GEM System has received authorization in the Google Cloud Partner Advantage program
Company GEM System as was officially approved to participate in the program Google Cloud Partner Advantage and successfully completed the process Due Diligence, whose validity is confirmed until the end of the year 2028.
- Partner - Service - CEE (Central and Eastern Europe)
- Sell – CEE
- access the latest Google Cloud Platform technologies and tools,
- possibility to use Priority technical support and Google marketing resources,
- opportunity to participate joint business activities, campaigns and market development programs,
- and especially greater trust from customers and partnerswho are looking for a reliable integrator with a direct connection to Google.
- innovations with a real impact on the performance and efficiency of companies,
- secure and scalable environment for applications and data,
- a the possibility of switching to a modern cloud-first approach.
https://cloud.google.com/find-a-partner/partner/gem-system-a-s
New IT projects, new challenges, new inspiration: our references speak for us
🚀 New IT projects, new challenges, new inspiration: our references speak for us / Every successful project starts with trust – and we value those who give it to us. At GEM System, we have a long history of delivering cutting-edge IT solutions for key players in banking, automotive, energy and public administration. Our new references show how the combination of expertise, technological innovation and reliable delivery brings real value to partners in both the B2B and B2G segments. Take a look at our current projects and find out why market leaders rely on us – all GEM System references
🚀 New IT projects, new challenges, new inspiration: our references speak for us / Every successful project starts with trust – and we value those who give it to us. At GEM System, we have been delivering top-notch IT solutions for key players in banking, automotive, energy and public administration for a long time. Our new references show how the combination of expertise, technological innovation and reliable delivery brings real value to partners in both the B2B and B2G segments. Check out our current projects and find out why market leaders rely on us – all GEM System references
#GEM #System #IT #B2B #B2G #Banking #Automotive #Projects #ITDelivery #EnterpriseSolutions #Innovation #AI
Advanced AI solutions for efficient, secure and scalable integrations – count on GEM System
Reading time >10 min.
GEM System presents advanced AI solutions for efficient, secure and scalable integrations
With a focus on security, compliance, and best practices, we give partners full control over their data and AI results, while a flexible architecture enables rapid deployment and future expansion. GEM System can deliver real value in everyday operations, from accelerating internal processes to optimizing customer interactions to generating accurate analytical recommendations for management. Our solutions combine innovation with proven stability, ensuring clients a competitive advantage, efficiency, and long-term sustainability of their AI deployments.
GEM System is synonymous with the combination of strong integration capabilities, cutting-edge development processes and advanced AI architectures. Thanks to our unique combination of multi-agent orchestration, modular architecture and sophisticated process framework, we are able to provide clients with solutions that truly transform their business. Our AI systems are not only technologically advanced – they are practically usable, secure, auditable and scalable across different departments and processes.
New Cybersecurity Act and NIS2: Top management bears direct responsibility
Reading time ~5 min.
New Cybersecurity Act and NIS2: Top management bears direct responsibility
In recent days, the President of the Czech Republic, Petr Pavel, signed a new law on cybersecurity, which implements the European directive NIS2 (Network and Information Security Directive 2). This law significantly changes the approach to cybersecurity management in the Czech Republic and affects both state institutions and the private sector.
Main changes and impacts of the new legislation
- Binding personal liability of top management
- The law shifts responsibility for cybersecurity directly to the top management of organizations, especially to members of statutory bodies, such as members of the board of directors, executives, members of the supervisory board, or the general director (CEO).
- Responsibility is non-transferable, it cannot be delegated to lower management or external suppliers.
- Risks for non-compliance with obligations can be of the nature of either: financial (fines up to 2% of turnover or hundreds of millions of CZK), So personal (e.g. ban on holding office for up to 5 years).
- Expansion of the scope of the law
- The law will affect 6 to 000 entities throughout the Czech Republic, across all sectors, including not only state organizations, but also hospitals, entities from the energy, transport, food, pharmaceuticals, digital infrastructure, research organizations, and medium-sized and large enterprises.
- The entities are divided into significant a important according to the nature of the services provided and the extent of the impact of their potential failure.
- New requirements for security management (ISMS)
- Organizations will need to have comprehensive information security management systems (ISMS) in place, which will include:
- Assessing risks and implementing appropriate measures to manage them (e.g. data encryption, multi-factor authentication, network segmentation).
- Supply chain security management (e.g. partner verification, contractual security commitments).
- Incident response plan – i.e. specific scenarios of procedures in the event of an attack or threat to the system.
- Regular audits, security tests and record keeping of management activities in the area of security.
- Organizations will need to have comprehensive information security management systems (ISMS) in place, which will include:
- Cybersecurity as part of strategic management
- ISMS now falls under the responsibility of the organization's strategic management, similar to financial management or legal compliance.
- Cybersecurity governance must be regularly discussed at board level and documented. These records can be key evidence in assessing responsibility in the event of an incident.
- Deadlines and effectiveness
- The law was approved by the Chamber of Deputies and, after being signed by the President of the Czech Republic on June 26, 2025, is to be published in the Collection of Laws in August 2025.
- It is to take effect from 1 November 2025, with a transition period of 12 months for the implementation of the necessary measures.
Practical recommendations for organizations
Hook | Description |
1. Identification of responsibilities | Assess whether your organization falls within the scope of the law – as a significant or important entity. |
2. Gap analysis | Conduct an analysis of the current state of security management and prepare an ISMS implementation plan. |
3. Education and leadership responsibility | To familiarize top management with the legal and practical impacts of the new legislation. |
4. Processes and documentation | Ensure that security management is part of management discussions, there is an audit trail and a response plan. |
5. Technical measures | Implement encryption, multi-factor authentication (MFA), logging, regular testing, and security monitoring. |
záver
Cybersecurity law is no longer an IT department issue – it is becoming part of top management risk management. In addition to protecting against real threats such as ransomware attacks, data loss or threats to operational infrastructure, it is also a matter of reputation, legal liability and competitiveness.
Recommended and verified sources
- NUKIB: NIS2 Directive pages
For more information or to prepare your own organization for new responsibilities, you can contact us at sales.
We are building the future of IT with Kubernetes - solutions built on virtualization thanks to containerization with Kubernetes solutions (K8s)
Let yourself be excited by solutions built on almost perfect virtualization thanks to containerization with Kubernetes (K8s). Enjoy simpler and more visible application release, along with a dramatic improvement in the reliability of running the solution as a whole.
Are you interested in our offer? Contact us
GDPR is not just compliance. It's our approach.
Reading time >5 min.
🔐 GDPR is not just compliance. It's our approach.
In a world where data means trust, it's clear: it's not enough to have technology. You also need rules. And at GEM System, these aren't just on paper:
🔸 Personal data protection is integrated into every project - from system integration to identity management to development and BI.
🔸 We see GDPR as an advantage - it helps us build systems that are robust, secure and transparent from the ground up.
🔸 Our teams know not only the technology, but also the legal framework. And they know what it means to work with data responsibly - for us and for our clients.Our customers have the confidence that we know what we are doing – and why we are doing it right.
💡 We work with personal data the way we would want someone to work with ours.Find out how we handle data, or ask us directly:
👉 www.gemsystem.cz/gdpr
📧 info@gemsystem.cz
www.gem.cz
www.gem.cz/en
www.gem.cz/de#GDPR #databezpeci #GEMSystem #ITsDdpovednosti #B2B #B2G #cybersecurity #trustbydesign
Are you interested in our offer? Contact us
GEM System announces re-qualification and acquisition of TISAX certification in 2025
Reading time ~4 min.
GEM System announces re-qualification and acquisition of TISAX certification in 2025
TISAX represents a uniform standard recommended by all major players for the assessment of information security in the automotive industry.
TISAX defines best practice and sets uniform rules for safety. The TISAX standard was sponsored by the German automotive industry association VDA (Verband der Automobilindustrie). The VDA established the evaluation criteria and certification rules in cooperation with the association of the European automotive industry: the European Network Exchange (ENX).
✓ TISAX assessments are carried out by accredited audit providers who also demonstrate their qualifications at regular intervals.
✓ The certification assessment was carried out by an accredited audit provider.
✓ TISAX results are not intended for the general public and are available on the ENX portal (https://portal.enx.com/en-US/) under Scope ID:SK9C8L and Assessment Id: A5FRY1-1.
Are you interested in our offer? Contact us
GEM System and Kubernetes – bringing innovations for modern IT
GEM System and Kubernetes – bringing innovations for modern IT 🚀
🔑 Are you looking for a partner for cutting-edge software development and robust IT infrastructure? At GEM System, we specialize in game-changing technologies – including Kubernetes. Our solutions will bring you greater efficiency, reliability, and better application scaling.
✅ Why Kubernetes? Auto-scaling: Systems that respond to changing requirements instantly. DevOps integration: Development and operations work together smoothly and efficiently. Reliable operation: Thanks to monitoring and automatic recovery, we minimize the risk of downtime. Resource optimization: Better utilization of infrastructure saves costs and time. Our technology and experience: We work with platforms such as RedHat OpenShift or SUSE Rancher, and our internal labs are constantly testing new options to offer you the best.
👉 Discover the future of IT with us. Contact us:
📩 sales@gemsystem.cz
🌍 www.gemsystem.cz
GEM System and Kubernetes – bringing innovation to modern IT 🚀
🔑 Looking for a partner for cutting-edge software development and robust IT infrastructure? At GEM System, we specialize in game-changing technologies – including Kubernetes. Our solutions bring you greater efficiency, reliability and better application scaling.
✅ Why Kubernetes? Automatic scaling: systems that respond to changing requirements instantly. DevOps integration: development and operations work together seamlessly and efficiently. Reliable operations: monitoring and automatic recovery minimize the risk of downtime. Resource optimization. Our technology and experience.
👉 Discover the future of IT with us. contact us:
📩 sales@gemsystem.cz
🌍 www.gemsystem.cz
#GEMSystem #Kubernetes #DevOps #BusinessIT #ITinfrastructure #Innovation #Software #Development #DigitalTransformation #K8s
We are building the future of IT with Kubernetes - solutions built on virtualization thanks to containerization with Kubernetes solutions (K8s)
Let yourself be excited by solutions built on almost perfect virtualization thanks to containerization with Kubernetes (K8s). Enjoy simpler and more visible application release, along with a dramatic improvement in the reliability of running the solution as a whole.
Are you interested in our offer? Contact us
All GEM System references from 20+ years neatly together and much more
All GEM System references from 20+ years neatly together and much more, explore the world of IT with us
✓ Browse dozens of references listed with us online at any time
✓ You can freely filter references by field, everything is divided into details to make it easier to find a similar business/field of your company/organization
✓ Each reference falls into a main category according to our top IT activities: Integration and Development / Business Intelligence / Security / Management and 24×7 Support
✓ For each reference, you will find details such as what solutions are used and what benefits and improvements the client has experienced thanks to cooperation with GEM System
✓ You can also use the effective full-text search of our website, the information is there for you
✓ We are happy to provide additional references, competences and know-how upon request during business negotiations
✓ Last but not least, everything is available in English and German in addition to the Czech version
GEM System successfully passed extensive ISO recertification
Reading time ~ 2 min.
GEM System successfully passed extensive ISO recertification
Quality, security and reliability are key in IT – and we confirm this not only through our work, but also through international certifications. In 2025, we successfully recertified all of our key ISO standards, which guarantee that our solutions meet the highest standards for B2B and B2G segments.
✅ ISO 9001 – Quality Management: We provide efficient and consistent services with an emphasis on continuous improvement.
✅ ISO 27001 – Information Security: We protect sensitive data and meet strict cybersecurity requirements.
✅ ISO 20000-1 – Service Management: We guarantee professional and reliable IT service management according to international standards.
✅ ISO 10006 – Quality in projects: Our IT project management is structured, efficient and minimizes risks. TISAX and ISO 14001 are still valid and confirm our responsibility to safety and the environment.
🔍 Why does it matter? In the field of B2B and B2G IT solutions, trust is key. Our customers – from corporations to government institutions – demand stability, security and a high standard of service. Thanks to these certifications, they have the confidence that:
💡 Their data is protected at a top level.
💡 Our services comply with best international practices.
💡 Working with us means minimizing risks and maximizing efficiency.
We are proud to be constantly improving and innovating. Thank you to our team and partners for supporting us on this journey! 🚀
#GEMSystem #ISO #TISAX #Quality #Security #ITSolutions #B2B #B2G #Recertification
Detailed information about ISO can be found here. <a href="https://cdn.shopify.com/s/files/1/1932/8043/files/Odstoupeni_od_smlouvy_EN.pdf?v=1595420299" data-gt-href-en="https://en.notsofunnyany.com/">HERE</a>.









