{"id":14372,"date":"2021-06-20T10:09:51","date_gmt":"2021-06-20T07:09:51","guid":{"rendered":"https:\/\/www.genie.co.il\/?post_type=products&#038;p=14372"},"modified":"2024-05-23T19:48:41","modified_gmt":"2024-05-23T16:48:41","slug":"protection-computing-system","status":"publish","type":"products","link":"https:\/\/www.genie.co.il\/en\/products\/protection-computing-system\/","title":{"rendered":"Hardening of the computing system"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"14372\" class=\"elementor elementor-14372\" data-elementor-post-type=\"products\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ab8ba7c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ab8ba7c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c0951d3\" data-id=\"c0951d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-808847b elementor-widget elementor-widget-heading\" data-id=\"808847b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">You hardened<span class=\"red\"> The computing system<\/span><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-896ec1a elementor-align-center elementor-widget elementor-widget-breadcrumbs\" data-id=\"896ec1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www.genie.co.il\/en\/\">computing services<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e86becf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e86becf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;arrow&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 700 10\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M360 0L350 9.9 340 0 0 0 0 10 700 10 700 0\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4a9fc14\" data-id=\"4a9fc14\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e05d248 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"e05d248\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4acdb5c\" data-id=\"4acdb5c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f467f2d elementor-widget elementor-widget-image\" data-id=\"f467f2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"460\" src=\"https:\/\/www.genie.co.il\/wp-content\/uploads\/2021\/06\/\u05d0\u05ea\u05e8.png\" class=\"attachment-large size-large wp-image-14383\" alt=\"\" srcset=\"https:\/\/www.genie.co.il\/wp-content\/uploads\/2021\/06\/\u05d0\u05ea\u05e8.png 500w, https:\/\/www.genie.co.il\/wp-content\/uploads\/2021\/06\/\u05d0\u05ea\u05e8-300x276.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a0e41b3\" data-id=\"a0e41b3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-53bdf56 elementor-widget elementor-widget-text-editor\" data-id=\"53bdf56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Many organizations rely on information security tools, when it comes to stopping a cyber incident.<br \/>Hardening an organization&#039;s computing system involves taking steps to improve the security and resilience of the organization&#039;s systems and data.<br \/>With the help of a variety of actions based on tools that exist in every organization, the level of security in the organization can be dramatically improved. Carrying out the hardening requires great expertise and understanding in the worlds of computing and information security.<\/p><p><strong>Here are some steps an organization can take to harden its computing:<\/strong><\/p><p><a href=\"https:\/\/www.genie.co.il\/en\/gpo-hardening\/\">GPO hardening\u00a0<\/a><br \/><a href=\"https:\/\/www.genie.co.il\/en\/segmentation\/\">segmentation\u00a0<\/a><br \/><a href=\"https:\/\/www.genie.co.il\/en\/fw-hardening\/\">FW hardness<\/a><br \/><a href=\"https:\/\/www.genie.co.il\/en\/email-hardening\/\">The rigors of the email array<\/a><br \/>and more..<\/p><p><strong>The services that can be hardened:<\/strong><br \/>1. Operating systems<br \/>2. Virtualization<br \/>3. Web servers (WEB)<br \/>4. Mail servers<br \/>5. Communication equipment<br \/>6. Printers<br \/>7. Office software<\/p><p>In the first stage, an in-depth mapping of the organization is carried out in order to adapt the set of hardenings and the methodology to the relevant organization.<br \/>In a subsequent step, the client is presented with a set of recommendations for hardening adapted to his organization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddac565 elementor-position-inline-end triangle-box elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"ddac565\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-play\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tGood hardening can also prevent cyber attacks and more importantly reduce the attack surface, which will reduce the damage caused to the organization!\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6bb61fc elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6bb61fc\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e902fbb\" data-id=\"e902fbb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b64eaa elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"7b64eaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">For a proposal on hardening the business computing system\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ed4fad elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"7ed4fad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.genie.co.il\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Click here<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Good hardening can also prevent cyber attacks and more importantly reduce the attack surface, which will reduce the damage caused to the organization!<\/p>","protected":false},"author":5,"featured_media":8742,"parent":0,"template":"elementor_header_footer","class_list":["post-14372","products","type-products","status-publish","has-post-thumbnail","hentry","product_cat-information-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u05d4\u05e7\u05e9\u05d7\u05ea \u05de\u05e2\u05e8\u05da \u05d4\u05de\u05d7\u05e9\u05d5\u05d1 \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9 - \u05de\u05d1\u05d5\u05e1\u05e1 \u05de\u05ea\u05d5\u05d3\u05d5\u05dc\u05d5\u05d2\u05d9\u05d9\u05ea DISA<\/title>\n<meta name=\"description\" content=\"\u05d7\u05d1\u05e8\u05ea genie \u05d4\u05e2\u05de\u05d9\u05e7\u05d4 \u05d0\u05ea \u05d4\u05d9\u05d3\u05e2 \u05e9\u05dc\u05d4 \u05d1\u05db\u05dc \u05d4\u05e0\u05d5\u05d2\u05e2 \u05dc\u05d4\u05e7\u05e9\u05d7\u05ea \u05de\u05e2\u05e8\u05da \u05d4\u05de\u05d7\u05e9\u05d5\u05d1 , \u05ea\u05d5\u05da \u05d4\u05ea\u05d1\u05e1\u05e1\u05d5\u05ea \u05e2\u05dc \u05de\u05ea\u05d5\u05d3\u05d5\u05dc\u05d5\u05d2\u05d9\u05d9\u05ea DISA ( Defense Information Systems Agency ).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.genie.co.il\/en\/products\/protection-computing-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u05d4\u05e7\u05e9\u05d7\u05ea \u05de\u05e2\u05e8\u05da \u05d4\u05de\u05d7\u05e9\u05d5\u05d1 \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9 - \u05de\u05d1\u05d5\u05e1\u05e1 \u05de\u05ea\u05d5\u05d3\u05d5\u05dc\u05d5\u05d2\u05d9\u05d9\u05ea DISA\" \/>\n<meta property=\"og:description\" content=\"\u05d7\u05d1\u05e8\u05ea genie \u05d4\u05e2\u05de\u05d9\u05e7\u05d4 \u05d0\u05ea \u05d4\u05d9\u05d3\u05e2 \u05e9\u05dc\u05d4 \u05d1\u05db\u05dc \u05d4\u05e0\u05d5\u05d2\u05e2 \u05dc\u05d4\u05e7\u05e9\u05d7\u05ea \u05de\u05e2\u05e8\u05da \u05d4\u05de\u05d7\u05e9\u05d5\u05d1 , \u05ea\u05d5\u05da \u05d4\u05ea\u05d1\u05e1\u05e1\u05d5\u05ea \u05e2\u05dc \u05de\u05ea\u05d5\u05d3\u05d5\u05dc\u05d5\u05d2\u05d9\u05d9\u05ea DISA ( Defense Information Systems Agency ).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.genie.co.il\/en\/products\/protection-computing-system\/\" \/>\n<meta property=\"og:site_name\" content=\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/genie.support\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-23T16:48:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/12\/g-icon_spam1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"368\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@geniesupport\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/protection-computing-system\\\/\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/protection-computing-system\\\/\",\"name\":\"\u05d4\u05e7\u05e9\u05d7\u05ea \u05de\u05e2\u05e8\u05da \u05d4\u05de\u05d7\u05e9\u05d5\u05d1 \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9 - \u05de\u05d1\u05d5\u05e1\u05e1 \u05de\u05ea\u05d5\u05d3\u05d5\u05dc\u05d5\u05d2\u05d9\u05d9\u05ea DISA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/protection-computing-system\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/protection-computing-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/g-icon_spam1.png\",\"datePublished\":\"2021-06-20T07:09:51+00:00\",\"dateModified\":\"2024-05-23T16:48:41+00:00\",\"description\":\"\u05d7\u05d1\u05e8\u05ea genie \u05d4\u05e2\u05de\u05d9\u05e7\u05d4 \u05d0\u05ea \u05d4\u05d9\u05d3\u05e2 \u05e9\u05dc\u05d4 \u05d1\u05db\u05dc \u05d4\u05e0\u05d5\u05d2\u05e2 \u05dc\u05d4\u05e7\u05e9\u05d7\u05ea \u05de\u05e2\u05e8\u05da \u05d4\u05de\u05d7\u05e9\u05d5\u05d1 , \u05ea\u05d5\u05da \u05d4\u05ea\u05d1\u05e1\u05e1\u05d5\u05ea \u05e2\u05dc \u05de\u05ea\u05d5\u05d3\u05d5\u05dc\u05d5\u05d2\u05d9\u05d9\u05ea DISA ( Defense Information Systems Agency ).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/protection-computing-system\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.genie.co.il\\\/products\\\/protection-computing-system\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/protection-computing-system\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/g-icon_spam1.png\",\"contentUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/g-icon_spam1.png\",\"width\":400,\"height\":368,\"caption\":\"\u05d4\u05d2\u05e0\u05d4 \u05de\u05d5\u05d9\u05e8\u05d5\u05e1 \u05db\u05d5\u05e4\u05e8 - \u05d2'\u05d9\u05e0\u05d9 \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/protection-computing-system\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/products\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\",\"item\":\"https:\\\/\\\/www.genie.co.il\\\/information-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"\u05d4\u05e7\u05e9\u05d7\u05ea \u05de\u05e2\u05e8\u05da \u05d4\u05de\u05d7\u05e9\u05d5\u05d1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#website\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/\",\"name\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.genie.co.il\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#organization\",\"name\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\",\"alternateName\":\"\u05d2'\u05d9\u05e0\u05d9\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo-genie.png\",\"contentUrl\":\"https:\\\/\\\/www.genie.co.il\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/logo-genie.png\",\"width\":190,\"height\":66,\"caption\":\"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1\"},\"image\":{\"@id\":\"https:\\\/\\\/www.genie.co.il\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/genie.support\",\"https:\\\/\\\/x.com\\\/geniesupport\",\"https:\\\/\\\/www.instagram.com\\\/genie.computing.services\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/genie\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/computingservices\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u05d4\u05e7\u05e9\u05d7\u05ea \u05de\u05e2\u05e8\u05da \u05d4\u05de\u05d7\u05e9\u05d5\u05d1 \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9 - \u05de\u05d1\u05d5\u05e1\u05e1 \u05de\u05ea\u05d5\u05d3\u05d5\u05dc\u05d5\u05d2\u05d9\u05d9\u05ea DISA","description":"\u05d7\u05d1\u05e8\u05ea genie \u05d4\u05e2\u05de\u05d9\u05e7\u05d4 \u05d0\u05ea \u05d4\u05d9\u05d3\u05e2 \u05e9\u05dc\u05d4 \u05d1\u05db\u05dc \u05d4\u05e0\u05d5\u05d2\u05e2 \u05dc\u05d4\u05e7\u05e9\u05d7\u05ea \u05de\u05e2\u05e8\u05da \u05d4\u05de\u05d7\u05e9\u05d5\u05d1 , \u05ea\u05d5\u05da \u05d4\u05ea\u05d1\u05e1\u05e1\u05d5\u05ea \u05e2\u05dc \u05de\u05ea\u05d5\u05d3\u05d5\u05dc\u05d5\u05d2\u05d9\u05d9\u05ea DISA ( Defense Information Systems Agency ).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.genie.co.il\/en\/products\/protection-computing-system\/","og_locale":"en_US","og_type":"article","og_title":"\u05d4\u05e7\u05e9\u05d7\u05ea \u05de\u05e2\u05e8\u05da \u05d4\u05de\u05d7\u05e9\u05d5\u05d1 \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9 - \u05de\u05d1\u05d5\u05e1\u05e1 \u05de\u05ea\u05d5\u05d3\u05d5\u05dc\u05d5\u05d2\u05d9\u05d9\u05ea DISA","og_description":"\u05d7\u05d1\u05e8\u05ea genie \u05d4\u05e2\u05de\u05d9\u05e7\u05d4 \u05d0\u05ea \u05d4\u05d9\u05d3\u05e2 \u05e9\u05dc\u05d4 \u05d1\u05db\u05dc \u05d4\u05e0\u05d5\u05d2\u05e2 \u05dc\u05d4\u05e7\u05e9\u05d7\u05ea \u05de\u05e2\u05e8\u05da \u05d4\u05de\u05d7\u05e9\u05d5\u05d1 , \u05ea\u05d5\u05da \u05d4\u05ea\u05d1\u05e1\u05e1\u05d5\u05ea \u05e2\u05dc \u05de\u05ea\u05d5\u05d3\u05d5\u05dc\u05d5\u05d2\u05d9\u05d9\u05ea DISA ( Defense Information Systems Agency ).","og_url":"https:\/\/www.genie.co.il\/en\/products\/protection-computing-system\/","og_site_name":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd","article_publisher":"https:\/\/www.facebook.com\/genie.support","article_modified_time":"2024-05-23T16:48:41+00:00","og_image":[{"width":400,"height":368,"url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/12\/g-icon_spam1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@geniesupport","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.genie.co.il\/products\/protection-computing-system\/","url":"https:\/\/www.genie.co.il\/products\/protection-computing-system\/","name":"\u05d4\u05e7\u05e9\u05d7\u05ea \u05de\u05e2\u05e8\u05da \u05d4\u05de\u05d7\u05e9\u05d5\u05d1 \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9 - \u05de\u05d1\u05d5\u05e1\u05e1 \u05de\u05ea\u05d5\u05d3\u05d5\u05dc\u05d5\u05d2\u05d9\u05d9\u05ea DISA","isPartOf":{"@id":"https:\/\/www.genie.co.il\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.genie.co.il\/products\/protection-computing-system\/#primaryimage"},"image":{"@id":"https:\/\/www.genie.co.il\/products\/protection-computing-system\/#primaryimage"},"thumbnailUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/12\/g-icon_spam1.png","datePublished":"2021-06-20T07:09:51+00:00","dateModified":"2024-05-23T16:48:41+00:00","description":"\u05d7\u05d1\u05e8\u05ea genie \u05d4\u05e2\u05de\u05d9\u05e7\u05d4 \u05d0\u05ea \u05d4\u05d9\u05d3\u05e2 \u05e9\u05dc\u05d4 \u05d1\u05db\u05dc \u05d4\u05e0\u05d5\u05d2\u05e2 \u05dc\u05d4\u05e7\u05e9\u05d7\u05ea \u05de\u05e2\u05e8\u05da \u05d4\u05de\u05d7\u05e9\u05d5\u05d1 , \u05ea\u05d5\u05da \u05d4\u05ea\u05d1\u05e1\u05e1\u05d5\u05ea \u05e2\u05dc \u05de\u05ea\u05d5\u05d3\u05d5\u05dc\u05d5\u05d2\u05d9\u05d9\u05ea DISA ( Defense Information Systems Agency ).","breadcrumb":{"@id":"https:\/\/www.genie.co.il\/products\/protection-computing-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.genie.co.il\/products\/protection-computing-system\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.genie.co.il\/products\/protection-computing-system\/#primaryimage","url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/12\/g-icon_spam1.png","contentUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/12\/g-icon_spam1.png","width":400,"height":368,"caption":"\u05d4\u05d2\u05e0\u05d4 \u05de\u05d5\u05d9\u05e8\u05d5\u05e1 \u05db\u05d5\u05e4\u05e8 - \u05d2'\u05d9\u05e0\u05d9 \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1"},{"@type":"BreadcrumbList","@id":"https:\/\/www.genie.co.il\/products\/protection-computing-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1","item":"https:\/\/www.genie.co.il\/"},{"@type":"ListItem","position":2,"name":"\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05de\u05d7\u05e9\u05d5\u05d1 \u05dc\u05e2\u05e1\u05e7\u05d9\u05dd","item":"https:\/\/www.genie.co.il\/products\/"},{"@type":"ListItem","position":3,"name":"\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2","item":"https:\/\/www.genie.co.il\/information-security\/"},{"@type":"ListItem","position":4,"name":"\u05d4\u05e7\u05e9\u05d7\u05ea \u05de\u05e2\u05e8\u05da \u05d4\u05de\u05d7\u05e9\u05d5\u05d1"}]},{"@type":"WebSite","@id":"https:\/\/www.genie.co.il\/#website","url":"https:\/\/www.genie.co.il\/","name":"genie computing services for businesses","description":"","publisher":{"@id":"https:\/\/www.genie.co.il\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.genie.co.il\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.genie.co.il\/#organization","name":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1","alternateName":"\u05d2'\u05d9\u05e0\u05d9","url":"https:\/\/www.genie.co.il\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.genie.co.il\/#\/schema\/logo\/image\/","url":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/10\/logo-genie.png","contentUrl":"https:\/\/www.genie.co.il\/wp-content\/uploads\/2018\/10\/logo-genie.png","width":190,"height":66,"caption":"genie \u05e9\u05d9\u05e8\u05d5\u05ea\u05d9 \u05de\u05d7\u05e9\u05d5\u05d1"},"image":{"@id":"https:\/\/www.genie.co.il\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/genie.support","https:\/\/x.com\/geniesupport","https:\/\/www.instagram.com\/genie.computing.services\/","https:\/\/www.linkedin.com\/company\/genie\/","https:\/\/www.youtube.com\/user\/computingservices"]}]}},"_links":{"self":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/products\/14372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/products"}],"about":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/types\/products"}],"author":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/products\/14372\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/media\/8742"}],"wp:attachment":[{"href":"https:\/\/www.genie.co.il\/en\/wp-json\/wp\/v2\/media?parent=14372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}