The products are nicely put together

GEM System has been operating on the market since 2004 and offers complex system and integration solutions, specializing primarily in the field of Business Intelligence, Identity Management, B2B communication systems, data warehouses, including the development of extensive custom IT solutions. We use modern and progressive technologies and the most modern solution procedures. As one of the few in the Czech Republic, we have experience in implementing solutions built on, for example, Oracle BI, Oracle BAM or Oracle Identity Management platforms. However, we are also perfectly familiar with the products of other major IT suppliers such as HP, IBM or Microsoft.

GEM Process Manager - GPM tool for enterprise systems

GEM Process Manager is an evolutionary successor to the current way of developing enterprise systems, which significantly reduces the time from the creation of a request to its implementation in a production environment. Take advantage of advanced automation and significant streamlining of business processes.

Want to optimize document approval? Do you need your processes to be ISO compliant? Are you thinking about improving the quality of customer support services? Are you looking for a way to streamline your internal processes? Don't you know how to adapt your processes to the market situation as quickly as possible? GEM Process Manager is your right solution. The robust solution in the form of GEM Process Manager from GEM System will convince you, for example, with a number of large and medium-sized references.

GEM Traffic Manager

GEM Traffic Manager is an infrastructure software solution that can easily implement selected infrastructure components such as load balancer, reverse proxy or SSL/TLS connection termination. It is an extensible package product configurable to the customer's needs. It is installed on regular hardware or, more often, in virtual machines, typically with OS Linux or Windows Server.

GEM Winch is a universal modular system for, among other things, data transformation

GEM System offers you a universal modular system for creating slices, transforming, migrating and anonymizing data. Thanks to GEM Winch, you can easily and intuitively determine which data should be included in the created sample, what should be their target volume, which data will be subject to anonymization and how they will be anonymized.

How to report data from SAP...without SAP? Ask GEM System

The generation of reporting data in the SAP system is currently more and more on the rise. Users of SAP solutions are interested in reporting data, but it is not always a matter of course that they receive the data in order, on time and according to their wishes. Implementing the requirements and wishes for reporting data from SAP is often expensive, slow and rather cumbersome. Clients using SAP solutions encounter user demands and high financial costs for changes and modifications.

Personal data under control thanks to GEM GDPR Suite

A solution for comprehensive handling of GDPR management and personal data protection. Modular GDPR solutions to suit the different needs of your company.v

Integration & development

We offer the services of an experienced integrator who has completed a number of not only large projects for really big players on the market, but we can deal with integration in smaller businesses. The services also include development, without which projects are often indispensable. Rely on dozens of experienced developers and their great leadership within the GEM System.

Business intelligence

Do you have a lot of data about your customers' behavior, but can't extract important information from it? Do you need better and, above all, relevant documents for making important decisions? Try using Business Intelligence (BI) tools, which will help you get the essentials for your business from your data.

Business intelligence

Safety

Leave security to the experts. We test your security measures and analyze the technologies used to find weak or even unprotected places in your IT systems. We can also play the attacker and test in real operation if your protection is really impenetrable.

24x7 administration & support

Focus on business and leave the hardware and software worries to us. We offer round-the-clock remote monitoring of your systems from a perfectly equipped monitoring center, preventive checks and working procedures for solving your problems. If you don't want to deal with your own hardware, run your applications in our data center.

Training & Consulting Services

  • Training in methodologies, analysis and creation of extensive software systems.
  • Consulting services for setting up and adapting methodologies during their deployment.
  • Enterprise Architect CASE training.
  • Training to use ArchiMate notation.
  • Training and consulting services in the field of using the UML modeling language in various phases of the software process.
  • Consultation on the creation of an analysis and the process of creating an assignment of an extensive ICT solution.
  • Consultation on business process modeling, BPMN notation and the design or implementation of BPMN tools.

Are you interested in our offer?