{"id":800,"date":"2023-12-19T09:57:15","date_gmt":"2023-12-19T09:57:15","guid":{"rendered":"https:\/\/www.kali.co.il\/en\/?page_id=800"},"modified":"2025-12-23T06:41:13","modified_gmt":"2025-12-23T06:41:13","slug":"information-security","status":"publish","type":"page","link":"https:\/\/www.kali.co.il\/en\/information-security\/","title":{"rendered":"Information security"},"content":{"rendered":"<h2>Information security at Kali<\/h2>\r\n<p>Computerized information systems are a pivotal, key component of the company\u2019s organizational infrastructure and support its business activity. The company\u2019s information systems, data and computerized information form a vital asset which must be protected against exposures and\/or damages which could be detrimental to the company\u2019s goals, objectives and ongoing management or to the privacy of the information\u2019s subjects.<\/p>\r\n<p>We at Kali Group ascribe great importance to protecting the privacy of our customers and employees.<\/p>\r\n<p>We expend considerable resources on information security management, so that our systems comply with all standardization sections and with the required regulation as regards information security, protection of privacy and protection of sensitive information.<\/p>\r\n<p>The company, being a \u2018holder\u2019 of databases as such term is defined in the Protection of Privacy Law, takes action in connection with the databases of which it is deemed a \u2018holder\u2019 within the framework of its provision of its services to its customers.<\/p>\r\n<p>&nbsp;<\/p>\r\n<p><a href=\"https:\/\/www.kali.co.il\/en\/information-security-policy\/\"><strong>To read Kali\u2019s full information security policy document &gt;&gt;<\/strong><\/a><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><strong><u>ISO 27001<\/u><\/strong> \u2013 This year, Kali Group has successfully completed its qualification for the ISO27001 international security standard. The security standard is implemented on the company\u2019s management systems. The standard was adopted out of a commitment to protect the privacy of our customers\u2019 information.<\/p>\r\n<p>&nbsp;<\/p>\r\n<p><strong>What is the ISO 27001 standard?<\/strong><\/p>\r\n<p>ISO27001 is an international standard for information security management. The standard was originally published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).<\/p>\r\n<p>It is an international standard concerned with information security management, and serves as a model for the construction, implementation, operation, monitoring, review, maintenance and enhancement of the information security management system, managing the security of assets such as financial information, intellectual property, employee information, customer information or information provided to a third party, and its purpose is to help us make out information assets more secure.<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-902\" src=\"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2025\/12\/iso-2026.png\" alt=\"\" width=\"605\" height=\"858\" srcset=\"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2025\/12\/iso-2026.png 605w, https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2025\/12\/iso-2026-212x300.png 212w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>Information security at Kali Computerized information systems are a pivotal, key component of the company\u2019s organizational infrastructure and support its business activity. The company\u2019s information systems, data and computerized information form a vital asset which must be protected against exposures and\/or damages which could be detrimental to the company\u2019s goals, objectives and ongoing management or [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-800","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information security - english kali site<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kali.co.il\/en\/information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information security - english kali site\" \/>\n<meta property=\"og:description\" content=\"Information security at Kali Computerized information systems are a pivotal, key component of the company\u2019s organizational infrastructure and support its business activity. The company\u2019s information systems, data and computerized information form a vital asset which must be protected against exposures and\/or damages which could be detrimental to the company\u2019s goals, objectives and ongoing management or [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kali.co.il\/en\/information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"english kali site\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-23T06:41:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2025\/12\/iso-2026.png\" \/>\n\t<meta property=\"og:image:width\" content=\"605\" \/>\n\t<meta property=\"og:image:height\" content=\"858\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.kali.co.il\/en\/information-security\/\",\"url\":\"https:\/\/www.kali.co.il\/en\/information-security\/\",\"name\":\"Information security - english kali site\",\"isPartOf\":{\"@id\":\"https:\/\/www.kali.co.il\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.kali.co.il\/en\/information-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.kali.co.il\/en\/information-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2025\/12\/iso-2026.png\",\"datePublished\":\"2023-12-19T09:57:15+00:00\",\"dateModified\":\"2025-12-23T06:41:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.kali.co.il\/en\/information-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.kali.co.il\/en\/information-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kali.co.il\/en\/information-security\/#primaryimage\",\"url\":\"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2025\/12\/iso-2026.png\",\"contentUrl\":\"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2025\/12\/iso-2026.png\",\"width\":605,\"height\":858},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.kali.co.il\/en\/information-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.kali.co.il\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.kali.co.il\/en\/#website\",\"url\":\"https:\/\/www.kali.co.il\/en\/\",\"name\":\"english kali site\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.kali.co.il\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.kali.co.il\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.kali.co.il\/en\/#organization\",\"name\":\"english kali site\",\"url\":\"https:\/\/www.kali.co.il\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kali.co.il\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2022\/11\/cropped-main_logo_kali.png\",\"contentUrl\":\"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2022\/11\/cropped-main_logo_kali.png\",\"width\":249,\"height\":85,\"caption\":\"english kali site\"},\"image\":{\"@id\":\"https:\/\/www.kali.co.il\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information security - english kali site","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kali.co.il\/en\/information-security\/","og_locale":"en_US","og_type":"article","og_title":"Information security - english kali site","og_description":"Information security at Kali Computerized information systems are a pivotal, key component of the company\u2019s organizational infrastructure and support its business activity. The company\u2019s information systems, data and computerized information form a vital asset which must be protected against exposures and\/or damages which could be detrimental to the company\u2019s goals, objectives and ongoing management or [&hellip;]","og_url":"https:\/\/www.kali.co.il\/en\/information-security\/","og_site_name":"english kali site","article_modified_time":"2025-12-23T06:41:13+00:00","og_image":[{"width":605,"height":858,"url":"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2025\/12\/iso-2026.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.kali.co.il\/en\/information-security\/","url":"https:\/\/www.kali.co.il\/en\/information-security\/","name":"Information security - english kali site","isPartOf":{"@id":"https:\/\/www.kali.co.il\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.kali.co.il\/en\/information-security\/#primaryimage"},"image":{"@id":"https:\/\/www.kali.co.il\/en\/information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2025\/12\/iso-2026.png","datePublished":"2023-12-19T09:57:15+00:00","dateModified":"2025-12-23T06:41:13+00:00","breadcrumb":{"@id":"https:\/\/www.kali.co.il\/en\/information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kali.co.il\/en\/information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kali.co.il\/en\/information-security\/#primaryimage","url":"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2025\/12\/iso-2026.png","contentUrl":"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2025\/12\/iso-2026.png","width":605,"height":858},{"@type":"BreadcrumbList","@id":"https:\/\/www.kali.co.il\/en\/information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kali.co.il\/en\/"},{"@type":"ListItem","position":2,"name":"Information security"}]},{"@type":"WebSite","@id":"https:\/\/www.kali.co.il\/en\/#website","url":"https:\/\/www.kali.co.il\/en\/","name":"english kali site","description":"","publisher":{"@id":"https:\/\/www.kali.co.il\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kali.co.il\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.kali.co.il\/en\/#organization","name":"english kali site","url":"https:\/\/www.kali.co.il\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kali.co.il\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2022\/11\/cropped-main_logo_kali.png","contentUrl":"https:\/\/www.kali.co.il\/en\/wp-content\/uploads\/sites\/2\/2022\/11\/cropped-main_logo_kali.png","width":249,"height":85,"caption":"english kali site"},"image":{"@id":"https:\/\/www.kali.co.il\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.kali.co.il\/en\/wp-json\/wp\/v2\/pages\/800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kali.co.il\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kali.co.il\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kali.co.il\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kali.co.il\/en\/wp-json\/wp\/v2\/comments?post=800"}],"version-history":[{"count":10,"href":"https:\/\/www.kali.co.il\/en\/wp-json\/wp\/v2\/pages\/800\/revisions"}],"predecessor-version":[{"id":901,"href":"https:\/\/www.kali.co.il\/en\/wp-json\/wp\/v2\/pages\/800\/revisions\/901"}],"wp:attachment":[{"href":"https:\/\/www.kali.co.il\/en\/wp-json\/wp\/v2\/media?parent=800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}