{"id":604,"date":"2024-05-14T14:26:21","date_gmt":"2024-05-14T14:26:21","guid":{"rendered":"https:\/\/ivsr.si\/?page_id=604"},"modified":"2024-05-28T16:43:04","modified_gmt":"2024-05-28T16:43:04","slug":"varnost-na-kljuc","status":"publish","type":"page","link":"https:\/\/ivsr.si\/en\/security-on-the-key\/","title":{"rendered":"Turnkey security"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"604\" class=\"elementor elementor-604\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8676aee elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"8676aee\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b160bd6\" data-id=\"b160bd6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a6f9212 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"a6f9212\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 15-07-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Turnkey security<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54749c5 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"54749c5\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 15-07-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Modern security threats are characterized by their hybridity and variability.<span class=\"Apple-converted-space\">\u00a0 <\/span><i>Turnkey security <\/i>solutions are designed to provide comprehensive and integrated measures that systematically address of security issues in each organization. From the prevention of violence to the establishment of reliable information security systems, <i>Turnkey security <\/i>solutions provide holistic treatment of all your security needs.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bbe19d3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bbe19d3\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-68701c6\" data-id=\"68701c6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8b6c09a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8b6c09a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7191f9d elementor-invisible\" data-id=\"7191f9d\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61de3f3 elementor-widget elementor-widget-elementskit-header-info\" data-id=\"61de3f3\" data-element_type=\"widget\" data-widget_type=\"elementskit-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >        <ul class=\"ekit-header-info\">\n                                    <li>\n                            <a > \n                                <i aria-hidden=\"true\" class=\"icon icon-shield11\"><\/i>                                Prevention of violence and AMOK situations in the organization                            <\/a>\n                        <\/li>\n\n                            <\/ul>\n        <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de57439 elementor-widget elementor-widget-text-editor\" data-id=\"de57439\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"thread-list-item-message-column\"><div class=\"message ql-snow\"><div class=\"ql-editor\"><p>Ensure a safe work environment with a certified violence prevention program in the organization.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b64a221 elementor-invisible elementor-widget elementor-widget-button\" data-id=\"b64a221\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ivsr.si\/en\/security-on-the-key\/preventing-violence-and-rampant-situations\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Read more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-0c61b6c elementor-invisible\" data-id=\"0c61b6c\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:500}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-974d6e5 elementor-widget elementor-widget-elementskit-header-info\" data-id=\"974d6e5\" data-element_type=\"widget\" data-widget_type=\"elementskit-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >        <ul class=\"ekit-header-info\">\n                                    <li>\n                            <a > \n                                <i aria-hidden=\"true\" class=\"icon icon-database1\"><\/i>                                Security analysis and risk assessment                            <\/a>\n                        <\/li>\n\n                            <\/ul>\n        <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a262f47 elementor-widget elementor-widget-text-editor\" data-id=\"a262f47\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"thread-list-item-message-column\"><div><div class=\"message ql-snow\"><div class=\"ql-editor\"><p>The threat landscape is constantly changing and with it your organization's exposure. Protect your assets with periodic security system audits and upgrades.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba927d1 elementor-invisible elementor-widget elementor-widget-button\" data-id=\"ba927d1\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ivsr.si\/en\/security-on-the-key\/security-systems-assessment-and-risk-assessment\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Read more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5901588 elementor-invisible\" data-id=\"5901588\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:600}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c1a8fb elementor-widget elementor-widget-elementskit-header-info\" data-id=\"3c1a8fb\" data-element_type=\"widget\" data-widget_type=\"elementskit-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >        <ul class=\"ekit-header-info\">\n                                    <li>\n                            <a > \n                                <i aria-hidden=\"true\" class=\"icon icon-cog\"><\/i>                                Establishment of an integral security system                            <\/a>\n                        <\/li>\n\n                            <\/ul>\n        <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3275d8 elementor-widget elementor-widget-text-editor\" data-id=\"a3275d8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"thread-list-item-message-column\"><div><div class=\"message ql-snow\"><div class=\"ql-editor\"><p>Develop and implement a holistic security system that protects all aspects of your organization's operations and business and gives you a competitive advantage.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cff8f4a elementor-invisible elementor-widget elementor-widget-button\" data-id=\"cff8f4a\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ivsr.si\/en\/integralni-varnostni-sistem\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Read more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2d2fcc8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d2fcc8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b06ddaa elementor-invisible\" data-id=\"b06ddaa\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c79490 elementor-widget elementor-widget-elementskit-header-info\" data-id=\"1c79490\" data-element_type=\"widget\" data-widget_type=\"elementskit-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >        <ul class=\"ekit-header-info\">\n                                    <li>\n                            <a > \n                                <i aria-hidden=\"true\" class=\"icon icon-server-2\"><\/i>                                Establishing a cyber security system                            <\/a>\n                        <\/li>\n\n                            <\/ul>\n        <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81ee445 elementor-widget elementor-widget-text-editor\" data-id=\"81ee445\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Ensure the organization's holistic security in cyberspace and prevent unauthorized information leakage.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6606b7f elementor-invisible elementor-widget elementor-widget-button\" data-id=\"6606b7f\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ivsr.si\/en\/security-on-the-key\/cyber-security\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Read more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4085f34 elementor-invisible\" data-id=\"4085f34\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:500}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d7c54d elementor-widget elementor-widget-elementskit-header-info\" data-id=\"4d7c54d\" data-element_type=\"widget\" data-widget_type=\"elementskit-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >        <ul class=\"ekit-header-info\">\n                                    <li>\n                            <a > \n                                <i aria-hidden=\"true\" class=\"icon icon-file-1\"><\/i>                                Establishing an internal control system                            <\/a>\n                        <\/li>\n\n                            <\/ul>\n        <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-369a067 elementor-widget elementor-widget-text-editor\" data-id=\"369a067\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Prevent deviant behavior by employees, ensure appropriate investigative protocols and establish an appropriate system of sanctioning violations that prevents the occurrence of direct and indirect damage.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59a21c4 elementor-invisible elementor-widget elementor-widget-button\" data-id=\"59a21c4\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ivsr.si\/en\/security-on-the-key\/system-of-internal-control\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Read more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d0f3f48 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d0f3f48\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-402affe\" data-id=\"402affe\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52a1759 elementor-widget__width-auto elementor-invisible elementor-widget elementor-widget-elementskit-header-info\" data-id=\"52a1759\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"elementskit-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >        <ul class=\"ekit-header-info\">\n                                    <li>\n                            <a > \n                                                                Why?                            <\/a>\n                        <\/li>\n\n                            <\/ul>\n        <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75bad8c elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"75bad8c\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title text_fill\"><span><span>Why choose Turnkey Security solutions?<\/h2><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c90efdd elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"c90efdd\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>In solutions <i>Turnkey security <\/i>we have combined scientific knowledge, good security practices and our many years of experience in various aspects of ensuring security.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e738e2b elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"e738e2b\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-73195cb\" data-id=\"73195cb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ef0452f elementor-view-framed elementor-position-left elementor-shape-circle elementor-mobile-position-top elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"ef0452f\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/ivsr.si\/wp-content\/plugins\/elementor\/assets\/css\/widget-icon-box.min.css\">\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-management\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tExperienced professionals\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tThe Institute for Security and Strategic Research brings together experts with decades of experience in the field of ensuring national, organizational and personal security. \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a311e67\" data-id=\"a311e67\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d10840 elementor-view-framed elementor-position-left elementor-shape-circle elementor-mobile-position-top elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"4d10840\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-slideshare\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAdaptability\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAll our solutions are adaptable to the specific needs of each organization we work with. \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b5edeeb elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"b5edeeb\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1cc3bfc\" data-id=\"1cc3bfc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2b985b0 elementor-view-framed elementor-position-left elementor-shape-circle elementor-mobile-position-top elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"2b985b0\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-settings\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tIntegration\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tA holistic approach ensures that all our solutions are integrated into existing organizational processes without having a negative impact on them.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9152d94\" data-id=\"9152d94\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c4e17ef elementor-view-framed elementor-position-left elementor-shape-circle elementor-mobile-position-top elementor-vertical-align-top elementor-widget elementor-widget-icon-box\" data-id=\"c4e17ef\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-support1\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tOngoing support\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tSecurity is not a service, security is a process. We provide you with ongoing support and regular upgrades.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-39d7bd7 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"39d7bd7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d6176a8 elementor-invisible\" data-id=\"d6176a8\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-49c66f4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"49c66f4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e074fef\" data-id=\"e074fef\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-792b35a elementor-widget__width-auto elementor-invisible elementor-widget elementor-widget-elementskit-header-info\" data-id=\"792b35a\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"elementskit-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" >        <ul class=\"ekit-header-info\">\n                                    <li>\n                            <a > \n                                                                How to start?                            <\/a>\n                        <\/li>\n\n                            <\/ul>\n        <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0cdde9 elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"d0cdde9\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_center   ekit_heading_tablet-   ekit_heading_mobile-\"><h2 class=\"ekit-heading--title elementskit-section-title text_fill\"><span><span>Are you ready to upgrade your organization&#039;s security?<\/h2><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2fd10f elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"d2fd10f\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Contact us and learn how our turnkey solutions can help ensure a secure and resilient business environment.<span class=\"Apple-converted-space\">\u00a0 \u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af1b495 elementor-widget__width-auto elementor-invisible elementor-widget elementor-widget-button\" data-id=\"af1b495\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ivsr.si\/en\/send-inquiry\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Turnkey Security Modern security threats are characterized by their hybridity and variability. Turnkey Security solutions are designed to provide comprehensive and integrated measures that are adapted to the systematic solution of security issues in any organization. From the prevention of violence to the establishment of reliable information security systems, Turnkey Security solutions provide comprehensive treatment of all your security needs. Prevention [\u2026]<\/p>","protected":false},"author":1,"featured_media":875,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-604","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Varnost na klju\u010d - In\u0161titut za Varnost in Strate\u0161ke Raziskave<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ivsr.si\/en\/security-on-the-key\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Varnost na klju\u010d - In\u0161titut za Varnost in Strate\u0161ke Raziskave\" \/>\n<meta property=\"og:description\" content=\"Varnost na klju\u010d Sodobne varnostne gro\u017enje zaznamuje njihova hibridnost in spremenljivost. Re\u0161itve\u00a0 Varnost na klju\u010d so oblikovane tako, da zagotavljajo celovite in integrirane ukrepe, ki so prilagojeni sistemati\u010dnemu re\u0161evanju varnostnih vpra\u0161anj v vsaki organizaciji. Od prepre\u010devanja nasilja, do vzpostavitve zanesljivih sistemov informacijske varnosti, re\u0161itve Varnost na klju\u010d zagotavljajo celovito obravnavo vseh va\u0161ih varnostnih potreb. Prepre\u010devanje [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ivsr.si\/en\/security-on-the-key\/\" \/>\n<meta property=\"og:site_name\" content=\"IVSR\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-28T16:43:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/ivsr-featured-image.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ivsr.si\/varnost-na-kljuc\/\",\"url\":\"https:\/\/ivsr.si\/varnost-na-kljuc\/\",\"name\":\"Varnost na klju\u010d - In\u0161titut za Varnost in Strate\u0161ke Raziskave\",\"isPartOf\":{\"@id\":\"https:\/\/ivsr.si\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ivsr.si\/varnost-na-kljuc\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ivsr.si\/varnost-na-kljuc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/ivsr-featured-image.jpeg\",\"datePublished\":\"2024-05-14T14:26:21+00:00\",\"dateModified\":\"2024-05-28T16:43:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ivsr.si\/varnost-na-kljuc\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ivsr.si\/varnost-na-kljuc\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ivsr.si\/varnost-na-kljuc\/#primaryimage\",\"url\":\"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/ivsr-featured-image.jpeg\",\"contentUrl\":\"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/ivsr-featured-image.jpeg\",\"width\":1200,\"height\":628,\"caption\":\"Screenshot\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ivsr.si\/varnost-na-kljuc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ivsr.si\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Varnost na klju\u010d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ivsr.si\/#website\",\"url\":\"https:\/\/ivsr.si\/\",\"name\":\"IVSR\",\"description\":\"In\u0161titut za Varnost in Strate\u0161ke Raziskave\",\"publisher\":{\"@id\":\"https:\/\/ivsr.si\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ivsr.si\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ivsr.si\/#organization\",\"name\":\"IVSR\",\"url\":\"https:\/\/ivsr.si\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ivsr.si\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/IVSR_logo_final.png\",\"contentUrl\":\"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/IVSR_logo_final.png\",\"width\":3372,\"height\":1361,\"caption\":\"IVSR\"},\"image\":{\"@id\":\"https:\/\/ivsr.si\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Varnost na klju\u010d - In\u0161titut za Varnost in Strate\u0161ke Raziskave","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ivsr.si\/en\/security-on-the-key\/","og_locale":"en_GB","og_type":"article","og_title":"Varnost na klju\u010d - In\u0161titut za Varnost in Strate\u0161ke Raziskave","og_description":"Varnost na klju\u010d Sodobne varnostne gro\u017enje zaznamuje njihova hibridnost in spremenljivost. Re\u0161itve\u00a0 Varnost na klju\u010d so oblikovane tako, da zagotavljajo celovite in integrirane ukrepe, ki so prilagojeni sistemati\u010dnemu re\u0161evanju varnostnih vpra\u0161anj v vsaki organizaciji. Od prepre\u010devanja nasilja, do vzpostavitve zanesljivih sistemov informacijske varnosti, re\u0161itve Varnost na klju\u010d zagotavljajo celovito obravnavo vseh va\u0161ih varnostnih potreb. Prepre\u010devanje [&hellip;]","og_url":"https:\/\/ivsr.si\/en\/security-on-the-key\/","og_site_name":"IVSR","article_modified_time":"2024-05-28T16:43:04+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/ivsr-featured-image.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ivsr.si\/varnost-na-kljuc\/","url":"https:\/\/ivsr.si\/varnost-na-kljuc\/","name":"Varnost na klju\u010d - In\u0161titut za Varnost in Strate\u0161ke Raziskave","isPartOf":{"@id":"https:\/\/ivsr.si\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ivsr.si\/varnost-na-kljuc\/#primaryimage"},"image":{"@id":"https:\/\/ivsr.si\/varnost-na-kljuc\/#primaryimage"},"thumbnailUrl":"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/ivsr-featured-image.jpeg","datePublished":"2024-05-14T14:26:21+00:00","dateModified":"2024-05-28T16:43:04+00:00","breadcrumb":{"@id":"https:\/\/ivsr.si\/varnost-na-kljuc\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ivsr.si\/varnost-na-kljuc\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ivsr.si\/varnost-na-kljuc\/#primaryimage","url":"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/ivsr-featured-image.jpeg","contentUrl":"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/ivsr-featured-image.jpeg","width":1200,"height":628,"caption":"Screenshot"},{"@type":"BreadcrumbList","@id":"https:\/\/ivsr.si\/varnost-na-kljuc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ivsr.si\/"},{"@type":"ListItem","position":2,"name":"Varnost na klju\u010d"}]},{"@type":"WebSite","@id":"https:\/\/ivsr.si\/#website","url":"https:\/\/ivsr.si\/","name":"IVSR","description":"In\u0161titut za Varnost in Strate\u0161ke Raziskave","publisher":{"@id":"https:\/\/ivsr.si\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ivsr.si\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/ivsr.si\/#organization","name":"IVSR","url":"https:\/\/ivsr.si\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ivsr.si\/#\/schema\/logo\/image\/","url":"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/IVSR_logo_final.png","contentUrl":"https:\/\/ivsr.si\/wp-content\/uploads\/2024\/05\/IVSR_logo_final.png","width":3372,"height":1361,"caption":"IVSR"},"image":{"@id":"https:\/\/ivsr.si\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/pages\/604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/comments?post=604"}],"version-history":[{"count":31,"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/pages\/604\/revisions"}],"predecessor-version":[{"id":972,"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/pages\/604\/revisions\/972"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/media\/875"}],"wp:attachment":[{"href":"https:\/\/ivsr.si\/en\/wp-json\/wp\/v2\/media?parent=604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}