{"id":2247,"date":"2022-01-11T19:39:25","date_gmt":"2022-01-11T18:39:25","guid":{"rendered":"https:\/\/trans-ix.varity.nl\/?page_id=2247"},"modified":"2022-04-15T11:47:01","modified_gmt":"2022-04-15T09:47:01","slug":"think-in-security-possibilities","status":"publish","type":"page","link":"https:\/\/trans-ix.varity.nl\/en\/think-in-security-possibilities\/","title":{"rendered":"Think in Security Possibilities"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:0px;--awb-background-color:#ffffff;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-margin-top:50px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><h1 style=\"text-align: left;\">Think in <span style=\"color: #71a141;\">Security<\/span> Possibilities<\/h1>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-clearfix\" style=\"float:left;margin-top:0px;margin-bottom:50px;width:100%;max-width:130px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#1750a3;border-color:#1750a3;border-top-width:1px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-text-transform:none;\"><p>There are many situations imaginable in which your IT infrastructure could be at risk from the ever-increasing and complex threats. Trans-iX specializes in providing advice and concrete security solutions that ensure the continuity of your IT environment. We have a wide range of solutions to optimally secure your organization against outside threats, and ensure that your business keeps running at all times. Thanks to our <a href=\"https:\/\/trans-ix.varity.nl\/certificering\/\">our ISO 27001 &#038; NEN 7510 certificering<\/a> we know what we are talking bout.<\/p>\n<p>Do you have questions about IT security? We are happy <a href=\"https:\/\/trans-ix.varity.nl\/en\/contact\/\">to hear from you<\/a> what your challenges are regarding your infrastructure and how we could help you!<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first\" style=\"--awb-bg-size:cover;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% + 4% ) * 0.33333333333333 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-3\" style=\"--awb-text-transform:none;\"><h2 style=\"font-size: 23.293px; line-height: 27.773px;\" data-fontsize=\"23\" data-lineheight=\"27\" data-inline-fontsize=\"23.293px\" data-inline-lineheight=\"27.773px\">Protection<\/h2>\n<p><span style=\"color: var(--body_typography-color); font-family: var(--body_typography-font-family); font-size: var(--body_typography-font-size); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">Minimal security measures include well-known solutions such as an effective firewall, updated antivirus and anti-malware products, and staff training. Which other preventive measures should be taken depends on the sensitivity of the information, the infrastructure and the rules that apply to your organization. Trans-iX will help you determine the best solutions, always considering the available budget.<\/span><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_3 1_3 fusion-one-third\" style=\"--awb-bg-size:cover;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% + 4% ) * 0.33333333333333 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-4\" style=\"--awb-text-transform:none;\"><h2 style=\"font-size: 23.293px; line-height: 27.773px;\" data-fontsize=\"23\" data-lineheight=\"27\" data-inline-fontsize=\"23.293px\" data-inline-lineheight=\"27.773px\">Compliance<\/h2>\n<p>How do you ensure the security of sensitive company information? Privacy is even more under the magnifying glass with the arrival of the GDPR in 2018. If you do not comply with these stricter rules, you run the risk of a high fine. Reason for panic? No, but you do need to take a number of technical and organizational measures that protect your data on the one hand, but also ensure that your employees can continue to do their jobs. Trans-iX has extensive experience in this area and is happy to share this expertise.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-last\" style=\"--awb-bg-size:cover;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% + 4% ) * 0.33333333333333 ) );\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-5\" style=\"--awb-text-transform:none;\"><h2 style=\"font-size: 23.293px; line-height: 27.773px;\" data-fontsize=\"23\" data-lineheight=\"27\" data-inline-fontsize=\"23.293px\" data-inline-lineheight=\"27.773px\">Authentication<\/h2>\n<p>Anytime, anywhere access to your systems, secured with enhanced identity verification thanks to two-factor authentication. This raises the level of access security to a higher level and prevents unwanted people from entering. Don&#8217;t you always lock the front door when you leave your house? We can make this possible for your IT and prevent unwanted visitors.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-top:30px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:30px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-alert alert custom alert-custom fusion-alert-center awb-alert-native-link-color alert-shadow\" style=\"--awb-background-color:#f7f7f7;--awb-accent-color:#71a141;--awb-border-size:0px;--awb-border-top-left-radius:0px;--awb-border-top-right-radius:0px;--awb-border-bottom-left-radius:0px;--awb-border-bottom-right-radius:0px;\" role=\"alert\"><div class=\"fusion-alert-content-wrapper\"><span class=\"fusion-alert-content\"><p style=\"text-align: center;\"><span style=\"font-size: 20px; color: #71a141;\">Would you like to know more about the <span style=\"color: #1750a3;\"><strong>Security<\/strong><\/span> Possibilities of Trans-iX? Please feel free to contact us.<\/span><\/p>\n<p style=\"text-align: center;\"><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat button-medium button-default fusion-button-default button-1 fusion-button-span-no fusion-button-default-type\" target=\"_self\" href=\"https:\/\/trans-ix.varity.nl\/en\/contact\/\"><span class=\"fusion-button-text\">Contact us<\/span><\/a><\/div><\/span><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-top:0px;--awb-padding-right:2%;--awb-padding-bottom:0px;--awb-padding-left:2%;--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:4%;--awb-padding-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-section-separator section-separator slant fusion-section-separator-1\" style=\"--awb-spacer-height:99px;--awb-svg-margin-left:0;--awb-svg-margin-right:0;--awb-divider-height:99px;--awb-spacer-padding-top:inherit;--awb-sep-padding:0;--awb-svg-padding:0;--awb-svg-tag-margin-bottom:-3px;--awb-sep-svg-display:block;\"><div class=\"fusion-section-separator-svg\"><svg class=\"fusion-slant-candy\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" width=\"100%\" height=\"100\" viewBox=\"0 0 100 100\" preserveAspectRatio=\"none\" fill=\"rgba(51,51,51,1)\"><path d=\"M100 0 L0 100 L101 100 Z\"><\/path><\/svg><\/div><div class=\"fusion-section-separator-spacer\"><div class=\"fusion-section-separator-spacer-height\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"iawp_total_views":35,"footnotes":""},"class_list":["post-2247","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Think in Security Possibilities - Trans-iX<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Think in Security Possibilities - Trans-iX\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trans-ix.varity.nl\/en\/think-in-security-possibilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Trans-iX\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-15T09:47:01+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trans-ix.varity.nl\/en\/think-in-security-possibilities\/\",\"url\":\"https:\/\/trans-ix.varity.nl\/en\/think-in-security-possibilities\/\",\"name\":\"Think in Security Possibilities - Trans-iX\",\"isPartOf\":{\"@id\":\"https:\/\/trans-ix.varity.nl\/#website\"},\"datePublished\":\"2022-01-11T18:39:25+00:00\",\"dateModified\":\"2022-04-15T09:47:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/trans-ix.varity.nl\/en\/think-in-security-possibilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trans-ix.varity.nl\/en\/think-in-security-possibilities\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trans-ix.varity.nl\/en\/think-in-security-possibilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trans-ix.varity.nl\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Think in Security Possibilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trans-ix.varity.nl\/#website\",\"url\":\"https:\/\/trans-ix.varity.nl\/\",\"name\":\"Trans-iX\",\"description\":\"- Hosting provider en system integrator: Trans-iX\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trans-ix.varity.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Think in Security Possibilities - Trans-iX","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Think in Security Possibilities - Trans-iX","og_url":"https:\/\/trans-ix.varity.nl\/en\/think-in-security-possibilities\/","og_site_name":"Trans-iX","article_modified_time":"2022-04-15T09:47:01+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/trans-ix.varity.nl\/en\/think-in-security-possibilities\/","url":"https:\/\/trans-ix.varity.nl\/en\/think-in-security-possibilities\/","name":"Think in Security Possibilities - Trans-iX","isPartOf":{"@id":"https:\/\/trans-ix.varity.nl\/#website"},"datePublished":"2022-01-11T18:39:25+00:00","dateModified":"2022-04-15T09:47:01+00:00","breadcrumb":{"@id":"https:\/\/trans-ix.varity.nl\/en\/think-in-security-possibilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trans-ix.varity.nl\/en\/think-in-security-possibilities\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/trans-ix.varity.nl\/en\/think-in-security-possibilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trans-ix.varity.nl\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Think in Security Possibilities"}]},{"@type":"WebSite","@id":"https:\/\/trans-ix.varity.nl\/#website","url":"https:\/\/trans-ix.varity.nl\/","name":"Trans-iX","description":"- Hosting provider en system integrator: Trans-iX","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trans-ix.varity.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/trans-ix.varity.nl\/en\/wp-json\/wp\/v2\/pages\/2247"}],"collection":[{"href":"https:\/\/trans-ix.varity.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/trans-ix.varity.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/trans-ix.varity.nl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trans-ix.varity.nl\/en\/wp-json\/wp\/v2\/comments?post=2247"}],"version-history":[{"count":5,"href":"https:\/\/trans-ix.varity.nl\/en\/wp-json\/wp\/v2\/pages\/2247\/revisions"}],"predecessor-version":[{"id":2481,"href":"https:\/\/trans-ix.varity.nl\/en\/wp-json\/wp\/v2\/pages\/2247\/revisions\/2481"}],"wp:attachment":[{"href":"https:\/\/trans-ix.varity.nl\/en\/wp-json\/wp\/v2\/media?parent=2247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}