{"id":620,"date":"2015-10-08T14:01:10","date_gmt":"2015-10-08T11:01:10","guid":{"rendered":"http:\/\/www.axiomsec.com\/?page_id=620&#038;lang=he"},"modified":"2016-01-28T10:52:42","modified_gmt":"2016-01-28T08:52:42","slug":"%d7%a9%d7%a8%d7%95%d7%aa%d7%99%d7%9d","status":"publish","type":"page","link":"https:\/\/www.axiomsec.com\/?page_id=620&lang=he","title":{"rendered":"\u05e9\u05d9\u05e8\u05d5\u05ea\u05d9\u05dd"},"content":{"rendered":"<p>text \u00a0 \u00a0text \u00a0 \u00a0 text \u00a0 \u00a0text \u00a0 \u00a0 text<\/p>\n<p>text text text<\/p>\n<ul class=\"posts-grid row-fluid unstyled  ul-item-0\"><li class=\"span4 list-item-1\"><figure class=\"featured-thumbnail thumbnail\"><a href=\"https:\/\/www.axiomsec.com\/wp-content\/uploads\/risk-management.jpg\" title=\"RISK ANALYSIS\" rel=\"prettyPhoto-1125267662\"><img decoding=\"async\"  src=\"https:\/\/www.axiomsec.com\/wp-content\/uploads\/risk-management-370x250.jpg\" alt=\"RISK ANALYSIS\" \/><span class=\"zoom-icon\"><\/span><\/a><\/figure><div class=\"clear\"><\/div><h5><a href=\"https:\/\/www.axiomsec.com\/?services=risk-analysis\" title=\"RISK ANALYSIS\">RISK ANALYSIS<\/a><\/h5><div class=\"post_meta\"><span class=\"post_category\"><\/span><span class=\"post_date\"><time datetime=\"2014-08-09T23:02:28\">August 9, 2014<\/time><\/span><span class=\"post_author\"><em> by <\/em><a href=\"https:\/\/www.axiomsec.com\/?author=1\">admin<\/a><\/span><span class=\"post_comment\"><a href=\"https:\/\/www.axiomsec.com\/?services=risk-analysis\" class=\"comments_link\">0 Comments<\/a><\/span><\/div><p class=\"excerpt\">1)\u00a0Risk assessment:\u00a0 The full range of activities carried out to assess and grade the threats&hellip;<\/p><a href=\"https:\/\/www.axiomsec.com\/?services=risk-analysis\" class=\"btn btn-primary\" title=\"RISK ANALYSIS\">Read more<\/a><\/li><li class=\"span4 list-item-2\"><div class=\"clear\"><\/div><h5><a href=\"https:\/\/www.axiomsec.com\/?services=security-surveys\" title=\"SECURITY SURVEYS\">SECURITY SURVEYS<\/a><\/h5><div class=\"post_meta\"><span class=\"post_category\"><\/span><span class=\"post_date\"><time datetime=\"2014-08-08T23:09:02\">August 8, 2014<\/time><\/span><span class=\"post_author\"><em> by <\/em><a href=\"https:\/\/www.axiomsec.com\/?author=1\">admin<\/a><\/span><span class=\"post_comment\"><a href=\"https:\/\/www.axiomsec.com\/?services=security-surveys\" class=\"comments_link\">0 Comments<\/a><\/span><\/div><p class=\"excerpt\"><\/p><a href=\"https:\/\/www.axiomsec.com\/?services=security-surveys\" class=\"btn btn-primary\" title=\"SECURITY SURVEYS\">Read more<\/a><\/li><li class=\"span4 list-item-3\"><div class=\"clear\"><\/div><h5><a href=\"https:\/\/www.axiomsec.com\/?services=risk-mitigation-plan-surveys\" title=\"RISK MITIGATION &#038; MASTER PLANS\">RISK MITIGATION &#038; MASTER PLANS<\/a><\/h5><div class=\"post_meta\"><span class=\"post_category\"><\/span><span class=\"post_date\"><time datetime=\"2014-08-07T23:08:01\">August 7, 2014<\/time><\/span><span class=\"post_author\"><em> by <\/em><a href=\"https:\/\/www.axiomsec.com\/?author=1\">admin<\/a><\/span><span class=\"post_comment\"><a href=\"https:\/\/www.axiomsec.com\/?services=risk-mitigation-plan-surveys\" class=\"comments_link\">0 Comments<\/a><\/span><\/div><p class=\"excerpt\"><\/p><a href=\"https:\/\/www.axiomsec.com\/?services=risk-mitigation-plan-surveys\" class=\"btn btn-primary\" title=\"RISK MITIGATION &#038; MASTER PLANS\">Read more<\/a><\/li><\/ul><!-- .posts-grid (end) --><ul class=\"posts-grid row-fluid unstyled  ul-item-1\"><li class=\"span4 list-item-1\"><div class=\"clear\"><\/div><h5><a href=\"https:\/\/www.axiomsec.com\/?services=routine-manuals-regulation\" title=\"DETAILED SECURITY MANUALS &#038; PROCEDURES\">DETAILED SECURITY MANUALS &#038; PROCEDURES<\/a><\/h5><div class=\"post_meta\"><span class=\"post_category\"><\/span><span class=\"post_date\"><time datetime=\"2014-08-06T23:09:43\">August 6, 2014<\/time><\/span><span class=\"post_author\"><em> by <\/em><a href=\"https:\/\/www.axiomsec.com\/?author=1\">admin<\/a><\/span><span class=\"post_comment\"><a href=\"https:\/\/www.axiomsec.com\/?services=routine-manuals-regulation\" class=\"comments_link\">0 Comments<\/a><\/span><\/div><p class=\"excerpt\"><\/p><a href=\"https:\/\/www.axiomsec.com\/?services=routine-manuals-regulation\" class=\"btn btn-primary\" title=\"DETAILED SECURITY MANUALS &#038; PROCEDURES\">Read more<\/a><\/li><li class=\"span4 list-item-2\"><div class=\"clear\"><\/div><h5><a href=\"https:\/\/www.axiomsec.com\/?services=emergency-contingency-plan\" title=\"EMERGENCY &#038; CONTINGENCY PLAN\">EMERGENCY &#038; CONTINGENCY PLAN<\/a><\/h5><div class=\"post_meta\"><span class=\"post_category\"><\/span><span class=\"post_date\"><time datetime=\"2014-08-05T23:10:10\">August 5, 2014<\/time><\/span><span class=\"post_author\"><em> by <\/em><a href=\"https:\/\/www.axiomsec.com\/?author=1\">admin<\/a><\/span><span class=\"post_comment\"><a href=\"https:\/\/www.axiomsec.com\/?services=emergency-contingency-plan\" class=\"comments_link\">0 Comments<\/a><\/span><\/div><p class=\"excerpt\"><\/p><a href=\"https:\/\/www.axiomsec.com\/?services=emergency-contingency-plan\" class=\"btn btn-primary\" title=\"EMERGENCY &#038; CONTINGENCY PLAN\">Read more<\/a><\/li><li class=\"span4 list-item-3\"><div class=\"clear\"><\/div><h5><a href=\"https:\/\/www.axiomsec.com\/?services=technologies\" title=\"TECHNOLOGIES\">TECHNOLOGIES<\/a><\/h5><div class=\"post_meta\"><span class=\"post_category\"><\/span><span class=\"post_date\"><time datetime=\"2014-08-04T23:10:28\">August 4, 2014<\/time><\/span><span class=\"post_author\"><em> by <\/em><a href=\"https:\/\/www.axiomsec.com\/?author=1\">admin<\/a><\/span><span class=\"post_comment\"><a href=\"https:\/\/www.axiomsec.com\/?services=technologies\" class=\"comments_link\">0 Comments<\/a><\/span><\/div><p class=\"excerpt\">The analysis of the technical means (both physical and electronic) is required in order to&hellip;<\/p><a href=\"https:\/\/www.axiomsec.com\/?services=technologies\" class=\"btn btn-primary\" title=\"TECHNOLOGIES\">Read more<\/a><\/li><\/ul><!-- .posts-grid (end) --><ul class=\"posts-grid row-fluid unstyled  ul-item-2\"><li class=\"span4 list-item-1\"><div class=\"clear\"><\/div><h5><a href=\"https:\/\/www.axiomsec.com\/?services=implementation-project-management\" title=\"SECURITY LAYOUT IMPLEMENTATION &#038; PROJECT MANAGEMENT\">SECURITY LAYOUT IMPLEMENTATION &#038; PROJECT MANAGEMENT<\/a><\/h5><div class=\"post_meta\"><span class=\"post_category\"><\/span><span class=\"post_date\"><time datetime=\"2014-08-03T23:11:56\">August 3, 2014<\/time><\/span><span class=\"post_author\"><em> by <\/em><a href=\"https:\/\/www.axiomsec.com\/?author=1\">admin<\/a><\/span><span class=\"post_comment\"><a href=\"https:\/\/www.axiomsec.com\/?services=implementation-project-management\" class=\"comments_link\">0 Comments<\/a><\/span><\/div><p class=\"excerpt\"><\/p><a href=\"https:\/\/www.axiomsec.com\/?services=implementation-project-management\" class=\"btn btn-primary\" title=\"SECURITY LAYOUT IMPLEMENTATION &#038; PROJECT MANAGEMENT\">Read more<\/a><\/li><li class=\"span4 list-item-2\"><figure class=\"featured-thumbnail thumbnail\"><a href=\"https:\/\/www.axiomsec.com\/wp-content\/uploads\/training.jpg\" title=\"TRAINING\" rel=\"prettyPhoto-1125267662\"><img decoding=\"async\"  src=\"https:\/\/www.axiomsec.com\/wp-content\/uploads\/training-370x250.jpg\" alt=\"TRAINING\" \/><span class=\"zoom-icon\"><\/span><\/a><\/figure><div class=\"clear\"><\/div><h5><a href=\"https:\/\/www.axiomsec.com\/?services=training-2\" title=\"TRAINING\">TRAINING<\/a><\/h5><div class=\"post_meta\"><span class=\"post_category\"><\/span><span class=\"post_date\"><time datetime=\"2014-08-02T23:12:09\">August 2, 2014<\/time><\/span><span class=\"post_author\"><em> by <\/em><a href=\"https:\/\/www.axiomsec.com\/?author=1\">admin<\/a><\/span><span class=\"post_comment\"><a href=\"https:\/\/www.axiomsec.com\/?services=training-2\" class=\"comments_link\">0 Comments<\/a><\/span><\/div><p class=\"excerpt\">The human resource is the foundation upon which the security system is based. Security managers,&hellip;<\/p><a href=\"https:\/\/www.axiomsec.com\/?services=training-2\" class=\"btn btn-primary\" title=\"TRAINING\">Read more<\/a><\/li><li class=\"span4 list-item-3\"><div class=\"clear\"><\/div><h5><a href=\"https:\/\/www.axiomsec.com\/?services=maintenance-audits-drills\" title=\"AUDITS , EXERCISES &#038; DRILLS\">AUDITS , EXERCISES &#038; DRILLS<\/a><\/h5><div class=\"post_meta\"><span class=\"post_category\"><\/span><span class=\"post_date\"><time datetime=\"2014-08-01T23:12:20\">August 1, 2014<\/time><\/span><span class=\"post_author\"><em> by <\/em><a href=\"https:\/\/www.axiomsec.com\/?author=1\">admin<\/a><\/span><span class=\"post_comment\"><a href=\"https:\/\/www.axiomsec.com\/?services=maintenance-audits-drills\" class=\"comments_link\">0 Comments<\/a><\/span><\/div><p class=\"excerpt\"><\/p><a href=\"https:\/\/www.axiomsec.com\/?services=maintenance-audits-drills\" class=\"btn btn-primary\" title=\"AUDITS , EXERCISES &#038; DRILLS\">Read more<\/a><\/li><\/ul><\/ul><!-- .posts-grid (end) -->\n","protected":false},"excerpt":{"rendered":"<p>text \u00a0 \u00a0text \u00a0 \u00a0 text \u00a0 \u00a0text \u00a0 \u00a0 text text text text<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-fullwidth.php","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/pages\/620"}],"collection":[{"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=620"}],"version-history":[{"count":2,"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/pages\/620\/revisions"}],"predecessor-version":[{"id":817,"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=\/wp\/v2\/pages\/620\/revisions\/817"}],"wp:attachment":[{"href":"https:\/\/www.axiomsec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}