neopr\u00e1vn\u011bn\u00fd p\u0159\u00edstup (p\u0159\u00edstupov\u00fd a&nbsp;kamerov\u00fd syst\u00e9m), kontakt s&nbsp;vodou apod. V&nbsp;p\u0159ehledn\u00e9 z\u00e1v\u011bre\u010dn\u00e9 zpr\u00e1v\u011b je uveden v\u00fd\u010det rizik a&nbsp;n\u00e1vrh vhodn\u00fdch opat\u0159en\u00ed k&nbsp;jejich eliminaci.[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_section el_class=&#8221;image-and-text&#8221;][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;]\r\n<h2>Reakce na bezpe\u010dnostn\u00ed incident<\/h2>\r\nForenzn\u00ed anal\u00fdza dostupn\u00fdch informac\u00ed (nap\u0159. logy, kamerov\u00e9 z\u00e1znamy apod.) s&nbsp;c\u00edlem potvrzen\u00ed \u010di vyvr\u00e1cen\u00ed podez\u0159en\u00ed na existenci bezpe\u010dnostn\u00edho incidentu. N\u00e1vrh a&nbsp;realizace bezpe\u010dnostn\u00edch opat\u0159en\u00ed vedouc\u00edch k&nbsp;zabezpe\u010den\u00ed syst\u00e9mu p\u0159ed podobn\u00fdmi incidenty, n\u00e1prav\u011b \u0161kod (nap\u0159. obnova ze z\u00e1loh), \u010di odhalen\u00ed pachatele.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;2030&#8243; img_size=&#8221;full&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section el_class=&#8221;form-section&#8221;][vc_row][vc_column width=&#8221;2\/5&#8243;][vc_custom_heading text=&#8221;Vypl\u0148te formul\u00e1\u0159&#8221; font_container=&#8221;tag:h3|text_align:left&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221; el_class=&#8221;heading-secondary text-md&#8221;][vc_custom_heading text=&#8221;Vytvo\u0159\u00edme pro V\u00e1s nez\u00e1vaznou cenovou nab\u00eddku&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221;][\/vc_column][vc_column width=&#8221;3\/5&#8243;]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1965-o1\" lang=\"cs-CZ\" dir=\"ltr\" data-wpcf7-id=\"1965\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/nase-sluzby\/2019#wpcf7-f1965-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Kontaktn\u00ed formul\u00e1\u0159\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"1965\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"cs_CZ\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1965-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<div class=\"contact-form-container\">\n<div class=\"form-row\">\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"name-and-surname\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Jm\u00e9no a p\u0159\u00edjmen\u00ed\" value=\"\" type=\"text\" name=\"name-and-surname\" \/><\/span>\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Telefon\" value=\"\" type=\"tel\" name=\"phone\" \/><\/span>\n<\/div>\n<div class=\"form-row\">\n    <span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"E-mailov\u00e1 adresa\" value=\"\" type=\"email\" name=\"email\" \/><\/span>\n    <span class=\"wpcf7-form-control-wrap nase-sluzby\"><select name=\"nase-sluzby\" class=\"wpcf7-form-control wpcf7-select\"><option value=\"\">-- Vyberte slu\u017ebu --<\/option><option value=\"Apple for Business\">Apple for Business<\/option><option value=\"Business\">Business<\/option><option value=\"Cisco Umbrella\">Cisco Umbrella<\/option><option value=\"Cloud solutions\">Cloud solutions<\/option><option value=\"Cyber Security\">Cyber Security<\/option><option value=\"Cybersecurity\">Cybersecurity<\/option><option value=\"Data and WiFi networks\">Data and WiFi networks<\/option><option value=\"Digit\u00e1ln\u00ed slu\u017eby\">Digit\u00e1ln\u00ed slu\u017eby<\/option><option value=\"Digitization\">Digitization<\/option><option value=\"For companies\">For companies<\/option><option value=\"For individuals\">For individuals<\/option><option value=\"Hardware &amp; Software\">Hardware &amp; Software<\/option><option value=\"Implementace\">Implementace<\/option><option value=\"IT Service &amp; Technical Support\">IT Service &amp; Technical Support<\/option><option value=\"IT services\">IT services<\/option><option value=\"Konzulta\u010dn\u00ed slu\u017eby\">Konzulta\u010dn\u00ed slu\u017eby<\/option><option value=\"Microsoft 365\">Microsoft 365<\/option><option value=\"Microsoft 365 Enterprise\">Microsoft 365 Enterprise<\/option><option value=\"Microsoft Surface\">Microsoft Surface<\/option><option value=\"MS 365 Copilot\">MS 365 Copilot<\/option><option value=\"NIS2\">NIS2<\/option><option value=\"Online media and graphic design\">Online media and graphic design<\/option><option value=\"Outsourcing IT\">Outsourcing IT<\/option><option value=\"Pentera\">Pentera<\/option><option value=\"Plan Comparison\">Plan Comparison<\/option><option value=\"Products\">Products<\/option><option value=\"Software development\">Software development<\/option><option value=\"Software studio\">Software studio<\/option><option value=\"Starlink\">Starlink<\/option><option value=\"Starlink\">Starlink<\/option><option value=\"Subsidy and EU projects\">Subsidy and EU projects<\/option><option value=\"Training\">Training<\/option><option value=\"VoIP\">VoIP<\/option><\/select><\/span>\n<\/div>\n<div class=\"form-row submit-row\">\n    <input class=\"wpcf7-form-control wpcf7-submit has-spinner btn btn-primary\" type=\"submit\" value=\"Odeslat\" \/>\n<\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/vc_column][\/vc_row][\/vc_section]<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_section el_class=&#8221;page-header&#8221;][vc_row el_class=&#8221;page-header-row&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;&#8221;] Anal\u00fdza sou\u010dasn\u00e9ho stavu Poskytneme v\u00e1m r\u00e1mcov\u00fd n\u00e1hled na zabezpe\u010den\u00ed Anal\u00fdza sou\u010dasn\u00e9ho stavu poskytuje r\u00e1mcov\u00fd n\u00e1hled na zabezpe\u010den\u00ed aktiv syst\u00e9mu dle zvolen\u00e9ho \u00fahlu pohledu (nap\u0159. architektura s\u00edt\u011b, ochrana proti malware, spr\u00e1va u\u017eivatel\u016f a&nbsp;rol\u00ed, fyzick\u00e1 bezpe\u010dnost,&#8230;). N\u00e1sledn\u011b jsou predikov\u00e1ny potenci\u00e1ln\u011b problematick\u00e9 oblasti a&nbsp;navrhnuty mo\u017en\u00e9 kroky sm\u011b\u0159uj\u00edc\u00ed k&nbsp;jejich eliminaci. Dokument je v\u00fdchoz\u00edm podkladem [&hellip;]<\/p>\n","protected":false},"featured_media":0,"parent":332,"menu_order":4,"template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-2019","nase-sluzby","type-nase-sluzby","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Konzulta\u010dn\u00ed slu\u017eby - XEVOS | Empowering IT. Securing tommorow.<\/title>\n<meta name=\"description\" content=\"Bezpe\u010dnostn\u00ed konzultace \u2013 anal\u00fdza rizik, n\u00e1vrh bezpe\u010dnostn\u00ed strategie, compliance s normami a zlep\u0161en\u00ed kybernetick\u00e9 odolnosti firmy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Konzulta\u010dn\u00ed slu\u017eby - XEVOS | Empowering IT. Securing tommorow.\" \/>\n<meta property=\"og:description\" content=\"Bezpe\u010dnostn\u00ed konzultace \u2013 anal\u00fdza rizik, n\u00e1vrh bezpe\u010dnostn\u00ed strategie, compliance s normami a zlep\u0161en\u00ed kybernetick\u00e9 odolnosti firmy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/\" \/>\n<meta property=\"og:site_name\" content=\"XEVOS | Empowering IT. Securing tommorow.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xevoscz\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-16T08:13:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xevos.eu\/wp-content\/uploads\/2025\/07\/celkove-vysledky-analyzy.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@xevoscz\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/\",\"url\":\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/\",\"name\":\"Konzulta\u010dn\u00ed slu\u017eby - XEVOS | Empowering IT. Securing tommorow.\",\"isPartOf\":{\"@id\":\"https:\/\/xevos.eu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/xevos.eu\/wp-content\/uploads\/2025\/07\/celkove-vysledky-analyzy.png\",\"datePublished\":\"2025-07-15T13:37:10+00:00\",\"dateModified\":\"2025-07-16T08:13:55+00:00\",\"description\":\"Bezpe\u010dnostn\u00ed konzultace \u2013 anal\u00fdza rizik, n\u00e1vrh bezpe\u010dnostn\u00ed strategie, compliance s normami a zlep\u0161en\u00ed kybernetick\u00e9 odolnosti firmy.\",\"breadcrumb\":{\"@id\":\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/#primaryimage\",\"url\":\"https:\/\/xevos.eu\/wp-content\/uploads\/2025\/07\/celkove-vysledky-analyzy.png\",\"contentUrl\":\"https:\/\/xevos.eu\/wp-content\/uploads\/2025\/07\/celkove-vysledky-analyzy.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Dom\u016f\",\"item\":\"https:\/\/xevos.eu\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Na\u0161e slu\u017eby\",\"item\":\"https:\/\/xevos.eu\/nase-sluzby\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Security\",\"item\":\"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Konzulta\u010dn\u00ed slu\u017eby\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xevos.eu\/#website\",\"url\":\"https:\/\/xevos.eu\/\",\"name\":\"XEVOS | Empowering IT. Securing tommorow.\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xevos.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Konzulta\u010dn\u00ed slu\u017eby - XEVOS | Empowering IT. Securing tommorow.","description":"Bezpe\u010dnostn\u00ed konzultace \u2013 anal\u00fdza rizik, n\u00e1vrh bezpe\u010dnostn\u00ed strategie, compliance s normami a zlep\u0161en\u00ed kybernetick\u00e9 odolnosti firmy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/","og_locale":"en_US","og_type":"article","og_title":"Konzulta\u010dn\u00ed slu\u017eby - XEVOS | Empowering IT. Securing tommorow.","og_description":"Bezpe\u010dnostn\u00ed konzultace \u2013 anal\u00fdza rizik, n\u00e1vrh bezpe\u010dnostn\u00ed strategie, compliance s normami a zlep\u0161en\u00ed kybernetick\u00e9 odolnosti firmy.","og_url":"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/","og_site_name":"XEVOS | Empowering IT. Securing tommorow.","article_publisher":"https:\/\/www.facebook.com\/xevoscz","article_modified_time":"2025-07-16T08:13:55+00:00","og_image":[{"url":"https:\/\/xevos.eu\/wp-content\/uploads\/2025\/07\/celkove-vysledky-analyzy.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@xevoscz","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/","url":"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/","name":"Konzulta\u010dn\u00ed slu\u017eby - XEVOS | Empowering IT. Securing tommorow.","isPartOf":{"@id":"https:\/\/xevos.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/#primaryimage"},"image":{"@id":"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/#primaryimage"},"thumbnailUrl":"https:\/\/xevos.eu\/wp-content\/uploads\/2025\/07\/celkove-vysledky-analyzy.png","datePublished":"2025-07-15T13:37:10+00:00","dateModified":"2025-07-16T08:13:55+00:00","description":"Bezpe\u010dnostn\u00ed konzultace \u2013 anal\u00fdza rizik, n\u00e1vrh bezpe\u010dnostn\u00ed strategie, compliance s normami a zlep\u0161en\u00ed kybernetick\u00e9 odolnosti firmy.","breadcrumb":{"@id":"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/#primaryimage","url":"https:\/\/xevos.eu\/wp-content\/uploads\/2025\/07\/celkove-vysledky-analyzy.png","contentUrl":"https:\/\/xevos.eu\/wp-content\/uploads\/2025\/07\/celkove-vysledky-analyzy.png"},{"@type":"BreadcrumbList","@id":"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/konzultacni-sluzby\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Dom\u016f","item":"https:\/\/xevos.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Na\u0161e slu\u017eby","item":"https:\/\/xevos.eu\/nase-sluzby\/"},{"@type":"ListItem","position":3,"name":"Cyber Security","item":"https:\/\/xevos.eu\/nase-sluzby\/cyber-security\/"},{"@type":"ListItem","position":4,"name":"Konzulta\u010dn\u00ed slu\u017eby"}]},{"@type":"WebSite","@id":"https:\/\/xevos.eu\/#website","url":"https:\/\/xevos.eu\/","name":"XEVOS | Empowering IT. Securing tommorow.","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xevos.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/xevos.eu\/en\/wp-json\/wp\/v2\/nase-sluzby\/2019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xevos.eu\/en\/wp-json\/wp\/v2\/nase-sluzby"}],"about":[{"href":"https:\/\/xevos.eu\/en\/wp-json\/wp\/v2\/types\/nase-sluzby"}],"version-history":[{"count":0,"href":"https:\/\/xevos.eu\/en\/wp-json\/wp\/v2\/nase-sluzby\/2019\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/xevos.eu\/en\/wp-json\/wp\/v2\/nase-sluzby\/332"}],"wp:attachment":[{"href":"https:\/\/xevos.eu\/en\/wp-json\/wp\/v2\/media?parent=2019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}