{"id":19764,"date":"2025-07-02T11:46:59","date_gmt":"2025-07-02T11:46:59","guid":{"rendered":"https:\/\/saga.rs\/cyber-security\/security-log-monitoring-systems\/"},"modified":"2025-10-07T09:05:08","modified_gmt":"2025-10-07T09:05:08","slug":"security-log-monitoring-systems","status":"publish","type":"page","link":"https:\/\/saga.rs\/en\/cyber-security\/security-log-monitoring-systems\/","title":{"rendered":"Security Log Monitoring Systems"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row custom_css_code=&#8221;JTJGJTJBJTIwTGlzdCUyMEl0ZW0lMjAlMkElMkYlMEEucG9zdC1icmVhZGNydW1icyUyMHVsJTIwbGklM0FudGgtY2hpbGQlMjgxJTI5JTdCJTBBJTA5cGFkZGluZy1sZWZ0JTNBMHB4JTNCJTBBJTA5JTBBJTdEJTBBJTBB&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;]<div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e41b498b6 {margin-top: 100px !important;}@media screen and (max-width: 767px) {#thegem-divider-69d0e41b498b6 {display: none;}}<\/style><div id=\"thegem-divider-69d0e41b498b6\" class=\"gem-divider  \" style=\"\" ><\/div><div class=\"thegem-te-heading thegem-custom-69d0e41b49a234953\" ><h1 id=\"thegem-heading-69d0e41b499de\" class=\"thegem-heading title-h2\" style=\"text-align: left;\" ><span>Take Proactive Steps to Prevent Potential Threats.<\/span><\/h1><style type=\"text\/css\">#thegem-heading-69d0e41b499de {margin: 0;}#thegem-heading-69d0e41b499de a:hover, #thegem-heading-69d0e41b499de a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e41b49a234953{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e41b49a234953{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e41b49a234953{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e41b49a234953{position: relative !important;}}<\/style><div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e41b49a83 {margin-bottom: 40px !important;}@media screen and (max-width: 767px) {#thegem-divider-69d0e41b49a83 {margin-bottom: 20px !important;}}<\/style><div id=\"thegem-divider-69d0e41b49a83\" class=\"gem-divider  \" style=\"\" ><\/div><style>.thegem-te-post-breadcrumbs.thegem-custom-69d0e41b49abd9515 .post-breadcrumbs {justify-content: left; text-align: left;}.thegem-te-post-breadcrumbs.thegem-custom-69d0e41b49abd9515 .post-breadcrumbs ul {justify-content: left; text-align: left;}.thegem-te-post-breadcrumbs.thegem-custom-69d0e41b49abd9515 .post-breadcrumbs ul li {color: #2A55A2;}.thegem-te-post-breadcrumbs.thegem-custom-69d0e41b49abd9515 .post-breadcrumbs ul li a {color: #2A55A2;}.thegem-te-post-breadcrumbs.thegem-custom-69d0e41b49abd9515 .post-breadcrumbs ul li a:hover {color: #56ADE4;}.thegem-te-post-breadcrumbs.thegem-custom-69d0e41b49abd9515 .post-breadcrumbs ul li:last-child {color: #2A55A2;}<\/style><div class=\"thegem-te-post-breadcrumbs custom-breadcrumb thegem-custom-69d0e41b49abd9515\"> <div class=\"post-breadcrumbs\"><ul><li><a href=\"https:\/\/saga.rs\/en\/\">Home<\/a><\/li><\/ul><!-- .breadcrumbs --><\/div> <\/div><div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e41b4a2b8 {margin-bottom: 20px !important;}<\/style><div id=\"thegem-divider-69d0e41b4a2b8\" class=\"gem-divider  \" style=\"\" ><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; el_sticky=&#8221;1&#8243; el_sticky_offset=&#8221;130px&#8221;]<div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e41b4a2f8 {margin-bottom: 20px !important;}<\/style><div id=\"thegem-divider-69d0e41b4a2f8\" class=\"gem-divider  \" style=\"border-width: 1px;width: 50px;border-color: #2A55A2;\" ><\/div><div class=\"thegem-te-heading thegem-custom-69d0e41b4a4198287\" ><h1 id=\"thegem-heading-69d0e41b4a3e1\" class=\"thegem-heading title-h6 vc_custom_1751872356649\" style=\"text-align: left;\" ><span>Security Log Monitoring Systems<\/span><\/h1><style type=\"text\/css\">#thegem-heading-69d0e41b4a3e1 {margin: 0;}#thegem-heading-69d0e41b4a3e1 a:hover, #thegem-heading-69d0e41b4a3e1 a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e41b4a4198287{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e41b4a4198287{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e41b4a4198287{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e41b4a4198287{position: relative !important;}}<\/style>[vc_column_text css=&#8221;&#8221;]<strong>Rapid threat detection and efficient incident response. Manage security logs with greater ease and efficiency <\/strong><strong>\u2013<\/strong><strong> anytime, anywhere.<\/strong>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_single_image image=&#8221;5753&#8243; img_size=&#8221;full&#8221; css=&#8221;.vc_custom_1751457007870{padding-bottom: 10px !important;}&#8221;]<div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e41b4a477 {margin-bottom: 20px !important;}<\/style><div id=\"thegem-divider-69d0e41b4a477\" class=\"gem-divider  \" style=\"\" ><\/div>[vc_column_text css=&#8221;&#8221;]Security logs often contain massive amounts of information, which can make it difficult to identify real threats without the right tools. Without proper tools, security incidents may go unnoticed, delaying your response.<\/p>\n<p>The key to effective logging and security monitoring in your organization is the ability to quickly filter out irrelevant information. Our system lets you focus only on critical events that could compromise the integrity and availability of your sensitive data.[\/vc_column_text]<div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e41b4a4a3 {margin-bottom: 20px !important;}<\/style><div id=\"thegem-divider-69d0e41b4a4a3\" class=\"gem-divider  \" style=\"\" ><\/div><div class=\"thegem-te-heading thegem-custom-69d0e41b4a5826356\" ><h2 id=\"thegem-heading-69d0e41b4a55f\" class=\"thegem-heading title-h5 vc_custom_1751457203016\" style=\"text-align: left;\" ><span>Benefits:<\/span><\/h2><style type=\"text\/css\">#thegem-heading-69d0e41b4a55f {margin: 0;}#thegem-heading-69d0e41b4a55f a:hover, #thegem-heading-69d0e41b4a55f a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e41b4a5826356{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e41b4a5826356{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e41b4a5826356{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e41b4a5826356{position: relative !important;}}<\/style><div class=\"gem-image gem-wrapbox gem-wrapbox-style-default gem-wrapbox-position-below desktop-infographic thegem-custom-69d0e41b4a5ce2394\"  style=\"width: 100%;\" ><div class=\"gem-wrapbox-inner \" ><img class=\"gem-wrapbox-element img-responsive\" src=\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/10\/Bezbednost-logova-graf-1-eng-01.svg\" alt=\"\"\/><\/div><\/div><div class=\"gem-image gem-wrapbox gem-wrapbox-style-default gem-wrapbox-position-below mobile-infographic thegem-custom-69d0e41b4ac4c5354\"  style=\"width: 100%;\" ><div class=\"gem-wrapbox-inner \" ><img class=\"gem-wrapbox-element img-responsive\" src=\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/10\/Bezbednost-logova-graf-1-eng-mob-01.svg\" alt=\"\"\/><\/div><\/div><div class=\"thegem-te-heading thegem-custom-69d0e41b4afe31937\" ><h2 id=\"thegem-heading-69d0e41b4afaf\" class=\"thegem-heading title-h5 vc_custom_1751457237639\" style=\"text-align: left;\" ><span>Why log monitoring is crucial for your security and how we can help<\/span><\/h2><style type=\"text\/css\">#thegem-heading-69d0e41b4afaf {margin: 0;}#thegem-heading-69d0e41b4afaf a:hover, #thegem-heading-69d0e41b4afaf a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e41b4afe31937{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e41b4afe31937{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e41b4afe31937{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e41b4afe31937{position: relative !important;}}<\/style>[vc_column_text css=&#8221;&#8221;]Security logs are almost useless without monitoring. Attackers often rely on the fact that companies don\u2019t actively track their logs, allowing them to operate unnoticed and compromise your infrastructure.[\/vc_column_text]<div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e41b4b051 {margin-bottom: 20px !important;}<\/style><div id=\"thegem-divider-69d0e41b4b051\" class=\"gem-divider  \" style=\"\" ><\/div><div class=\"thegem-te-heading thegem-custom-69d0e41b4b1445587\" ><h3 id=\"thegem-heading-69d0e41b4b117\" class=\"thegem-heading title-h6 vc_custom_1757674019242\" style=\"text-align: left;\" ><span class=\"colored\" style=\"color: #2A55A2;\">Don\u2019t wait until it\u2019s too late \u2013 ensure your data is always protected!<\/span><\/h3><style type=\"text\/css\">#thegem-heading-69d0e41b4b117 {margin: 0;}#thegem-heading-69d0e41b4b117 {font-size: 18px;}#thegem-heading-69d0e41b4b117, #thegem-heading-69d0e41b4b117 .light {text-transform: none;}#thegem-heading-69d0e41b4b117 a:hover, #thegem-heading-69d0e41b4b117 a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e41b4b1445587{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e41b4b1445587{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d0e41b4b1445587{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d0e41b4b1445587{position: relative !important;}}<\/style><style type=\"text\/css\">.thegem-button-69d0e41b4b2045979 .gem-button {font-size: 16px;margin-top: 5px;margin-bottom: 5px;}.thegem-button-69d0e41b4b2045979 .gem-button svg {fill: #FFFFFF;}.thegem-button-69d0e41b4b2045979 .gem-button:hover svg {fill: #FFFFFF;}<\/style><div class=\"gem-button-container gem-button-position-inline thegem-button-69d0e41b4b2045979    \"  ><a title=\"Contact\" class=\"gem-button gem-button-size-medium gem-button-style-flat gem-button-text-weight-normal gem-button-icon-position-right\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 4px;background-color: #56ADE4;color: #FFFFFF;\" onmouseleave=\"this.style.backgroundColor='#56ADE4';this.style.color='#FFFFFF';\" onmouseenter=\"this.style.backgroundColor='#2A55A2';this.style.color='#FFFFFF';\" href=\"https:\/\/saga.rs\/en\/contact\/\" target=\"_self\">Contact us<i class=\"gem-print-icon gem-icon-pack-elegant \">&#x39;<\/i><\/a><\/div> <div class=\"clearboth\"><\/div><style>#thegem-divider-69d0e41b4b26a {margin-bottom: 100px !important;}@media screen and (max-width: 767px) {#thegem-divider-69d0e41b4b26a {margin-bottom: 50px !important;}}<\/style><div id=\"thegem-divider-69d0e41b4b26a\" class=\"gem-divider  \" style=\"\" ><\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row custom_css_code=&#8221;JTJGJTJBJTIwTGlzdCUyMEl0ZW0lMjAlMkElMkYlMEEucG9zdC1icmVhZGNydW1icyUyMHVsJTIwbGklM0FudGgtY2hpbGQlMjgxJTI5JTdCJTBBJTA5cGFkZGluZy1sZWZ0JTNBMHB4JTNCJTBBJTA5JTBBJTdEJTBBJTBB&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; el_sticky=&#8221;1&#8243; el_sticky_offset=&#8221;130px&#8221;][vc_column_text css=&#8221;&#8221;]Rapid threat detection&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":19630,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-19764","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Log Monitoring Systems - Saga<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/saga.rs\/en\/cyber-security\/security-log-monitoring-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Log Monitoring Systems - Saga\" \/>\n<meta property=\"og:description\" content=\"[vc_row custom_css_code=&#8221;JTJGJTJBJTIwTGlzdCUyMEl0ZW0lMjAlMkElMkYlMEEucG9zdC1icmVhZGNydW1icyUyMHVsJTIwbGklM0FudGgtY2hpbGQlMjgxJTI5JTdCJTBBJTA5cGFkZGluZy1sZWZ0JTNBMHB4JTNCJTBBJTA5JTBBJTdEJTBBJTBB&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; el_sticky=&#8221;1&#8243; el_sticky_offset=&#8221;130px&#8221;][vc_column_text css=&#8221;&#8221;]Rapid threat detection...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/saga.rs\/en\/cyber-security\/security-log-monitoring-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Saga\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-07T09:05:08+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/saga.rs\/en\/cyber-security\/security-log-monitoring-systems\/\",\"url\":\"https:\/\/saga.rs\/en\/cyber-security\/security-log-monitoring-systems\/\",\"name\":\"Security Log Monitoring Systems - Saga\",\"isPartOf\":{\"@id\":\"https:\/\/saga.rs\/#website\"},\"datePublished\":\"2025-07-02T11:46:59+00:00\",\"dateModified\":\"2025-10-07T09:05:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/saga.rs\/en\/cyber-security\/security-log-monitoring-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/saga.rs\/en\/cyber-security\/security-log-monitoring-systems\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/saga.rs\/en\/cyber-security\/security-log-monitoring-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/saga.rs\/en\/sample-page-2\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\",\"item\":\"https:\/\/saga.rs\/en\/cyber-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security Log Monitoring Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/saga.rs\/#website\",\"url\":\"https:\/\/saga.rs\/\",\"name\":\"Saga\",\"description\":\"A Noventiq Company\",\"publisher\":{\"@id\":\"https:\/\/saga.rs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/saga.rs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/saga.rs\/#organization\",\"name\":\"Saga A Noventiq Company\",\"url\":\"https:\/\/saga.rs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/saga.rs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png\",\"contentUrl\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png\",\"width\":1596,\"height\":450,\"caption\":\"Saga A Noventiq Company\"},\"image\":{\"@id\":\"https:\/\/saga.rs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS\",\"https:\/\/www.linkedin.com\/company\/saga-bg\/?originalSubdomain=rs\",\"https:\/\/www.instagram.com\/saga_beograd\/\",\"https:\/\/www.youtube.com\/@SagaBeograd\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Log Monitoring Systems - Saga","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/saga.rs\/en\/cyber-security\/security-log-monitoring-systems\/","og_locale":"en_US","og_type":"article","og_title":"Security Log Monitoring Systems - Saga","og_description":"[vc_row custom_css_code=&#8221;JTJGJTJBJTIwTGlzdCUyMEl0ZW0lMjAlMkElMkYlMEEucG9zdC1icmVhZGNydW1icyUyMHVsJTIwbGklM0FudGgtY2hpbGQlMjgxJTI5JTdCJTBBJTA5cGFkZGluZy1sZWZ0JTNBMHB4JTNCJTBBJTA5JTBBJTdEJTBBJTBB&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243; el_sticky=&#8221;1&#8243; el_sticky_offset=&#8221;130px&#8221;][vc_column_text css=&#8221;&#8221;]Rapid threat detection...","og_url":"https:\/\/saga.rs\/en\/cyber-security\/security-log-monitoring-systems\/","og_site_name":"Saga","article_publisher":"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS","article_modified_time":"2025-10-07T09:05:08+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/saga.rs\/en\/cyber-security\/security-log-monitoring-systems\/","url":"https:\/\/saga.rs\/en\/cyber-security\/security-log-monitoring-systems\/","name":"Security Log Monitoring Systems - Saga","isPartOf":{"@id":"https:\/\/saga.rs\/#website"},"datePublished":"2025-07-02T11:46:59+00:00","dateModified":"2025-10-07T09:05:08+00:00","breadcrumb":{"@id":"https:\/\/saga.rs\/en\/cyber-security\/security-log-monitoring-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/saga.rs\/en\/cyber-security\/security-log-monitoring-systems\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/saga.rs\/en\/cyber-security\/security-log-monitoring-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/saga.rs\/en\/sample-page-2\/"},{"@type":"ListItem","position":2,"name":"Cyber Security","item":"https:\/\/saga.rs\/en\/cyber-security\/"},{"@type":"ListItem","position":3,"name":"Security Log Monitoring Systems"}]},{"@type":"WebSite","@id":"https:\/\/saga.rs\/#website","url":"https:\/\/saga.rs\/","name":"Saga","description":"A Noventiq Company","publisher":{"@id":"https:\/\/saga.rs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/saga.rs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/saga.rs\/#organization","name":"Saga A Noventiq Company","url":"https:\/\/saga.rs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/saga.rs\/#\/schema\/logo\/image\/","url":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png","contentUrl":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png","width":1596,"height":450,"caption":"Saga A Noventiq Company"},"image":{"@id":"https:\/\/saga.rs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS","https:\/\/www.linkedin.com\/company\/saga-bg\/?originalSubdomain=rs","https:\/\/www.instagram.com\/saga_beograd\/","https:\/\/www.youtube.com\/@SagaBeograd"]}]}},"_links":{"self":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/pages\/19764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/comments?post=19764"}],"version-history":[{"count":4,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/pages\/19764\/revisions"}],"predecessor-version":[{"id":22032,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/pages\/19764\/revisions\/22032"}],"up":[{"embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/pages\/19630"}],"wp:attachment":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/media?parent=19764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}