{"id":20409,"date":"2025-07-22T09:33:35","date_gmt":"2025-07-22T09:33:35","guid":{"rendered":"https:\/\/saga.rs\/cyber-security-2\/"},"modified":"2025-10-03T12:51:59","modified_gmt":"2025-10-03T12:51:59","slug":"cyber-security-2","status":"publish","type":"page","link":"https:\/\/saga.rs\/en\/cyber-security-2\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row css=&#8221;.vc_custom_1754313171180{margin-top: -50px !important;padding-top: 0px !important;}&#8221; tablet_margin_top=&#8221;-30&#8243; mobile_margin_top=&#8221;0&#8243;][vc_column]<style>.thegem-te-post-breadcrumbs.thegem-custom-69d8b805aea057171 .post-breadcrumbs {justify-content: center; text-align: center;}.thegem-te-post-breadcrumbs.thegem-custom-69d8b805aea057171 .post-breadcrumbs ul {justify-content: center; text-align: center;}.thegem-te-post-breadcrumbs.thegem-custom-69d8b805aea057171 .post-breadcrumbs ul li {color: #2A55A2;}.thegem-te-post-breadcrumbs.thegem-custom-69d8b805aea057171 .post-breadcrumbs ul li a {color: #2A55A2;}.thegem-te-post-breadcrumbs.thegem-custom-69d8b805aea057171 .post-breadcrumbs ul li a:hover {color: #56ADE4;}.thegem-te-post-breadcrumbs.thegem-custom-69d8b805aea057171 .post-breadcrumbs ul li:last-child {color: #2A55A2;}<\/style><div class=\"thegem-te-post-breadcrumbs custom-breadcrumb thegem-custom-69d8b805aea057171\"> <div class=\"post-breadcrumbs\"><ul><li><a href=\"https:\/\/saga.rs\/en\/\">Home<\/a><\/li><\/ul><!-- .breadcrumbs --><\/div> <\/div><div class=\"clearboth\"><\/div><style>#thegem-divider-69d8b805af087 {margin-top: 80px !important;}@media screen and (max-width: 767px) {#thegem-divider-69d8b805af087 {margin-top: 20px !important;}}<\/style><div id=\"thegem-divider-69d8b805af087\" class=\"gem-divider  \" style=\"\" ><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1754318558057{padding-right: 100px !important;padding-left: 100px !important;}&#8221; tablet_padding_left=&#8221;0&#8243; tablet_padding_right=&#8221;0&#8243; mobile_padding_left=&#8221;0&#8243; mobile_padding_right=&#8221;0&#8243;][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;6696&#8243; img_size=&#8221;full&#8221; onclick=&#8221;custom_link&#8221; css=&#8221;&#8221; link=&#8221;https:\/\/saga.rs\/en\/cyber-security-2\/dns\/&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"thegem-te-heading thegem-custom-69d8b805af2779929\" ><h3 id=\"thegem-heading-69d8b805af1e7\" class=\"thegem-heading title-h5 vc_custom_1753176929742\" style=\"text-align: left;\" ><span class=\"colored\" style=\"color: #56ADE4;\">Security Without Compromise<\/span><\/h3><style type=\"text\/css\">#thegem-heading-69d8b805af1e7 {margin: 0;}#thegem-heading-69d8b805af1e7 a:hover, #thegem-heading-69d8b805af1e7 a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d8b805af2779929{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d8b805af2779929{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d8b805af2779929{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d8b805af2779929{position: relative !important;}}<\/style>[vc_column_text css=&#8221;&#8221;]As your business grows in the digital space, hackers are already planning their next attack. Our Managed Cyber Security service acts as your invisible shield \u2013 working 24\/7 so you can focus on building your business with peace of mind. With our <strong>Cyber Security<\/strong> solutions within <strong>Managed Services<\/strong>, you can concentrate on innovation and growth while we provide integrated protection for your IT infrastructure.[\/vc_column_text]<div class=\"thegem-te-heading thegem-custom-69d8b805af3d11912\" ><h3 id=\"thegem-heading-69d8b805af3a1\" class=\"thegem-heading title-h5 vc_custom_1753176947135\" style=\"text-align: left;\" ><span class=\"colored\" style=\"color: #56ADE4;\">Smart Security Architecture \u2013 Protection Tailored to Your Needs<\/span><\/h3><style type=\"text\/css\">#thegem-heading-69d8b805af3a1 {margin: 0;}#thegem-heading-69d8b805af3a1 a:hover, #thegem-heading-69d8b805af3a1 a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d8b805af3d11912{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d8b805af3d11912{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d8b805af3d11912{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d8b805af3d11912{position: relative !important;}}<\/style><div class=\"clearboth\"><\/div><style>#thegem-divider-69d8b805af42f {margin-bottom: 30px !important;}@media screen and (max-width: 767px) {#thegem-divider-69d8b805af42f {margin-bottom: 50px !important;}}<\/style><div id=\"thegem-divider-69d8b805af42f\" class=\"gem-divider  \" style=\"\" ><\/div><div class=\"thegem-te-heading thegem-custom-69d8b805af5328434\" ><h2 id=\"thegem-heading-69d8b805af50c\" class=\"thegem-heading title-h2 vc_custom_1753176410232\" style=\"text-align: left;\" ><span>DNS Security \u2013 Your First Line of Defense<\/span><\/h2><style type=\"text\/css\">#thegem-heading-69d8b805af50c {margin: 0;}#thegem-heading-69d8b805af50c a:hover, #thegem-heading-69d8b805af50c a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d8b805af5328434{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d8b805af5328434{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d8b805af5328434{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d8b805af5328434{position: relative !important;}}<\/style>[vc_column_text css=&#8221;&#8221;]DNS systems are frequent targets of sophisticated cyberattacks that can compromise data, redirect traffic, or even take systems offline. Our <strong>DNS security<\/strong> filters malicious traffic, blocks phishing domains, and prevents C2 communications before they threaten your IT ecosystem. This ensures network integrity and minimizes the risk of unauthorized access.[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d8b805af63d3841 .gem-button {font-size: 16px;margin-top: 5px;margin-bottom: 5px;}.thegem-button-69d8b805af63d3841 .gem-button svg {fill: #FFFFFF;}.thegem-button-69d8b805af63d3841 .gem-button:hover svg {fill: #FFFFFF;}<\/style><div class=\"gem-button-container gem-button-position-inline thegem-button-69d8b805af63d3841    \"  ><a class=\"gem-button gem-button-size-medium gem-button-style-flat gem-button-text-weight-normal gem-button-icon-position-right\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 4px;background-color: #56ADE4;color: #FFFFFF;\" onmouseleave=\"this.style.backgroundColor='#56ADE4';this.style.color='#FFFFFF';\" onmouseenter=\"this.style.backgroundColor='#2A55A2';this.style.color='#FFFFFF';\" href=\"https:\/\/saga.rs\/en\/cyber-security-2\/dns\/\" target=\"_self\">Learn more<i class=\"gem-print-icon gem-icon-pack-elegant \">&#x39;<\/i><\/a><\/div> [\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1750924764493{padding-right: 100px !important;padding-left: 100px !important;}&#8221; tablet_padding_left=&#8221;0&#8243; tablet_padding_right=&#8221;0&#8243; mobile_padding_left=&#8221;0&#8243; mobile_padding_right=&#8221;0&#8243;][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;6697&#8243; img_size=&#8221;full&#8221; onclick=&#8221;custom_link&#8221; css=&#8221;&#8221; link=&#8221;https:\/\/saga.rs\/en\/cyber-security-2\/sig\/&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"thegem-te-heading thegem-custom-69d8b805af76e8341\" ><h2 id=\"thegem-heading-69d8b805af747\" class=\"thegem-heading title-h2 vc_custom_1753176514685\" style=\"text-align: left;\" ><span>Secure Internet Gateway (SIG) \u2013 Safe Access, Anywhere<\/span><\/h2><style type=\"text\/css\">#thegem-heading-69d8b805af747 {margin: 0;}#thegem-heading-69d8b805af747 a:hover, #thegem-heading-69d8b805af747 a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d8b805af76e8341{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d8b805af76e8341{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d8b805af76e8341{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d8b805af76e8341{position: relative !important;}}<\/style>[vc_column_text css=&#8221;&#8221;]Modern business requires secure internet access from any location. <strong>Secure Internet Gateway (SIG) <\/strong>provides centralized user protection, filters malicious traffic, blocks unsafe websites and apps, and prevents data theft. SIG guarantees secure connectivity for employees wherever they are \u2013 without compromising your organization\u2019s security.[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d8b805af8089080 .gem-button {font-size: 16px;margin-top: 5px;margin-bottom: 5px;}.thegem-button-69d8b805af8089080 .gem-button svg {fill: #FFFFFF;}.thegem-button-69d8b805af8089080 .gem-button:hover svg {fill: #FFFFFF;}<\/style><div class=\"gem-button-container gem-button-position-inline thegem-button-69d8b805af8089080    \"  ><a class=\"gem-button gem-button-size-medium gem-button-style-flat gem-button-text-weight-normal gem-button-icon-position-right\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 4px;background-color: #56ADE4;color: #FFFFFF;\" onmouseleave=\"this.style.backgroundColor='#56ADE4';this.style.color='#FFFFFF';\" onmouseenter=\"this.style.backgroundColor='#2A55A2';this.style.color='#FFFFFF';\" href=\"https:\/\/saga.rs\/en\/cyber-security-2\/sig\/\" target=\"_self\">Learn more<i class=\"gem-print-icon gem-icon-pack-elegant \">&#x39;<\/i><\/a><\/div> [\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1750924764493{padding-right: 100px !important;padding-left: 100px !important;}&#8221; tablet_padding_left=&#8221;0&#8243; tablet_padding_right=&#8221;0&#8243; mobile_padding_left=&#8221;0&#8243; mobile_padding_right=&#8221;0&#8243;][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;6698&#8243; img_size=&#8221;full&#8221; onclick=&#8221;custom_link&#8221; css=&#8221;&#8221; link=&#8221;https:\/\/saga.rs\/en\/cyber-security-2\/edr-xdr\/&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"thegem-te-heading thegem-custom-69d8b805af90d830\" ><h2 id=\"thegem-heading-69d8b805af8e9\" class=\"thegem-heading title-h2 vc_custom_1753176555849\" style=\"text-align: left;\" ><span>EDR\/XDR \u2013 Intelligent Threat Detection and Response<\/span><\/h2><style type=\"text\/css\">#thegem-heading-69d8b805af8e9 {margin: 0;}#thegem-heading-69d8b805af8e9 a:hover, #thegem-heading-69d8b805af8e9 a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d8b805af90d830{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d8b805af90d830{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d8b805af90d830{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d8b805af90d830{position: relative !important;}}<\/style>[vc_column_text css=&#8221;&#8221;]Traditional security methods are no longer sufficient against advanced cyber threats. <strong>Endpoint Detection &amp; Response (EDR) <\/strong>and<strong> Extended Detection &amp; Response (XDR)<\/strong> use advanced analytics and AI to identify unusual activity, analyze potential threats, and automatically respond in real time. This technology provides deep network insights, detects suspicious behavior patterns, and minimizes time to detect and neutralize threats.[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d8b805af9b02523 .gem-button {font-size: 16px;margin-top: 5px;margin-bottom: 5px;}.thegem-button-69d8b805af9b02523 .gem-button svg {fill: #FFFFFF;}.thegem-button-69d8b805af9b02523 .gem-button:hover svg {fill: #FFFFFF;}<\/style><div class=\"gem-button-container gem-button-position-inline thegem-button-69d8b805af9b02523    \"  ><a class=\"gem-button gem-button-size-medium gem-button-style-flat gem-button-text-weight-normal gem-button-icon-position-right\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 4px;background-color: #56ADE4;color: #FFFFFF;\" onmouseleave=\"this.style.backgroundColor='#56ADE4';this.style.color='#FFFFFF';\" onmouseenter=\"this.style.backgroundColor='#2A55A2';this.style.color='#FFFFFF';\" href=\"https:\/\/saga.rs\/en\/cyber-security-2\/edr-xdr\/\" target=\"_self\">Learn more<i class=\"gem-print-icon gem-icon-pack-elegant \">&#x39;<\/i><\/a><\/div> [\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1750924764493{padding-right: 100px !important;padding-left: 100px !important;}&#8221; tablet_padding_left=&#8221;0&#8243; tablet_padding_right=&#8221;0&#8243; mobile_padding_left=&#8221;0&#8243; mobile_padding_right=&#8221;0&#8243;][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;6701&#8243; img_size=&#8221;full&#8221; onclick=&#8221;custom_link&#8221; css=&#8221;&#8221; link=&#8221;https:\/\/saga.rs\/en\/cyber-security-2\/waf-i-api\/&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"thegem-te-heading thegem-custom-69d8b805afb08168\" ><h2 id=\"thegem-heading-69d8b805afab1\" class=\"thegem-heading title-h2 vc_custom_1753176596933\" style=\"text-align: left;\" ><span>WAF &amp; API Security \u2013 Protecting Your Applications and Data<\/span><\/h2><style type=\"text\/css\">#thegem-heading-69d8b805afab1 {margin: 0;}#thegem-heading-69d8b805afab1 a:hover, #thegem-heading-69d8b805afab1 a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d8b805afb08168{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d8b805afb08168{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d8b805afb08168{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d8b805afb08168{position: relative !important;}}<\/style>[vc_column_text css=&#8221;&#8221;]Web applications and APIs are key data exchange points \u2013 and frequent targets for attacks like <strong>SQL injection, XSS, and DDoS<\/strong>. Our <strong>Web Application Firewall (WAF)<\/strong> and <strong>API Security <\/strong>solutions analyze every request in real time, detect and block suspicious activity, ensuring uninterrupted application operation and protection of critical data.[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d8b805afbd46488 .gem-button {font-size: 16px;margin-top: 5px;margin-bottom: 5px;}.thegem-button-69d8b805afbd46488 .gem-button svg {fill: #FFFFFF;}.thegem-button-69d8b805afbd46488 .gem-button:hover svg {fill: #FFFFFF;}<\/style><div class=\"gem-button-container gem-button-position-inline thegem-button-69d8b805afbd46488    \"  ><a class=\"gem-button gem-button-size-medium gem-button-style-flat gem-button-text-weight-normal gem-button-icon-position-right\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 4px;background-color: #56ADE4;color: #FFFFFF;\" onmouseleave=\"this.style.backgroundColor='#56ADE4';this.style.color='#FFFFFF';\" onmouseenter=\"this.style.backgroundColor='#2A55A2';this.style.color='#FFFFFF';\" href=\"https:\/\/saga.rs\/en\/cyber-security-2\/waf-i-api\/\" target=\"_self\">Learn more<i class=\"gem-print-icon gem-icon-pack-elegant \">&#x39;<\/i><\/a><\/div> [\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1750924764493{padding-right: 100px !important;padding-left: 100px !important;}&#8221; tablet_padding_left=&#8221;0&#8243; tablet_padding_right=&#8221;0&#8243; mobile_padding_left=&#8221;0&#8243; mobile_padding_right=&#8221;0&#8243;][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;6702&#8243; img_size=&#8221;full&#8221; onclick=&#8221;custom_link&#8221; css=&#8221;&#8221; link=&#8221;https:\/\/saga.rs\/en\/cyber-security-2\/mfa\/&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"thegem-te-heading thegem-custom-69d8b805afd068553\" ><h2 id=\"thegem-heading-69d8b805afcd6\" class=\"thegem-heading title-h2 vc_custom_1753176631660\" style=\"text-align: left;\" ><span>Multi-Factor Authentication (MFA) \u2013 Layered Access Protection<\/span><\/h2><style type=\"text\/css\">#thegem-heading-69d8b805afcd6 {margin: 0;}#thegem-heading-69d8b805afcd6 a:hover, #thegem-heading-69d8b805afcd6 a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d8b805afd068553{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d8b805afd068553{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d8b805afd068553{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d8b805afd068553{position: relative !important;}}<\/style>[vc_column_text css=&#8221;&#8221;]Passwords are often the weakest link in authentication. <strong>Multi-Factor Authentication (MFA)<\/strong> adds an extra layer of security through multiple verification methods \u2013 from one-time codes to biometric data. This approach prevents unauthorized access even if user credentials are compromised.[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d8b805afdd72493 .gem-button {font-size: 16px;margin-top: 5px;margin-bottom: 5px;}.thegem-button-69d8b805afdd72493 .gem-button svg {fill: #FFFFFF;}.thegem-button-69d8b805afdd72493 .gem-button:hover svg {fill: #FFFFFF;}<\/style><div class=\"gem-button-container gem-button-position-inline thegem-button-69d8b805afdd72493    \"  ><a class=\"gem-button gem-button-size-medium gem-button-style-flat gem-button-text-weight-normal gem-button-icon-position-right\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 4px;background-color: #56ADE4;color: #FFFFFF;\" onmouseleave=\"this.style.backgroundColor='#56ADE4';this.style.color='#FFFFFF';\" onmouseenter=\"this.style.backgroundColor='#2A55A2';this.style.color='#FFFFFF';\" href=\"https:\/\/saga.rs\/en\/cyber-security-2\/mfa\/\" target=\"_self\">Learn more<i class=\"gem-print-icon gem-icon-pack-elegant \">&#x39;<\/i><\/a><\/div> [\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"clearboth\"><\/div><style>#thegem-divider-69d8b805afe2c {margin-bottom: 100px !important;}@media screen and (max-width: 767px) {#thegem-divider-69d8b805afe2c {margin-bottom: 50px !important;}}<\/style><div id=\"thegem-divider-69d8b805afe2c\" class=\"gem-divider  \" style=\"\" ><\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"thegem-te-heading thegem-custom-69d8b805aff214204\" ><h2 id=\"thegem-heading-69d8b805afef9\" class=\"thegem-heading title-h2 vc_custom_1753177196893\" style=\"text-align: center;\" ><span>Why Choose Our Security Solutions<\/span><\/h2><style type=\"text\/css\">#thegem-heading-69d8b805afef9 {margin: 0;}#thegem-heading-69d8b805afef9 {margin-left: auto; margin-right: auto;}#thegem-heading-69d8b805afef9 > * {justify-content: center;}#thegem-heading-69d8b805afef9 a:hover, #thegem-heading-69d8b805afef9 a:hover span.colored {color: var(--thegem-to-menu-level1-color-hover, #00BCD4) !important;}<\/style><\/div><style>@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d8b805aff214204{display: block!important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d8b805aff214204{display: block!important;}}@media screen and (max-width: 1023px) {.thegem-te-heading.thegem-custom-69d8b805aff214204{position: relative !important;}}@media screen and (max-width: 767px) {.thegem-te-heading.thegem-custom-69d8b805aff214204{position: relative !important;}}<\/style><div class=\"gem-image gem-wrapbox gem-wrapbox-style-default gem-wrapbox-position-below desktop-infographic thegem-custom-69d8b805aff734654\"  style=\"width: 100%;\" ><div class=\"gem-wrapbox-inner \" ><img class=\"gem-wrapbox-element img-responsive\" src=\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/10\/Managed-Cyber-graf-1-eng.svg\" alt=\"\"\/><\/div><\/div><div class=\"gem-image gem-wrapbox gem-wrapbox-style-default gem-wrapbox-position-below mobile-infographic thegem-custom-69d8b805b07852174\"  style=\"\" ><div class=\"gem-wrapbox-inner \" ><img class=\"gem-wrapbox-element img-responsive\" src=\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/10\/Managed-Cyber-graf-1-eng-mob.svg\" alt=\"\"\/><\/div><\/div>[vc_column_text css=&#8221;&#8221;]One in four businesses experiences a cyberattack. Those that survive have one thing in common \u2013 a proactive approach to security management. Our Managed Security service is your first step toward that protection.[\/vc_column_text]<style type=\"text\/css\">.thegem-button-69d8b805b0b2f2978 .gem-button {font-size: 16px;margin-top: 5px;margin-bottom: 5px;}.thegem-button-69d8b805b0b2f2978 .gem-button svg {fill: #FFFFFF;}.thegem-button-69d8b805b0b2f2978 .gem-button:hover svg {fill: #FFFFFF;}<\/style><div class=\"gem-button-container gem-button-position-inline thegem-button-69d8b805b0b2f2978    \"  ><a class=\"gem-button gem-button-size-medium gem-button-style-flat gem-button-text-weight-normal gem-button-icon-position-right\" data-ll-effect=\"drop-right-without-wrap\" style=\"border-radius: 4px;background-color: #56ADE4;color: #FFFFFF;\" onmouseleave=\"this.style.backgroundColor='#56ADE4';this.style.color='#FFFFFF';\" onmouseenter=\"this.style.backgroundColor='#2A55A2';this.style.color='#FFFFFF';\" href=\"https:\/\/saga.rs\/en\/contact\/\" target=\"_self\">Contact us<i class=\"gem-print-icon gem-icon-pack-elegant \">&#x39;<\/i><\/a><\/div> [\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"clearboth\"><\/div><style>#thegem-divider-69d8b805b0ba1 {margin-bottom: 100px !important;}@media screen and (max-width: 767px) {#thegem-divider-69d8b805b0ba1 {margin-bottom: 50px !important;}}<\/style><div id=\"thegem-divider-69d8b805b0ba1\" class=\"gem-divider  \" style=\"\" ><\/div>[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1754313171180{margin-top: -50px !important;padding-top: 0px !important;}&#8221; tablet_margin_top=&#8221;-30&#8243; mobile_margin_top=&#8221;0&#8243;][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; equal_height=&#8221;yes&#8221;&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-20409","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security - Saga<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/saga.rs\/en\/cyber-security-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security - Saga\" \/>\n<meta property=\"og:description\" content=\"[vc_row css=&#8221;.vc_custom_1754313171180{margin-top: -50px !important;padding-top: 0px !important;}&#8221; tablet_margin_top=&#8221;-30&#8243; mobile_margin_top=&#8221;0&#8243;][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; equal_height=&#8221;yes&#8221;...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/saga.rs\/en\/cyber-security-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Saga\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-03T12:51:59+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/saga.rs\/en\/cyber-security-2\/\",\"url\":\"https:\/\/saga.rs\/en\/cyber-security-2\/\",\"name\":\"Cyber Security - Saga\",\"isPartOf\":{\"@id\":\"https:\/\/saga.rs\/#website\"},\"datePublished\":\"2025-07-22T09:33:35+00:00\",\"dateModified\":\"2025-10-03T12:51:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/saga.rs\/en\/cyber-security-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/saga.rs\/en\/cyber-security-2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/saga.rs\/en\/cyber-security-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/saga.rs\/en\/sample-page-2\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/saga.rs\/#website\",\"url\":\"https:\/\/saga.rs\/\",\"name\":\"Saga\",\"description\":\"A Noventiq Company\",\"publisher\":{\"@id\":\"https:\/\/saga.rs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/saga.rs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/saga.rs\/#organization\",\"name\":\"Saga A Noventiq Company\",\"url\":\"https:\/\/saga.rs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/saga.rs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png\",\"contentUrl\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png\",\"width\":1596,\"height\":450,\"caption\":\"Saga A Noventiq Company\"},\"image\":{\"@id\":\"https:\/\/saga.rs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS\",\"https:\/\/www.linkedin.com\/company\/saga-bg\/?originalSubdomain=rs\",\"https:\/\/www.instagram.com\/saga_beograd\/\",\"https:\/\/www.youtube.com\/@SagaBeograd\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security - Saga","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/saga.rs\/en\/cyber-security-2\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security - Saga","og_description":"[vc_row css=&#8221;.vc_custom_1754313171180{margin-top: -50px !important;padding-top: 0px !important;}&#8221; tablet_margin_top=&#8221;-30&#8243; mobile_margin_top=&#8221;0&#8243;][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; equal_height=&#8221;yes&#8221;...","og_url":"https:\/\/saga.rs\/en\/cyber-security-2\/","og_site_name":"Saga","article_publisher":"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS","article_modified_time":"2025-10-03T12:51:59+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/saga.rs\/en\/cyber-security-2\/","url":"https:\/\/saga.rs\/en\/cyber-security-2\/","name":"Cyber Security - Saga","isPartOf":{"@id":"https:\/\/saga.rs\/#website"},"datePublished":"2025-07-22T09:33:35+00:00","dateModified":"2025-10-03T12:51:59+00:00","breadcrumb":{"@id":"https:\/\/saga.rs\/en\/cyber-security-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/saga.rs\/en\/cyber-security-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/saga.rs\/en\/cyber-security-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/saga.rs\/en\/sample-page-2\/"},{"@type":"ListItem","position":2,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/saga.rs\/#website","url":"https:\/\/saga.rs\/","name":"Saga","description":"A Noventiq Company","publisher":{"@id":"https:\/\/saga.rs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/saga.rs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/saga.rs\/#organization","name":"Saga A Noventiq Company","url":"https:\/\/saga.rs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/saga.rs\/#\/schema\/logo\/image\/","url":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png","contentUrl":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png","width":1596,"height":450,"caption":"Saga A Noventiq Company"},"image":{"@id":"https:\/\/saga.rs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS","https:\/\/www.linkedin.com\/company\/saga-bg\/?originalSubdomain=rs","https:\/\/www.instagram.com\/saga_beograd\/","https:\/\/www.youtube.com\/@SagaBeograd"]}]}},"_links":{"self":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/pages\/20409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/comments?post=20409"}],"version-history":[{"count":8,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/pages\/20409\/revisions"}],"predecessor-version":[{"id":21549,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/pages\/20409\/revisions\/21549"}],"wp:attachment":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/media?parent=20409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}