GEM System has received authorization in the Google Cloud Partner Advantage program

Reading time >3 min.

GEM System has received authorization in the Google Cloud Partner Advantage program

Company GEM System as was officially approved to participate in the program Google Cloud Partner Advantage and successfully completed the process Due Diligence, whose validity is confirmed until the end of the year 2028.
Based on this approval, GEM System received the first authorization for the Google Cloud Platform product area in the following models and regions:
  • Partner - Service - CEE (Central and Eastern Europe)
  • Sell ​​– CEE
This achievement represents a significant step in our long-term direction – to connect technological expertise, data integration and innovative approach into one strong whole that brings specific business added value to clients.
 
Strengthening market position and new business opportunities
Partnership with Google Cloud opens doors for us to new markets, customers and partners within the region Central and Eastern EuropeThanks to authorizations within the program Partner Advantage we obtain:
  • access the latest Google Cloud Platform technologies and tools,
  • possibility to use Priority technical support and Google marketing resources,
  • opportunity to participate joint business activities, campaigns and market development programs,
  • and especially greater trust from customers and partnerswho are looking for a reliable integrator with a direct connection to Google.
This collaboration strengthens our ability to deliver complex cloud, data and AI projects, from architecture design through implementation to long-term operation and optimization.
The strategic importance of partnerships
GEM System has long been based on a combination technological depth and business flexibilityOur participation in the Google Cloud Partner Advantage program confirms our position among top system integrators who can bring clients:
  • innovations with a real impact on the performance and efficiency of companies,
  • secure and scalable environment for applications and data,
  • a the possibility of switching to a modern cloud-first approach.
Our goal is to further expand our know-how in the field Google Cloud, data analytics, AI and security, and support companies in their digital transformation across industries. 

https://cloud.google.com/find-a-partner/partner/gem-system-a-s
#GoogleCloud #GoogleCloudPartnerAdvantage #GEMSystem #CloudComputing #AI #DataAnalytics #Integration #CEE #Innovation #DigitalTransformation #PartnerSuccess

New IT projects, new challenges, new inspiration: our references speak for us

Reading time >10 min.

🚀 New IT projects, new challenges, new inspiration: our references speak for us / Every successful project starts with trust – and we value those who give it to us. At GEM System, we have a long history of delivering cutting-edge IT solutions for key players in banking, automotive, energy and public administration. Our new references show how the combination of expertise, technological innovation and reliable delivery brings real value to partners in both the B2B and B2G segments. Take a look at our current projects and find out why market leaders rely on us – all GEM System references

🚀 New IT projects, new challenges, new inspiration: our references speak for us / Every successful project starts with trust – and we value those who give it to us. At GEM System, we have been delivering top-notch IT solutions for key players in banking, automotive, energy and public administration for a long time. Our new references show how the combination of expertise, technological innovation and reliable delivery brings real value to partners in both the B2B and B2G segments. Check out our current projects and find out why market leaders rely on us – all GEM System references

#GEM #System #IT #B2B #B2G #Banking #Automotive #Projects #ITDelivery #EnterpriseSolutions #Innovation #AI

Advanced AI solutions for efficient, secure and scalable integrations – count on GEM System

Reading time >10 min.

GEM System presents advanced AI solutions for efficient, secure and scalable integrations

With a focus on security, compliance, and best practices, we give partners full control over their data and AI results, while a flexible architecture enables rapid deployment and future expansion. GEM System can deliver real value in everyday operations, from accelerating internal processes to optimizing customer interactions to generating accurate analytical recommendations for management. Our solutions combine innovation with proven stability, ensuring clients a competitive advantage, efficiency, and long-term sustainability of their AI deployments.

GEM System is synonymous with the combination of strong integration capabilities, cutting-edge development processes and advanced AI architectures. Thanks to our unique combination of multi-agent orchestration, modular architecture and sophisticated process framework, we are able to provide clients with solutions that truly transform their business. Our AI systems are not only technologically advanced – they are practically usable, secure, auditable and scalable across different departments and processes.

New Cybersecurity Act and NIS2: Top management bears direct responsibility

Reading time ~5 min.

New Cybersecurity Act and NIS2: Top management bears direct responsibility

In recent days, the President of the Czech Republic, Petr Pavel, signed a new law on cybersecurity, which implements the European directive NIS2 (Network and Information Security Directive 2). This law significantly changes the approach to cybersecurity management in the Czech Republic and affects both state institutions and the private sector.

Main changes and impacts of the new legislation

  1. Binding personal liability of top management
    • The law shifts responsibility for cybersecurity directly to the top management of organizations, especially to members of statutory bodies, such as members of the board of directors, executives, members of the supervisory board, or the general director (CEO).
    • Responsibility is non-transferable, it cannot be delegated to lower management or external suppliers.
    • Risks for non-compliance with obligations can be of the nature of either: financial (fines up to 2% of turnover or hundreds of millions of CZK), So personal (e.g. ban on holding office for up to 5 years).
  2. Expansion of the scope of the law
    • The law will affect 6 to 000 entities throughout the Czech Republic, across all sectors, including not only state organizations, but also hospitals, entities from the energy, transport, food, pharmaceuticals, digital infrastructure, research organizations, and medium-sized and large enterprises.
    • The entities are divided into significant a important according to the nature of the services provided and the extent of the impact of their potential failure.
  3. New requirements for security management (ISMS)
    • Organizations will need to have comprehensive information security management systems (ISMS) in place, which will include:
      • Assessing risks and implementing appropriate measures to manage them (e.g. data encryption, multi-factor authentication, network segmentation).
      • Supply chain security management (e.g. partner verification, contractual security commitments).
      • Incident response plan – i.e. specific scenarios of procedures in the event of an attack or threat to the system.
      • Regular audits, security tests and record keeping of management activities in the area of ​​security.
  4. Cybersecurity as part of strategic management
    • ISMS now falls under the responsibility of the organization's strategic management, similar to financial management or legal compliance.
    • Cybersecurity governance must be regularly discussed at board level and documented. These records can be key evidence in assessing responsibility in the event of an incident.
  5. Deadlines and effectiveness
    • The law was approved by the Chamber of Deputies and, after being signed by the President of the Czech Republic on June 26, 2025, is to be published in the Collection of Laws in August 2025.
    • It is to take effect from 1 November 2025, with a transition period of 12 months for the implementation of the necessary measures.

 Practical recommendations for organizations

Hook

Description

1. Identification of responsibilities

Assess whether your organization falls within the scope of the law – as a significant or important entity.

2. Gap analysis

Conduct an analysis of the current state of security management and prepare an ISMS implementation plan.

3. Education and leadership responsibility

To familiarize top management with the legal and practical impacts of the new legislation.

4. Processes and documentation

Ensure that security management is part of management discussions, there is an audit trail and a response plan.

5. Technical measures

Implement encryption, multi-factor authentication (MFA), logging, regular testing, and security monitoring.

záver

Cybersecurity law is no longer an IT department issue – it is becoming part of top management risk management. In addition to protecting against real threats such as ransomware attacks, data loss or threats to operational infrastructure, it is also a matter of reputation, legal liability and competitiveness.

Recommended and verified sources

For more information or to prepare your own organization for new responsibilities, you can contact us at sales.

We are building the future of IT with Kubernetes - solutions built on virtualization thanks to containerization with Kubernetes solutions (K8s)

Let yourself be excited by solutions built on almost perfect virtualization thanks to containerization with Kubernetes (K8s). Enjoy simpler and more visible application release, along with a dramatic improvement in the reliability of running the solution as a whole.

Are you interested in our offer? Contact us

    GDPR is not just compliance. It's our approach.

    Reading time >5 min.

    🔐 GDPR is not just compliance. It's our approach.

    In a world where data means trust, it's clear: it's not enough to have technology. You also need rules. And at GEM System, these aren't just on paper:
    🔸 Personal data protection is integrated into every project - from system integration to identity management to development and BI.
    🔸 We see GDPR as an advantage - it helps us build systems that are robust, secure and transparent from the ground up.
    🔸 Our teams know not only the technology, but also the legal framework. And they know what it means to work with data responsibly - for us and for our clients.

    Our customers have the confidence that we know what we are doing – and why we are doing it right.
    💡 We work with personal data the way we would want someone to work with ours.

    Find out how we handle data, or ask us directly:
    👉 www.gemsystem.cz/gdpr
    📧 info@gemsystem.cz
    www.gem.cz
    www.gem.cz/en
    www.gem.cz/de

    #GDPR #databezpeci #GEMSystem #ITsDdpovednosti #B2B #B2G #cybersecurity #trustbydesign

    Are you interested in our offer? Contact us

      GEM System announces re-qualification and acquisition of TISAX certification in 2025

      Reading time ~4 min.

      GEM System announces re-qualification and acquisition of TISAX certification in 2025

      TISAX represents a uniform standard recommended by all major players for the assessment of information security in the automotive industry.

      TISAX defines best practice and sets uniform rules for safety. The TISAX standard was sponsored by the German automotive industry association VDA (Verband der Automobilindustrie). The VDA established the evaluation criteria and certification rules in cooperation with the association of the European automotive industry: the European Network Exchange (ENX).

      ✓ TISAX assessments are carried out by accredited audit providers who also demonstrate their qualifications at regular intervals.
      ✓ The certification assessment was carried out by an accredited audit provider.
      ✓ TISAX results are not intended for the general public and are available on the ENX portal (https://portal.enx.com/en-US/) under Scope ID:SK9C8L and Assessment Id: A5FRY1-1.

      Are you interested in our offer? Contact us

        GEM System and Kubernetes – bringing innovations for modern IT

        Reading time ~ 3 min.

        GEM System and Kubernetes – bringing innovations for modern IT 🚀

        🔑 Are you looking for a partner for cutting-edge software development and robust IT infrastructure? At GEM System, we specialize in game-changing technologies – including Kubernetes. Our solutions will bring you greater efficiency, reliability, and better application scaling.

        ✅ Why Kubernetes? Auto-scaling: Systems that respond to changing requirements instantly. DevOps integration: Development and operations work together smoothly and efficiently. Reliable operation: Thanks to monitoring and automatic recovery, we minimize the risk of downtime. Resource optimization: Better utilization of infrastructure saves costs and time. Our technology and experience: We work with platforms such as RedHat OpenShift or SUSE Rancher, and our internal labs are constantly testing new options to offer you the best.

        👉 Discover the future of IT with us. Contact us:

        📩 sales@gemsystem.cz

        🌍 www.gemsystem.cz


        GEM System and Kubernetes – bringing innovation to modern IT 🚀

        🔑 Looking for a partner for cutting-edge software development and robust IT infrastructure? At GEM System, we specialize in game-changing technologies – including Kubernetes. Our solutions bring you greater efficiency, reliability and better application scaling.

        ✅ Why Kubernetes? Automatic scaling: systems that respond to changing requirements instantly. DevOps integration: development and operations work together seamlessly and efficiently. Reliable operations: monitoring and automatic recovery minimize the risk of downtime. Resource optimization. Our technology and experience.

        👉 Discover the future of IT with us. contact us:

        📩 sales@gemsystem.cz

        🌍 www.gemsystem.cz


        #GEMSystem #Kubernetes #DevOps #BusinessIT #ITinfrastructure #Innovation #Software #Development #DigitalTransformation #K8s

        We are building the future of IT with Kubernetes - solutions built on virtualization thanks to containerization with Kubernetes solutions (K8s)

        Let yourself be excited by solutions built on almost perfect virtualization thanks to containerization with Kubernetes (K8s). Enjoy simpler and more visible application release, along with a dramatic improvement in the reliability of running the solution as a whole.

        Are you interested in our offer? Contact us

          All GEM System references from 20+ years neatly together and much more

          Reading time >15 min.

          All GEM System references from 20+ years neatly together and much more, explore the world of IT with us

          ✓ Browse dozens of references listed with us online at any time

          ✓ You can freely filter references by field, everything is divided into details to make it easier to find a similar business/field of your company/organization

          ✓ Each reference falls into a main category according to our top IT activities: Integration and Development / Business Intelligence / Security / Management and 24×7 Support

          ✓ For each reference, you will find details such as what solutions are used and what benefits and improvements the client has experienced thanks to cooperation with GEM System

          ✓ You can also use the effective full-text search of our website, the information is there for you

          ✓ We are happy to provide additional references, competences and know-how upon request during business negotiations

          ✓ Last but not least, everything is available in English and German in addition to the Czech version

          GEM System successfully passed extensive ISO recertification

          Reading time ~ 2 min.

          soa campaing w1000px_7-2019 wGEM

          GEM System successfully passed extensive ISO recertification

          Quality, security and reliability are key in IT – and we confirm this not only through our work, but also through international certifications. In 2025, we successfully recertified all of our key ISO standards, which guarantee that our solutions meet the highest standards for B2B and B2G segments.

          ISO 9001 – Quality Management: We provide efficient and consistent services with an emphasis on continuous improvement.
          ISO 27001 – Information Security: We protect sensitive data and meet strict cybersecurity requirements.
          ISO 20000-1 – Service Management: We guarantee professional and reliable IT service management according to international standards.
          ISO 10006 – Quality in projects: Our IT project management is structured, efficient and minimizes risks. TISAX and ISO 14001 are still valid and confirm our responsibility to safety and the environment.

          🔍 Why does it matter? In the field of B2B and B2G IT solutions, trust is key. Our customers – from corporations to government institutions – demand stability, security and a high standard of service. Thanks to these certifications, they have the confidence that:
          💡 Their data is protected at a top level.
          💡 Our services comply with best international practices.
          💡 Working with us means minimizing risks and maximizing efficiency.

          We are proud to be constantly improving and innovating. Thank you to our team and partners for supporting us on this journey! 🚀

          #GEMSystem #ISO #TISAX #Quality #Security #ITSolutions #B2B #B2G #Recertification

          Detailed information about ISO can be found here. <a href="https://cdn.shopify.com/s/files/1/1932/8043/files/Odstoupeni_od_smlouvy_EN.pdf?v=1595420299" data-gt-href-en="https://en.notsofunnyany.com/">HERE</a>.

          PF 2025 by GEM System

          Reading time ~1 min.

          Dear business friends and everyone from GEM System,
          We sincerely wish you a pleasant experience of the Christmas holidays 🎄 and good health and success in the new year 2025 🍾.

          Dear business friends and everyone at GEM System. We wish you a Merry Christmas 🎄 and a very healthy and successful New Year 2025 🍾.

          Dear business friends and all at GEM System. We wish you a happy Christmas 🎄 and a very healthy and successful new year 2025 🍾.

          #GEMSystem #IT #PF #2025