{"id":18967,"date":"2025-01-13T15:15:14","date_gmt":"2025-01-13T14:15:14","guid":{"rendered":"https:\/\/teneg.pl\/its\/?page_id=18967"},"modified":"2025-03-09T16:10:47","modified_gmt":"2025-03-09T15:10:47","slug":"rozwiazania-edr-i-xdr","status":"publish","type":"page","link":"https:\/\/teneg.pl\/its\/rozwiazania-edr-i-xdr\/","title":{"rendered":"Rozwi\u0105zania EDR i XDR"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-min-height:450px;--awb-min-height-medium:400px;--awb-min-height-small:350px;--awb-background-image:linear-gradient(180deg, rgba(0,0,0,0.7) 0%,rgba(0,0,0,0.7) 100%),url(https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/09\/Cyber.png);;--awb-background-size:cover;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color1);--awb-font-size:36px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Exo 2&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;line-height:1.2;\">Rozwi\u0105zania EDR i XDR<\/h2><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container container_landing_1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:80px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column half_right_column_landing image_landing7_column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:10px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-margin-top-medium:30px;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"800\" height=\"530\" title=\"EDR_grafika_800x530\" src=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/EDR_grafika_800x530.png\" alt class=\"img-responsive wp-image-13915\" srcset=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/EDR_grafika_800x530-200x133.png 200w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/EDR_grafika_800x530-400x265.png 400w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/EDR_grafika_800x530-600x398.png 600w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/EDR_grafika_800x530.png 800w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 800px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container container_landing_1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-blend-mode:overlay;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:80px;--awb-background-color:var(--awb-color2);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1 md-text-align-left sm-text-align-left fusion-text-no-margin\" style=\"--awb-content-alignment:justify;--awb-font-size:18px;--awb-line-height:1.4;--awb-text-color:#000000;--awb-margin-bottom:0px;\"><p>Rozwi\u0105zania EDR (Endpoint Detect &amp; Response) zbieraj\u0105 dane z punkt\u00f3w ko\u0144cowych \u2013 komputer\u00f3w, laptop\u00f3w, telefon\u00f3w, stacji roboczych \u2013 wykorzystuj\u0105 je do identyfikacji potencjalnych zagro\u017ce\u0144 i zapewniaj\u0105 pomocne sposoby badania i reagowania na te potencjalne zagro\u017cenia \u2013 nowoczesne rozwi\u0105zania dokonuj\u0105 r\u00f3wnie\u017c automatyzacji z p\u00f3\u017aniejszym raportowaniem.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container container_landing nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:80px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color8);--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Exo 2&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;line-height:1.2;\">WithSecure Elements Endpoint Detection and Response (EDR)<\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2 md-text-align-left sm-text-align-left\" style=\"--awb-content-alignment:justify;--awb-font-size:18px;--awb-line-height:1.4;--awb-text-color:#000000;\"><p>Rozwi\u0105zanie WithSecure Elements Endpoint Detection and Response zosta\u0142o stworzone z\u2004my\u015bl\u0105 o\u2004detekcji i\u2004reakcji na zagro\u017cenia wyst\u0119puj\u0105ce na stacjach ko\u0144cowych. Zapewnia automatyzacj\u0119 i\u2004przyspiesza proces wykrywania narusze\u0144 bezpiecze\u0144stwa kluczowych zasob\u00f3w biznesowych organizacji.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:30px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\" style=\"--awb-font-size:20px;--awb-text-color:#000000;--awb-text-font-family:&quot;Exo 2&quot;;--awb-text-font-style:normal;--awb-text-font-weight:600;\"><p>Opis produktu:<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center przycisk_tog\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:13px;--awb-content-font-size:18px;--awb-content-line-height:1.4;--awb-icon-alignment:left;--awb-hover-color:var(--awb-color1);--awb-border-color:#cccccc;--awb-background-color:#ffffff;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:var(--awb-color3);--awb-title-color:#000000;--awb-content-color:var(--awb-color3);--awb-icon-box-color:var(--awb-color6);--awb-toggle-hover-accent-color:var(--awb-color8);--awb-toggle-active-accent-color:var(--awb-color3);--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Lato&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-18967-1\"><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-e062370accacfbb21 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_e062370accacfbb21\"><a aria-expanded=\"false\" aria-controls=\"e062370accacfbb21\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-1\" data-target=\"#e062370accacfbb21\" href=\"#e062370accacfbb21\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Monitorowanie aktywno\u015bci<\/span><\/a><\/h4><\/div><div id=\"e062370accacfbb21\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_e062370accacfbb21\"><div class=\"panel-body toggle-content fusion-clearfix\">Monitorowanie aktywno\u015bci na stacjach ko\u0144cowych za pomoc\u0105 lekkich agent\u00f3w zapewniaj\u0105cych przesy\u0142anie w\u2004czasie rzeczywistym wszelkich incydent\u00f3w bezpiecze\u0144stwa do analizy w\u2004chmurze WithSecure.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-79bb0a8d031093270 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_79bb0a8d031093270\"><a aria-expanded=\"false\" aria-controls=\"79bb0a8d031093270\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-1\" data-target=\"#79bb0a8d031093270\" href=\"#79bb0a8d031093270\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Wspomaganie analizy zachowa\u0144<\/span><\/a><\/h4><\/div><div id=\"79bb0a8d031093270\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_79bb0a8d031093270\"><div class=\"panel-body toggle-content fusion-clearfix\">Wspomaganie analizy zachowa\u0144 za pomoc\u0105 funkcjonalno\u015bci Broad Context Detection\u2122, zwi\u0119kszaj\u0105cej efektywno\u015b\u0107 i\u2004skuteczno\u015b\u0107 detekcji podejrzanych aktywno\u015bci<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-47b448b25432f77c0 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_47b448b25432f77c0\"><a aria-expanded=\"false\" aria-controls=\"47b448b25432f77c0\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-1\" data-target=\"#47b448b25432f77c0\" href=\"#47b448b25432f77c0\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Weryfikacja wykrytych incydent\u00f3w<\/span><\/a><\/h4><\/div><div id=\"47b448b25432f77c0\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_47b448b25432f77c0\"><div class=\"panel-body toggle-content fusion-clearfix\">Mo\u017cliwo\u015b\u0107 weryfikacji wykrytych incydent\u00f3w dzi\u0119ki dost\u0119pno\u015bci szczeg\u00f3\u0142owych raport\u00f3w zawieraj\u0105cych szeroko kontekstowy zestaw informacji<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-838d73957a3318375 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_838d73957a3318375\"><a aria-expanded=\"false\" aria-controls=\"838d73957a3318375\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-1\" data-target=\"#838d73957a3318375\" href=\"#838d73957a3318375\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Weryfikacja detekcji raz<\/span><\/a><\/h4><\/div><div id=\"838d73957a3318375\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_838d73957a3318375\"><div class=\"panel-body toggle-content fusion-clearfix\">Weryfikacja detekcji raz z\u2004zestawem porad jak wyeliminowa\u0107 dane zagro\u017cenie (mo\u017cliwo\u015b\u0107 przekazania sprawy bezpo\u015brednio do zespo\u0142u bezpiecze\u0144stwa WithSecure)<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:30px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\" style=\"--awb-font-size:20px;--awb-text-color:#000000;--awb-text-font-family:&quot;Exo 2&quot;;--awb-text-font-style:normal;--awb-text-font-weight:600;\"><p>Korzy\u015bci rozwi\u0105zania:<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5 md-text-align-left\" style=\"--awb-font-size:18px;--awb-line-height:1.4;--awb-text-color:#000000;\"><ul style=\"text-align: justify;\">\n<li>Natychmiastowy wgl\u0105d w\u2004\u015brodowisko i\u2004stan bezpiecze\u0144stwa<\/li>\n<li>Analiza zachowa\u0144 w\u2004czasie rzeczywistym wraz z\u2004funkcj\u0105 Broad Context Detection\u2122 pozwalaj\u0105ca wykry\u0107 podejrzane dzia\u0142ania i\u2004ataki<\/li>\n<li>Szczeg\u00f3\u0142owe informacje o\u2004atakach w\u2004szerszym kontek\u015bcie<\/li>\n<li>Wskaz\u00f3wki jak poradzi\u0107 sobie z\u2004danym problemem<\/li>\n<li>Mo\u017cliwo\u015b\u0107 uzyskania pomocy bezpo\u015brednio od WithSecure<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container container_landing nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-blend-mode:overlay;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:80px;--awb-background-color:var(--awb-color2);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color8);--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Exo 2&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;line-height:1.2;\">Cylance\u00ae Optics<\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6 md-text-align-left sm-text-align-left\" style=\"--awb-content-alignment:justify;--awb-font-size:18px;--awb-line-height:1.4;--awb-text-color:#000000;\"><p>Cylance Optics umo\u017cliwia centrom operacji bezpiecze\u0144stwa (SOC) i analitykom bezpiecze\u0144stwa wykrycie wczesnych oznak naruszenia, tak aby reakcje zapobiegawcze mog\u0142y by\u0107 szybko rozpocz\u0119te w celu zminimalizowania szk\u00f3d. Cylance Optics uzbraja r\u00f3wnie\u017c analityk\u00f3w w narz\u0119dzia do wyszukiwania zagro\u017ce\u0144 i analizy przyczyn \u017ar\u00f3d\u0142owych, kt\u00f3rych potrzebuj\u0105, aby odr\u00f3\u017cni\u0107 subtelne sygna\u0142y zagro\u017cenia od przypadkowego szumu rutynowych dzia\u0142a\u0144.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:30px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7\" style=\"--awb-font-size:20px;--awb-line-height:1.4;--awb-text-color:#000000;--awb-text-font-family:&quot;Exo 2&quot;;--awb-text-font-style:normal;--awb-text-font-weight:600;\"><p style=\"text-align: justify;\">Cylance Optics jest w\u0142a\u015bciwym rozwi\u0105zaniem dla organizacji, kt\u00f3re chc\u0105:<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-center half_right_column_landing image_landing7_column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-margin-top-medium:30px;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element md-text-align-center\" style=\"text-align:right;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1447\" height=\"797\" title=\"cynalce2\" src=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/cynalce2.png\" alt class=\"img-responsive wp-image-13887\" srcset=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/cynalce2-200x110.png 200w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/cynalce2-400x220.png 400w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/cynalce2-600x330.png 600w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/cynalce2-800x441.png 800w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/cynalce2-1200x661.png 1200w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/cynalce2.png 1447w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 600px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory \" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8 md-text-align-left sm-text-align-left\" style=\"--awb-content-alignment:justify;--awb-font-size:18px;--awb-line-height:1.4;--awb-text-color:#000000;\"><ul class=\"biale_kropki\">\n<li style=\"margin-bottom: 15px;\">Zmniejszy\u0107 MTTD i MTTR poprzez powstrzymywanie zagro\u017ce\u0144 za pomoc\u0105 dost\u0119pnych na \u017c\u0105danie pakiet\u00f3w i zautomatyzowanych playbook\u00f3w<\/li>\n<li style=\"margin-bottom: 15px;\">Usuwa\u0107 zagro\u017cenia poprzez szybkie przywracanie zagro\u017conych system\u00f3w do pierwotnego stanu<\/li>\n<li style=\"margin-bottom: 15px;\">Przeszukiwanie danych z punkt\u00f3w ko\u0144cowych w poszukiwaniu plik\u00f3w, plik\u00f3w wykonywalnych, obiekt\u00f3w MITRE ATT&amp;CK i innych wska\u017anik\u00f3w kompromitacji<\/li>\n<li style=\"margin-bottom: 15px;\">Ochrona punkt\u00f3w ko\u0144cowych bez ograniczania wydajno\u015bci<\/li>\n<li style=\"margin-bottom: 15px;\">Szybka identyfikacja oznak ataku ukrytych w masie danych z punkt\u00f3w ko\u0144cowych<\/li>\n<li style=\"margin-bottom: 15px;\">Zwi\u0119kszenie ich odporno\u015bci poprzez usprawnienie wyszukiwania zagro\u017ce\u0144 i analizy przyczyn \u017ar\u00f3d\u0142owych<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:50px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-9\" style=\"--awb-font-size:20px;--awb-line-height:1.4;--awb-text-color:#000000;--awb-text-font-family:&quot;Exo 2&quot;;--awb-text-font-style:normal;--awb-text-font-weight:600;\"><p style=\"text-align: justify;\">Kluczowe funkcjonalno\u015bci:<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-15 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:30px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-margin-top-medium:0px;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:13px;--awb-content-font-size:18px;--awb-content-line-height:1.4;--awb-icon-alignment:left;--awb-hover-color:var(--awb-color1);--awb-border-color:#cccccc;--awb-background-color:#ffffff;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:var(--awb-color3);--awb-title-color:#000000;--awb-content-color:var(--awb-color3);--awb-icon-box-color:var(--awb-color6);--awb-toggle-hover-accent-color:var(--awb-color8);--awb-toggle-active-accent-color:var(--awb-color3);--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Lato&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-18967-2\"><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-de7a980a20caea693 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_de7a980a20caea693\"><a aria-expanded=\"false\" aria-controls=\"de7a980a20caea693\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-2\" data-target=\"#de7a980a20caea693\" href=\"#de7a980a20caea693\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Obs\u0142uga chmury<\/span><\/a><\/h4><\/div><div id=\"de7a980a20caea693\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_de7a980a20caea693\"><div class=\"panel-body toggle-content fusion-clearfix\">Oparty na chmurze Cylance Optics zapewnia monitorowanie i widoczno\u015b\u0107, kt\u00f3re obejmuj\u0105 ca\u0142\u0105 organizacj\u0119, umo\u017cliwiaj\u0105c wykrywanie i polowanie na zagro\u017cenia zar\u00f3wno dla urz\u0105dze\u0144 online, jak i offline.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-f53b49932a6738dfc fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_f53b49932a6738dfc\"><a aria-expanded=\"false\" aria-controls=\"f53b49932a6738dfc\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-2\" data-target=\"#f53b49932a6738dfc\" href=\"#f53b49932a6738dfc\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Szybkie wykrywanie i reagowanie na oprogramowanie ransomware<\/span><\/a><\/h4><\/div><div id=\"f53b49932a6738dfc\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_f53b49932a6738dfc\"><div class=\"panel-body toggle-content fusion-clearfix\">Zabezpieczenia Cylance oparte na sztucznej inteligencji pro aktywnie wykrywaj\u0105 i automatyzuj\u0105 mo\u017cliwo\u015bci reagowania. Dzi\u0119ki temu mo\u017cna wykrywa\u0107 i neutralizowa\u0107 zaawansowane cyber zagro\u017cenia w ci\u0105gu milisekund, a nie godzin czy dni.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-969daab89fc28e86a fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_969daab89fc28e86a\"><a aria-expanded=\"false\" aria-controls=\"969daab89fc28e86a\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-2\" data-target=\"#969daab89fc28e86a\" href=\"#969daab89fc28e86a\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Zapobieganie incydentom dzi\u0119ki uczeniu maszynowemu<\/span><\/a><\/h4><\/div><div id=\"969daab89fc28e86a\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_969daab89fc28e86a\"><div class=\"panel-body toggle-content fusion-clearfix\">Cylance Optics \u0142agodzi i powstrzymuje zagro\u017cenia w punktach ko\u0144cowych \u2013 minimalizuj\u0105c powierzchni\u0119 ataku i potencjalne ruchy boczne. Dzi\u0119ki temu zespo\u0142y IT SOC maj\u0105 wi\u0119cej czasu na wykonywanie istotnych obowi\u0105zk\u00f3w, zamiast monitorowa\u0107 i ponownie analizowa\u0107 zagro\u017cone punkty ko\u0144cowe.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-00e6974fa1e1a3ec8 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_00e6974fa1e1a3ec8\"><a aria-expanded=\"false\" aria-controls=\"00e6974fa1e1a3ec8\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-2\" data-target=\"#00e6974fa1e1a3ec8\" href=\"#00e6974fa1e1a3ec8\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Niestandardowe, automatyczne reakcje<\/span><\/a><\/h4><\/div><div id=\"00e6974fa1e1a3ec8\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_00e6974fa1e1a3ec8\"><div class=\"panel-body toggle-content fusion-clearfix\">Cylance Optics posiada wbudowany playbook z automatycznymi reakcjami na incydenty w celu zmniejszenia zagro\u017ce\u0144 punkt\u00f3w ko\u0144cowych. Dzi\u0119ki automatycznemu zbieraniu istotnych informacji dotycz\u0105cych bezpiecze\u0144stwa w celu polowania i analizy kryminalistycznej, oszcz\u0119dza czas analityk\u00f3w SOC.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-fb74de6ef4b623692 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_fb74de6ef4b623692\"><a aria-expanded=\"false\" aria-controls=\"fb74de6ef4b623692\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-2\" data-target=\"#fb74de6ef4b623692\" href=\"#fb74de6ef4b623692\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Nieograniczone polowanie na zagro\u017cenia<\/span><\/a><\/h4><\/div><div id=\"fb74de6ef4b623692\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_fb74de6ef4b623692\"><div class=\"panel-body toggle-content fusion-clearfix\">Zaawansowane, intuicyjne mo\u017cliwo\u015bci tworzenia kwerend za pomoc\u0105 Query zosta\u0142y przygotowane specjalnie dla MITRE ATT&amp;CK\u00ae. Zosta\u0142y one zaprojektowane tak, aby umo\u017cliwi\u0107 g\u0142\u0119boki wgl\u0105d w zagro\u017cenia i analiz\u0119 kryminalistyczn\u0105 z doskona\u0142ymi pakietami retencji danych.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container container_landing nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:80px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-16 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-margin-bottom-medium:0px;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color8);--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Exo 2&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;line-height:1.2;\">Intuicyjny konfigurator proces\u00f3w z metod\u0105 Drag&amp;Drop<\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-17 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-margin-top-small:20px;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10 md-text-align-left sm-text-align-left\" style=\"--awb-content-alignment:justify;--awb-font-size:18px;--awb-line-height:1.4;--awb-text-color:#000000;\"><p>Cylance zapewnia wszystko, aby zabezpieczy\u0107 punkty ko\u0144cowe \u2013 konfiguracj\u0119, monitorowanie, wyszukiwanie zagro\u017ce\u0144, obs\u0142ug\u0119 incydent\u00f3w i remediacj\u0119. Zespo\u0142y Cylance Guard posiadaj\u0105 strategi\u0119, do\u015bwiadczenie i technologi\u0119 niezb\u0119dn\u0105 do pro aktywnego zapobiegania zagro\u017ceniom i ograniczania incydent\u00f3w bezpiecze\u0144stwa poprzez korelowanie i analizowanie danych alarmowych i telemetrycznych z ca\u0142ego \u015brodowiska informatycznego organizacji. Korzystaj\u0105c z wiedzy i metod zespo\u0142u Cylance Incident Response (IR), analitycy firmy Cylance analizuj\u0105 \u015brodowiska klient\u00f3w w celu znalezienia i powstrzymania zagro\u017ce\u0144, zapobiegania powa\u017cnym naruszeniom oraz pomagania organizacjom w dojrzewaniu ich proces\u00f3w bezpiecze\u0144stwa.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-18 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:13px;--awb-content-font-size:18px;--awb-content-line-height:1.4;--awb-icon-alignment:left;--awb-hover-color:var(--awb-color1);--awb-border-color:#cccccc;--awb-background-color:#ffffff;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:var(--awb-color3);--awb-title-color:#000000;--awb-content-color:var(--awb-color3);--awb-icon-box-color:var(--awb-color6);--awb-toggle-hover-accent-color:var(--awb-color8);--awb-toggle-active-accent-color:var(--awb-color3);--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Lato&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-18967-3\"><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-80004065ee0b7c9d6 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_80004065ee0b7c9d6\"><a aria-expanded=\"false\" aria-controls=\"80004065ee0b7c9d6\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-3\" data-target=\"#80004065ee0b7c9d6\" href=\"#80004065ee0b7c9d6\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Cylance Guard<\/span><\/a><\/h4><\/div><div id=\"80004065ee0b7c9d6\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_80004065ee0b7c9d6\"><div class=\"panel-body toggle-content fusion-clearfix\">Konsoliduje dane alarmowe i telemetryczne pochodz\u0105ce od u\u017cytkownik\u00f3w, komputer\u00f3w stacjonarnych, serwer\u00f3w, urz\u0105dze\u0144 mobilnych i sieci poprzez bezproblemow\u0105 integracj\u0119 z rozwi\u0105zaniami Cylance AI oraz produktami innych firm.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-9b0fb2b326304d8f0 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_9b0fb2b326304d8f0\"><a aria-expanded=\"false\" aria-controls=\"9b0fb2b326304d8f0\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-3\" data-target=\"#9b0fb2b326304d8f0\" href=\"#9b0fb2b326304d8f0\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Cylance Protect<\/span><\/a><\/h4><\/div><div id=\"9b0fb2b326304d8f0\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_9b0fb2b326304d8f0\"><div class=\"panel-body toggle-content fusion-clearfix\">Wykorzystuje sztuczn\u0105 inteligencj\u0119 (AI) do identyfikacji i zapobiegania z\u0142o\u015bliwemu oprogramowaniu zanim zd\u0105\u017cy si\u0119 ono uruchomi\u0107. Posiada r\u00f3wnie\u017c funkcje zapobiegania atakom opartym na skryptach, bez plik\u00f3w, pami\u0119ci i urz\u0105dzeniach zewn\u0119trznych.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-1e02a6a6a3c034e98 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_1e02a6a6a3c034e98\"><a aria-expanded=\"false\" aria-controls=\"1e02a6a6a3c034e98\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-3\" data-target=\"#1e02a6a6a3c034e98\" href=\"#1e02a6a6a3c034e98\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Cylance\u00ae Protect Mobile<\/span><\/a><\/h4><\/div><div id=\"1e02a6a6a3c034e98\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_1e02a6a6a3c034e98\"><div class=\"panel-body toggle-content fusion-clearfix\">Rozszerza korzy\u015bci predykcyjne i mo\u017cliwo\u015bci zapobiegania zagro\u017ceniom oferowane przez Cylance AI na systemy iOS\u00ae i Android\u2122. Zabezpiecza BYOD i inne technologie mobilne przed z\u0142o\u015bliwym oprogramowaniem, przestarza\u0142ym\/niesprawnym oprogramowaniem, atakami typu phishing\/smishing URL oraz niebezpiecznymi po\u0142\u0105czeniami sieciowym<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-b4995ead014dfdddd fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_b4995ead014dfdddd\"><a aria-expanded=\"false\" aria-controls=\"b4995ead014dfdddd\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-3\" data-target=\"#b4995ead014dfdddd\" href=\"#b4995ead014dfdddd\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Cylance Optics<\/span><\/a><\/h4><\/div><div id=\"b4995ead014dfdddd\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_b4995ead014dfdddd\"><div class=\"panel-body toggle-content fusion-clearfix\">Rozszerza zakres zapobiegania zagro\u017ceniom poza uniemo\u017cliwianie dzia\u0142ania z\u0142o\u015bliwych plik\u00f3w i skrypt\u00f3w. Cylance Optics wykorzystuje matematyczne modele zagro\u017ce\u0144 na urz\u0105dzeniach w celu przeprowadzenia analizy przyczyn \u017ar\u00f3d\u0142owych, inteligentnego wykrywania zagro\u017ce\u0144 oraz automatycznego rozpoznawania, reagowania i naprawiania.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-1a2d4501ad4bd508c fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_1a2d4501ad4bd508c\"><a aria-expanded=\"false\" aria-controls=\"1a2d4501ad4bd508c\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-3\" data-target=\"#1a2d4501ad4bd508c\" href=\"#1a2d4501ad4bd508c\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Cylance Gateway<\/span><\/a><\/h4><\/div><div id=\"1a2d4501ad4bd508c\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_1a2d4501ad4bd508c\"><div class=\"panel-body toggle-content fusion-clearfix\">Zapewnia krytyczne us\u0142ugi Zero Trust Network Access (ZTNA), takie jak wykrywanie zagro\u017ce\u0144 sieciowych wspomagane przez sztuczn\u0105 inteligencj\u0119, blokowanie \u017ar\u00f3d\u0142owego IP, mo\u017cliwo\u015b\u0107 pe\u0142nego\/oddzielonego tunelu oraz dost\u0119p do aplikacji.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-e69a7c416265ebe52 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_e69a7c416265ebe52\"><a aria-expanded=\"false\" aria-controls=\"e69a7c416265ebe52\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-3\" data-target=\"#e69a7c416265ebe52\" href=\"#e69a7c416265ebe52\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Cylance Persona<\/span><\/a><\/h4><\/div><div id=\"e69a7c416265ebe52\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_e69a7c416265ebe52\"><div class=\"panel-body toggle-content fusion-clearfix\">Wykonuje ci\u0105g\u0142e uwierzytelnianie i elastyczn\u0105 kontrol\u0119 polityki poprzez opart\u0105 na sztucznej inteligencji analiz\u0119 lokalizacji u\u017cytkownika, analiz\u0119 behawioraln\u0105, wzorce organizacyjne przep\u0142ywu pracy i inne dane telemetryczne dotycz\u0105ce bezpiecze\u0144stwa.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-b9454f6d7271dc8e8 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_b9454f6d7271dc8e8\"><a aria-expanded=\"false\" aria-controls=\"b9454f6d7271dc8e8\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-3\" data-target=\"#b9454f6d7271dc8e8\" href=\"#b9454f6d7271dc8e8\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Integracje z podmiotami zewn\u0119trznymi<\/span><\/a><\/h4><\/div><div id=\"b9454f6d7271dc8e8\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_b9454f6d7271dc8e8\"><div class=\"panel-body toggle-content fusion-clearfix\">Cylance Guard zawiera r\u00f3wnie\u017c wbudowane integracje z danymi z wybranych produkt\u00f3w innych firm, jak r\u00f3wnie\u017c opcje us\u0142ug integracji dodatkowych narz\u0119dzi w razie potrzeby. Analitycy Cylance Guard mog\u0105 dodatkowo wzbogaci\u0107 i nada\u0107 kontekst informacjom o zagro\u017ceniach Cylance Guard poprzez wykorzystanie sztucznej inteligencji Cylance AI do analizy danych dziennika z agregowanych przez aplikacj\u0119 SIEM lub poprzez korelacj\u0119 alarm\u00f3w Cylance Guard z alarmami wywo\u0142anymi przez zestawy regu\u0142 SIEM.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-19 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-center half_right_column_landing image_landing7_column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:30px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:30px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-margin-top-medium:30px;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none powiekszenie\"><a href=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/cylance-guard.png\" class=\"fusion-lightbox\" data-rel=\"iLightbox[01caec4c69e54cead5d]\" data-title=\"cylance guard\" title=\"cylance guard\"><img decoding=\"async\" width=\"508\" height=\"333\" src=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/cylance-guard.png\" alt class=\"img-responsive wp-image-13891\" srcset=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/cylance-guard-200x131.png 200w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/cylance-guard-400x262.png 400w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/cylance-guard.png 508w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 508px\" \/><\/a><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container container_landing nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-blend-mode:overlay;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:80px;--awb-background-color:var(--awb-color2);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-20 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color8);--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Exo 2&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;line-height:1.2;\">Sugerowanie kolejnych krok\u00f3w dzi\u0119ki regu\u0142om biznesowym i uczeniu maszynowemu<\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-21 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:1;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-11 md-text-align-left sm-text-align-left\" style=\"--awb-content-alignment:justify;--awb-font-size:18px;--awb-line-height:1.4;--awb-text-color:#000000;\"><p>Produkty WatchGuard EPDR i WatchGuard EDR s\u0105 unikalnie zasilane przez zautomatyzowane procesy oparte na sztucznej inteligencji oraz posiadaj\u0105 us\u0142ugi typu Threat Hunting, prowadzone przez analityk\u00f3w bezpiecze\u0144stwa WatchGuard.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-22 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory \" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:40px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:2;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-12 md-text-align-left sm-text-align-left fusion-text-no-margin\" style=\"--awb-content-alignment:justify;--awb-font-size:18px;--awb-line-height:1.4;--awb-text-color:#000000;\"><p>Wi\u0119kszo\u015b\u0107 produkt\u00f3w zabezpieczaj\u0105cych punkty ko\u0144cowe blokuje to, o czym wiadomo, \u017ce jest szkodliwe, bada to, co jest podejrzane, i zezwala na to, co nie jest znane \u2013 co umo\u017cliwia z\u0142o\u015bliwemu oprogramowaniu, kt\u00f3re szybko zmienia si\u0119, aby omin\u0105\u0107 mechanizmy obronne wraz z innym nieznanym ruchem. Natomiast produkty WatchGuard EDR i WatchGuard EPDR s\u0105 wyposa\u017cone w us\u0142ug\u0119 Zero-Trust Application Service, kt\u00f3ra klasyfikuje 100% plik\u00f3w wykonywalnych, analizuj\u0105c wszystkie podejrzane i nieznane procesy i aplikacje za pomoc\u0105 specjalnych algorytm\u00f3w uczenia maszynowego na platformie WatchGuard w chmurze, a w razie potrzeby weryfikuj\u0105c je nawet z technikami laboratoryjnymi. W rezultacie wszystkie pliki wykonywalne s\u0105 rozpoznawane jako dobre lub z\u0142o\u015bliwe oprogramowanie, dzi\u0119ki czemu agenci otrzymuj\u0105 tylko potwierdzone alerty z najwy\u017csz\u0105 ochron\u0105 wynikaj\u0105c\u0105 z domy\u015blnej pozycji odmowy w modelu zero-trust model.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-23 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-center half_right_column_landing image_landing7_column \" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-margin-top-medium:30px;--awb-spacing-right-medium:3.84%;--awb-margin-bottom-medium:50px;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:3;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element md-text-align-center\" style=\"text-align:right;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"600\" height=\"300\" title=\"watchguard_edr_epdr\" src=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/watchguard_edr_epdr.png\" alt class=\"img-responsive wp-image-18972\" srcset=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/watchguard_edr_epdr-200x100.png 200w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/watchguard_edr_epdr-400x200.png 400w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/watchguard_edr_epdr.png 600w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 600px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-24 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:30px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:4;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-13\" style=\"--awb-font-size:20px;--awb-text-color:#000000;--awb-text-font-family:&quot;Exo 2&quot;;--awb-text-font-style:normal;--awb-text-font-weight:600;\"><p>Odnajdywanie ukrytych zagro\u017ce\u0144<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-25 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:5;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-14 md-text-align-left sm-text-align-left\" style=\"--awb-content-alignment:justify;--awb-font-size:18px;--awb-line-height:1.4;--awb-text-color:#000000;\"><p>Oparty na chmurze Cylance Optics zapewnia monitorowanie i widoczno\u015b\u0107, kt\u00f3re obejmuj\u0105 ca\u0142\u0105 organizacj\u0119, umo\u017cliwiaj\u0105c wykrywanie i polowanie na zagro\u017cenia zar\u00f3wno dla urz\u0105dze\u0144 online, jak i offline.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-26 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory \" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:40px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:7;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-15 md-text-align-left sm-text-align-left fusion-text-no-margin\" style=\"--awb-content-alignment:justify;--awb-font-size:18px;--awb-line-height:1.4;--awb-text-color:#000000;\"><p>Polowanie na zagro\u017cenia zazwyczaj wymaga wysoko wykwalifikowanej kadry i zajmuje wiele godzin, zanim wykryje zagro\u017cenia i dostarczy informacji, kt\u00f3re pozwol\u0105 jasno okre\u015bli\u0107 spos\u00f3b ich usuni\u0119cia. Zaawansowane rozwi\u0105zania EDR oferuj\u0105 us\u0142ug\u0119 polowania na zagro\u017cenia, w ramach kt\u00f3rej analitycy bezpiecze\u0144stwa WatchGuard monitoruj\u0105 \u015brodowisko punkt\u00f3w ko\u0144cowych klienta i dostarczaj\u0105 informacje o potencjalnych trwaj\u0105cych atakach, w tym analiz\u0119 przyczyn \u017ar\u00f3d\u0142owych, wykryte anomalie, istotne spostrze\u017cenia informatyczne oraz plany redukcji powierzchni ataku. Jest to standardowa funkcja do\u0142\u0105czana do produkt\u00f3w WatchGuard EDR i WatchGuard EPDR, dzi\u0119ki kt\u00f3rej firmy nie musz\u0105 po\u015bwi\u0119ca\u0107 czasu i energii personelu IT na samodzielne badanie zainfekowanych punkt\u00f3w ko\u0144cowych.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-27 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-center half_right_column_landing image_landing7_column \" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-margin-top-medium:30px;--awb-spacing-right-medium:3.84%;--awb-margin-bottom-medium:50px;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:6;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element md-text-align-center\" style=\"text-align:right;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-5 hover-type-none powiekszenie\"><a href=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/podzial_endpointlayers_.png\" class=\"fusion-lightbox\" data-rel=\"iLightbox[10241b01f7646ae9d3b]\" data-title=\"podzial_endpointlayers_\" title=\"podzial_endpointlayers_\"><img decoding=\"async\" width=\"1348\" height=\"564\" src=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/podzial_endpointlayers_.png\" alt class=\"img-responsive wp-image-18973\" srcset=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/podzial_endpointlayers_-200x84.png 200w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/podzial_endpointlayers_-400x167.png 400w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/podzial_endpointlayers_-600x251.png 600w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/podzial_endpointlayers_-800x335.png 800w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/podzial_endpointlayers_-1200x502.png 1200w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/podzial_endpointlayers_.png 1348w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 600px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-28 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-center half_right_column_landing image_landing7_column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:30px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:30px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-margin-top-medium:30px;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:8;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-max-width:400px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-6 hover-type-none powiekszenie\"><a href=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/watchguardes333.png\" class=\"fusion-lightbox\" data-rel=\"iLightbox[1eb68a83420855f5d4c]\" data-title=\"watchguardes333\" title=\"watchguardes333\"><img decoding=\"async\" width=\"665\" height=\"435\" src=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/watchguardes333.png\" alt class=\"img-responsive wp-image-18976\" srcset=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/watchguardes333-200x131.png 200w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/watchguardes333-400x262.png 400w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/watchguardes333-600x392.png 600w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2025\/01\/watchguardes333.png 665w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 600px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-29 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:30px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:30px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-margin-top-medium:20px;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:9;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:13px;--awb-content-font-size:18px;--awb-content-line-height:1.4;--awb-icon-alignment:left;--awb-hover-color:var(--awb-color1);--awb-border-color:#cccccc;--awb-background-color:#ffffff;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:var(--awb-color3);--awb-title-color:#000000;--awb-content-color:var(--awb-color3);--awb-icon-box-color:var(--awb-color6);--awb-toggle-hover-accent-color:var(--awb-color8);--awb-toggle-active-accent-color:var(--awb-color3);--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Lato&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-18967-4\"><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-643015d4bfadaaffc fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_643015d4bfadaaffc\"><a aria-expanded=\"false\" aria-controls=\"643015d4bfadaaffc\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-4\" data-target=\"#643015d4bfadaaffc\" href=\"#643015d4bfadaaffc\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Enhanced Security Policies <\/span><\/a><\/h4><\/div><div id=\"643015d4bfadaaffc\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_643015d4bfadaaffc\"><div class=\"panel-body toggle-content fusion-clearfix\">Enhanced Security Policies umo\u017cliwia profesjonalistom ds. bezpiecze\u0144stwa nadzorowanie lub wzmacnianie punkt\u00f3w ko\u0144cowych przed wykonywaniem podejrzanych skrypt\u00f3w i powszechnych technik ataku wykorzystywanych przez zaawansowane zagro\u017cenia (PowerShell, nieznane skrypty itd.).<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-365ebb2702849095d fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_365ebb2702849095d\"><a aria-expanded=\"false\" aria-controls=\"365ebb2702849095d\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-4\" data-target=\"#365ebb2702849095d\" href=\"#365ebb2702849095d\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Signature files and heuristic technologies<\/span><\/a><\/h4><\/div><div id=\"365ebb2702849095d\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_365ebb2702849095d\"><div class=\"panel-body toggle-content fusion-clearfix\">Signature files and heuristic technologies, znane jako tradycyjna ochrona punkt\u00f3w ko\u0144cowych (EPP), tworz\u0105 warstw\u0119 technologii antywirusowej nowej generacji, kt\u00f3ra ma potwierdzon\u0105 skuteczno\u015b\u0107 w walce z wieloma powszechnymi, niskimi zagro\u017ceniami oraz blokowaniem z\u0142o\u015bliwych adres\u00f3w URL.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-9a6fcdd85d53f8411 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_9a6fcdd85d53f8411\"><a aria-expanded=\"false\" aria-controls=\"9a6fcdd85d53f8411\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-4\" data-target=\"#9a6fcdd85d53f8411\" href=\"#9a6fcdd85d53f8411\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">IoC Search capability<\/span><\/a><\/h4><\/div><div id=\"9a6fcdd85d53f8411\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_9a6fcdd85d53f8411\"><div class=\"panel-body toggle-content fusion-clearfix\">IoC Search capability umo\u017cliwia zespo\u0142om ds. bezpiecze\u0144stwa szybkie przeszukiwanie niedawno ujawnionych incydent\u00f3w oraz odnajdywanie dotkni\u0119tych punkt\u00f3w ko\u0144cowych w analizie \u015bledczej. Obs\u0142ugiwane s\u0105 r\u00f3\u017cne typy wska\u017anik\u00f3w, takie jak MD5\/SHA256, nazwa pliku\/\u015bcie\u017cka, domena\/IPv6\/IPv4 oraz regu\u0142y Yara.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-488a3d681580dbe5a fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_488a3d681580dbe5a\"><a aria-expanded=\"false\" aria-controls=\"488a3d681580dbe5a\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-4\" data-target=\"#488a3d681580dbe5a\" href=\"#488a3d681580dbe5a\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Contextual detection<\/span><\/a><\/h4><\/div><div id=\"488a3d681580dbe5a\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_488a3d681580dbe5a\"><div class=\"panel-body toggle-content fusion-clearfix\">Contextual detection jest bardzo skuteczny przeciwko atakom opartym na skryptach, atakom wykorzystuj\u0105cym narz\u0119dzia systemowe, takie jak PowerShell, WMI, itp., oraz atakom internetowym raz podatno\u015bci przegl\u0105darek internetowych i innych cz\u0119sto atakowanych aplikacji, takich jak Java, Adobe i wiele innych.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-628e4bfe5fe6080b3 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_628e4bfe5fe6080b3\"><a aria-expanded=\"false\" aria-controls=\"628e4bfe5fe6080b3\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-4\" data-target=\"#628e4bfe5fe6080b3\" href=\"#628e4bfe5fe6080b3\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Anti-exploit technology<\/span><\/a><\/h4><\/div><div id=\"628e4bfe5fe6080b3\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_628e4bfe5fe6080b3\"><div class=\"panel-body toggle-content fusion-clearfix\">Anti-exploit technology wyszukuje i wykrywa nietypowe zachowania. Ma to ogromne znaczenie dla punkt\u00f3w ko\u0144cowych, na kt\u00f3rych nie ma poprawek lub kt\u00f3re czekaj\u0105 na poprawki, a tak\u017ce dla punkt\u00f3w ko\u0144cowych z systemami operacyjnymi, kt\u00f3re nie s\u0105 ju\u017c wspierane.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-32672f8c14e610c81 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_32672f8c14e610c81\"><a aria-expanded=\"false\" aria-controls=\"32672f8c14e610c81\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-4\" data-target=\"#32672f8c14e610c81\" href=\"#32672f8c14e610c81\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Zero-Trust Application Service <\/span><\/a><\/h4><\/div><div id=\"32672f8c14e610c81\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_32672f8c14e610c81\"><div class=\"panel-body toggle-content fusion-clearfix\">Zero-Trust Application Service klasyfikuje 100% proces\u00f3w, domy\u015blnie odmawiaj\u0105c ich wykonania, dop\u00f3ki nie uzyskaj\u0105 certyfikatu zaufania. Nie trzeba r\u0119cznie klasyfikowa\u0107 zagro\u017ce\u0144 ani delegowa\u0107 ich do administrator\u00f3w bezpiecze\u0144stwa.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-6dcc05c353850a501 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_6dcc05c353850a501\"><a aria-expanded=\"false\" aria-controls=\"6dcc05c353850a501\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-4\" data-target=\"#6dcc05c353850a501\" href=\"#6dcc05c353850a501\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Threat Hunting Service<\/span><\/a><\/h4><\/div><div id=\"6dcc05c353850a501\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_6dcc05c353850a501\"><div class=\"panel-body toggle-content fusion-clearfix\">Threat Hunting Service opiera si\u0119 na zestawie regu\u0142 polowania na zagro\u017cenia stworzonych przez specjalist\u00f3w ds. cyberbezpiecze\u0144stwa, kt\u00f3re s\u0105 automatycznie przetwarzane w odniesieniu do wszystkich danych zebranych z telemetrii, identyfikuj\u0105c wska\u017aniki ataku (IoAs), kt\u00f3re minimalizuj\u0105 czas wykrycia i reakcji (MTTD i MTTR).<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container container_landing nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-blend-mode:overlay;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:80px;--awb-background-color:var(--awb-color1);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-30 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color8);--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Exo 2&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;line-height:1.2;\">WatchGuard EPP + EPDR<\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-31 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-16 md-text-align-left\" style=\"--awb-content-alignment:justify;--awb-font-size:18px;--awb-line-height:1.4;--awb-text-color:#000000;--awb-margin-top:0px;\"><ul>\n<li>Ochrona punkt\u00f3w ko\u0144cowych przed wirusami, z\u0142o\u015bliwym oprogramowaniem, programami szpieguj\u0105cymi i phishingiem dzi\u0119ki sygnaturom, lokalnej pami\u0119ci podr\u0119cznej, w\u0142asnym \u017ar\u00f3d\u0142om informacji uzyskanym na podstawie z\u0142o\u015bliwego oprogramowania wykrytego wcze\u015bniej przez WatchGuard EDR i WatchGuard EPDR.<\/li>\n<li>WatchGuard EPP centralizuje antywirusy nowej generacji dla wszystkich komputer\u00f3w stacjonarnych, laptop\u00f3w i serwer\u00f3w z systemami Windows, macOS i Linux, a tak\u017ce dla wiod\u0105cych system\u00f3w wirtualizacji i urz\u0105dze\u0144 z systemem Android. Rozwi\u0105zanie pozwala centralnie zarz\u0105dza\u0107 bezpiecze\u0144stwem i poufno\u015bci\u0105 danych przechowywanych na smartfonach i tabletach z systemem Android.<\/li>\n<li>Znajduje exploity zero-day przy u\u017cyciu heurystyki behawioralnej i znanych wska\u017anik\u00f3w atak\u00f3w jako \u201eregu\u0142 kontekstowych\u201d.<\/li>\n<li>Zapewnia skuteczn\u0105 ochron\u0119 punkt\u00f3w ko\u0144cowych (EDR) przed atakami zero-day, oprogramowaniem ransomware, cryptojackingiem i innymi zaawansowanymi atakami ukierunkowanymi przy u\u017cyciu nowych i powstaj\u0105cych modeli AI opartych na uczeniu maszynowym.<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-32 fusion_builder_column_1_1 1_1 fusion-flex-column half_right_column_landing image_landing7_column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:10px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-margin-top-medium:30px;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-max-width:700px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-7 hover-type-none image_landing7\" style=\"border-radius:30px;\"><img decoding=\"async\" width=\"943\" height=\"581\" title=\"watchguardes44\" src=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/watchguardes44.png\" alt class=\"img-responsive wp-image-13906\" srcset=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/watchguardes44-200x123.png 200w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/watchguardes44-400x246.png 400w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/watchguardes44-600x370.png 600w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/watchguardes44-800x493.png 800w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/watchguardes44.png 943w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 943px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-33 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:50px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-17\" style=\"--awb-font-size:20px;--awb-line-height:1.4;--awb-text-color:var(--awb-color3);--awb-text-font-family:&quot;Exo 2&quot;;--awb-text-font-style:normal;--awb-text-font-weight:600;\"><p style=\"text-align: justify;\">Rozszerzenie bezpiecze\u0144stwa, widoczno\u015bci i mo\u017cliwo\u015bci operacyjnych<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-34 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-18\" style=\"--awb-font-size:20px;--awb-line-height:1.4;--awb-text-color:var(--awb-color3);\"><p>Opcjonalne modu\u0142y dost\u0119pne ze wszystkimi produktami bezpiecze\u0144stwa EPP i EDR:<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-35 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:13px;--awb-content-font-size:18px;--awb-content-line-height:1.4;--awb-icon-alignment:left;--awb-hover-color:var(--awb-color1);--awb-border-color:#cccccc;--awb-background-color:#ffffff;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:var(--awb-color3);--awb-title-color:#000000;--awb-content-color:var(--awb-color3);--awb-icon-box-color:var(--awb-color6);--awb-toggle-hover-accent-color:var(--awb-color8);--awb-toggle-active-accent-color:var(--awb-color3);--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:400;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Lato&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-18967-5\"><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-56dd0182acd3326b0 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_56dd0182acd3326b0\"><a aria-expanded=\"false\" aria-controls=\"56dd0182acd3326b0\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-5\" data-target=\"#56dd0182acd3326b0\" href=\"#56dd0182acd3326b0\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">WatchGuard Patch Management<\/span><\/a><\/h4><\/div><div id=\"56dd0182acd3326b0\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_56dd0182acd3326b0\"><div class=\"panel-body toggle-content fusion-clearfix\">to rozwi\u0105zanie do centralnego zarz\u0105dzania aktualizacjami i poprawkami dla system\u00f3w operacyjnych oraz setek aplikacji innych firm i nieobs\u0142ugiwanych program\u00f3w (EOL).<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-38fee890ec69bfbfc fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_38fee890ec69bfbfc\"><a aria-expanded=\"false\" aria-controls=\"38fee890ec69bfbfc\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-5\" data-target=\"#38fee890ec69bfbfc\" href=\"#38fee890ec69bfbfc\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">WatchGuard Full Encryption <\/span><\/a><\/h4><\/div><div id=\"38fee890ec69bfbfc\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_38fee890ec69bfbfc\"><div class=\"panel-body toggle-content fusion-clearfix\">WatchGuard Full Encryption wykorzystuje technologi\u0119 BitLocker firmy Microsoft do szyfrowania i odszyfrowywania informacji z punkt\u00f3w ko\u0144cowych z centralnym zarz\u0105dzaniem kluczami odzyskiwania z platformy zarz\u0105dzania WatchGuard Cloud.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-dcd3b37c26668a497 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_dcd3b37c26668a497\"><a aria-expanded=\"false\" aria-controls=\"dcd3b37c26668a497\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-5\" data-target=\"#dcd3b37c26668a497\" href=\"#dcd3b37c26668a497\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">WatchGuard Advanced Reporting Tool<\/span><\/a><\/h4><\/div><div id=\"dcd3b37c26668a497\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_dcd3b37c26668a497\"><div class=\"panel-body toggle-content fusion-clearfix\">WatchGuard Advanced Reporting Tool automatycznie generuje informacje o zabezpieczeniach i udost\u0119pnia narz\u0119dzia umo\u017cliwiaj\u0105ce identyfikacj\u0119 atak\u00f3w i nietypowych zachowa\u0144 oraz wykrywanie wewn\u0119trznych nadu\u017cy\u0107 w sieci korporacyjnej.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-0fe2eb70b9d148b07 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_0fe2eb70b9d148b07\"><a aria-expanded=\"false\" aria-controls=\"0fe2eb70b9d148b07\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-5\" data-target=\"#0fe2eb70b9d148b07\" href=\"#0fe2eb70b9d148b07\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">WatchGuard SIEM Feeder<\/span><\/a><\/h4><\/div><div id=\"0fe2eb70b9d148b07\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_0fe2eb70b9d148b07\"><div class=\"panel-body toggle-content fusion-clearfix\">WatchGuard SIEM Feeder umo\u017cliwia uzyskanie nowego \u017ar\u00f3d\u0142a informacji o znaczeniu krytycznym dla bezpiecze\u0144stwa wszystkich proces\u00f3w uruchamianych na urz\u0105dzeniach, kt\u00f3re s\u0105 stale monitorowane.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-7db4917e3dd2c55e2 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_7db4917e3dd2c55e2\"><a aria-expanded=\"false\" aria-controls=\"7db4917e3dd2c55e2\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-5\" data-target=\"#7db4917e3dd2c55e2\" href=\"#7db4917e3dd2c55e2\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">WatchGuard DNSWatchGO<\/span><\/a><\/h4><\/div><div id=\"7db4917e3dd2c55e2\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_7db4917e3dd2c55e2\"><div class=\"panel-body toggle-content fusion-clearfix\">WatchGuard DNSWatchGO zapewnia ochron\u0119 na poziomie DNS i filtrowanie tre\u015bci, co zabezpiecza firmy przed phishingiem, oprogramowaniem ransomware i innymi atakami nawet wtedy, gdy u\u017cytkownicy znajduj\u0105 si\u0119 poza sieci\u0105, bez konieczno\u015bci korzystania z VPN.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-36 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:50px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-19 md-text-align-left sm-text-align-left\" style=\"--awb-content-alignment:justify;--awb-font-size:18px;--awb-line-height:1.4;--awb-text-color:#000000;--awb-margin-top:z0;\"><p>Extended Detection and Response (XDR) to nowoczesne podej\u015bcie w dziedzinie cyberbezpiecze\u0144stwa, kt\u00f3re integruje r\u00f3\u017cne narz\u0119dzia detekcji i odpowiedzi na zagro\u017cenia w jedn\u0105 kompleksow\u0105 platform\u0119. XDR jest zaprojektowany w celu zwi\u0119kszenia wydajno\u015bci i efektywno\u015bci w odkrywaniu, analizie oraz reagowaniu na zaawansowane ataki cybernetyczne, zar\u00f3wno na poziomie endpoint\u00f3w, jak i w ca\u0142ej infrastrukturze sieciowej. Dzi\u0119ki temu XDR umo\u017cliwia wykrywanie i analizowanie zaawansowanych zagro\u017ce\u0144 cybernetycznych, a tak\u017ce skuteczn\u0105 reakcj\u0119 na nie poprzez automatyczne podejmowanie dzia\u0142a\u0144 lub wskaz\u00f3wki dla analityk\u00f3w bezpiecze\u0144stwa.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-9 fusion-flex-container container_landing_1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-blend-mode:overlay;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:80px;--awb-background-color:var(--awb-color2);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-37 fusion_builder_column_1_1 1_1 fusion-flex-column half_right_column_landing image_landing7_column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:10px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-margin-top-medium:30px;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-8 hover-type-none\"><img decoding=\"async\" width=\"800\" height=\"530\" title=\"XDR_grafika_800x530\" src=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/XDR_grafika_800x530.png\" alt class=\"img-responsive wp-image-13918\" srcset=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/XDR_grafika_800x530-200x133.png 200w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/XDR_grafika_800x530-400x265.png 400w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/XDR_grafika_800x530-600x398.png 600w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/XDR_grafika_800x530.png 800w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 800px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10 fusion-flex-container container_landing_1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-blend-mode:overlay;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:80px;--awb-background-color:var(--awb-color1);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-38 fusion_builder_column_1_1 1_1 fusion-flex-column heading_landing column_landing\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-20 md-text-align-left sm-text-align-left\" style=\"--awb-content-alignment:justify;--awb-font-size:18px;--awb-line-height:1.4;--awb-text-color:#000000;\"><p>Extended Detection and Response (XDR) to nowoczesne podej\u015bcie w dziedzinie cyberbezpiecze\u0144stwa, kt\u00f3re integruje r\u00f3\u017cne narz\u0119dzia detekcji i odpowiedzi na zagro\u017cenia w jedn\u0105 kompleksow\u0105 platform\u0119. XDR jest zaprojektowany w celu zwi\u0119kszenia wydajno\u015bci i efektywno\u015bci w odkrywaniu, analizie oraz reagowaniu na zaawansowane ataki cybernetyczne, zar\u00f3wno na poziomie endpoint\u00f3w, jak i w ca\u0142ej infrastrukturze sieciowej. Dzi\u0119ki temu XDR umo\u017cliwia wykrywanie i analizowanie zaawansowanych zagro\u017ce\u0144 cybernetycznych, a tak\u017ce skuteczn\u0105 reakcj\u0119 na nie poprzez automatyczne podejmowanie dzia\u0142a\u0144 lub wskaz\u00f3wki dla analityk\u00f3w bezpiecze\u0144stwa.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-11 fusion-flex-container container_landing nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-blend-mode:overlay;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:50px;--awb-background-color:var(--awb-color2);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-39 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color8);--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-left\" style=\"font-family:&quot;Exo 2&quot;;font-style:normal;font-weight:600;margin:0;font-size:1em;line-height:1.2;\">Hillstone iSource | XDR<\/h2><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-40 fusion_builder_column_1_1 1_1 fusion-flex-column half_left_column_landing do_gory \" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-21 md-text-align-left sm-text-align-left\" style=\"--awb-content-alignment:justify;--awb-font-size:18px;--awb-line-height:1.4;--awb-text-color:#000000;\"><p>Hillstone iSource to oparta na danych i sztucznej inteligencji platforma Extended Detection and Response (XDR), kt\u00f3ra integruje ogromne ilo\u015bci danych dotycz\u0105cych bezpiecze\u0144stwa, koreluje i bada incydenty, identyfikuje potencjalne zagro\u017cenia i automatycznie koordynuje zabezpieczenia w celu sp\u00f3jnego reagowania na wiele produkt\u00f3w i platform bezpiecze\u0144stwa. Jest to rozwi\u0105zanie on-premise wdra\u017cane jako software. Dost\u0119pne s\u0105 trzy modele, kt\u00f3re oferuj\u0105 r\u00f3\u017cn\u0105 wydajno\u015b\u0107 i wymagaj\u0105 odpowiedniej konfiguracji sprz\u0119towej. iSource wprowadza radykalnie nowe podej\u015bcie do cyberbezpiecze\u0144stwa z niezr\u00f3wnan\u0105 wydajno\u015bci\u0105 operacji bezpiecze\u0144stwa.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-41 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_right_column_landing image_landing7_column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:40px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-margin-top-medium:30px;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-max-width:700px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-9 hover-type-none\" style=\"border-radius:30px;\"><img decoding=\"async\" width=\"1578\" height=\"801\" title=\"hillstone\" src=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/hillstone.png\" alt class=\"img-responsive wp-image-13920\" srcset=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/hillstone-200x102.png 200w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/hillstone-400x203.png 400w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/hillstone-600x305.png 600w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/hillstone-800x406.png 800w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/hillstone-1200x609.png 1200w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/hillstone.png 1578w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-42 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-color:var(--awb-color6);--awb-bg-color-hover:var(--awb-color6);--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:80px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:13px;--awb-content-font-size:18px;--awb-content-line-height:1.4;--awb-icon-alignment:left;--awb-hover-color:var(--awb-color1);--awb-border-color:#cccccc;--awb-background-color:#ffffff;--awb-divider-color:#e0dede;--awb-divider-hover-color:#e0dede;--awb-icon-color:var(--awb-color3);--awb-title-color:#000000;--awb-content-color:var(--awb-color3);--awb-icon-box-color:var(--awb-color6);--awb-toggle-hover-accent-color:var(--awb-color8);--awb-toggle-active-accent-color:var(--awb-color3);--awb-title-font-family:&quot;Lato&quot;;--awb-title-font-weight:700;--awb-title-font-style:normal;--awb-title-font-size:18px;--awb-content-font-family:&quot;Lato&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-boxed\" id=\"accordion-18967-6\"><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-c44678d76bb8c9941 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_c44678d76bb8c9941\"><a aria-expanded=\"false\" aria-controls=\"c44678d76bb8c9941\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-6\" data-target=\"#c44678d76bb8c9941\" href=\"#c44678d76bb8c9941\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Zagregowany system gromadzenia danych z wielu produkt\u00f3w zabezpieczaj\u0105cych z pe\u0142n\u0105 widoczno\u015bci\u0105<\/span><\/a><\/h4><\/div><div id=\"c44678d76bb8c9941\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_c44678d76bb8c9941\"><div class=\"panel-body toggle-content fusion-clearfix\">Rozwi\u0105zanie XDR firmy Hillstone gromadzi szerok\u0105 gam\u0119 danych z niemal ka\u017cdej us\u0142ugi bezpiecze\u0144stwa w chmurze, sieci i punktach ko\u0144cowych. Nast\u0119pnie konsoliduje te dane w celu dalszego przechowywania i analizy. Proces ten zapobiega silosowaniu informacji o bezpiecze\u0144stwie i znacznie redukuje martwe punkty, jednocze\u015bnie poprawiaj\u0105c dok\u0142adno\u015b\u0107 wykrywania.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-da5c223fc20e9b565 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_da5c223fc20e9b565\"><a aria-expanded=\"false\" aria-controls=\"da5c223fc20e9b565\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-6\" data-target=\"#da5c223fc20e9b565\" href=\"#da5c223fc20e9b565\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Zagregowany system gromadzenia danych z wielu produkt\u00f3w zabezpieczaj\u0105cych z pe\u0142n\u0105 widoczno\u015bci\u0105<\/span><\/a><\/h4><\/div><div id=\"da5c223fc20e9b565\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_da5c223fc20e9b565\"><div class=\"panel-body toggle-content fusion-clearfix\">Dzi\u0119ki synergii danych zebranych z wielu produkt\u00f3w bezpiecze\u0144stwa z najlepszymi partnerami w zakresie analizy zagro\u017ce\u0144, Hillstone XDR mo\u017ce wykrywa\u0107 nawet ukryte ataki. Silniki analizy zachowa\u0144 i korelacji zapewniaj\u0105 kontekstowe i bardzo dok\u0142adne wykrywanie anomalii.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-bfd30c50dd2c2aa0e fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_bfd30c50dd2c2aa0e\"><a aria-expanded=\"false\" aria-controls=\"bfd30c50dd2c2aa0e\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-6\" data-target=\"#bfd30c50dd2c2aa0e\" href=\"#bfd30c50dd2c2aa0e\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Kompleksowe zarz\u0105dzanie podatno\u015bciami i ryzykiem<\/span><\/a><\/h4><\/div><div id=\"bfd30c50dd2c2aa0e\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_bfd30c50dd2c2aa0e\"><div class=\"panel-body toggle-content fusion-clearfix\">Hillstone XDR wykorzystuje wiod\u0105ce w bran\u017cy rozwi\u0105zanie do oceny podatno\u015bci i obs\u0142uguje dodawanie innych skaner\u00f3w, a tak\u017ce r\u0119czne importowanie raport\u00f3w o podatno\u015bciach. Kompleksowe zarz\u0105dzanie ryzykiem dla serwer\u00f3w, punkt\u00f3w ko\u0144cowych, aplikacji i innych zasob\u00f3w identyfikuje i \u0142agodzi potencjalne zagro\u017cenia.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-cc4c6b16df10645c4 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_cc4c6b16df10645c4\"><a aria-expanded=\"false\" aria-controls=\"cc4c6b16df10645c4\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-6\" data-target=\"#cc4c6b16df10645c4\" href=\"#cc4c6b16df10645c4\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Zautomatyzowana orkiestracja bezpiecze\u0144stwa i sp\u00f3jna reakcja<\/span><\/a><\/h4><\/div><div id=\"cc4c6b16df10645c4\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_cc4c6b16df10645c4\"><div class=\"panel-body toggle-content fusion-clearfix\">Po wykryciu zagro\u017cenia lub luki w zabezpieczeniach, nasze rozwi\u0105zanie iSource XDR mo\u017ce automatycznie koordynowa\u0107 reakcj\u0119 na urz\u0105dzeniach zabezpieczaj\u0105cych Hillstone i niekt\u00f3rych produktach innych firm. Wbudowane szablony zapewniaj\u0105 zoptymalizowane przep\u0142ywy pracy i reakcje. Niestandardowe szablony mog\u0105 by\u0107 definiowane w celu spe\u0142nienia r\u00f3\u017cnych wymaga\u0144. Zadania manualne, takie jak przypadki incydent\u00f3w do dalszego zbadania przez analityk\u00f3w bezpiecze\u0144stwa, mog\u0105 by\u0107 r\u00f3wnie\u017c tworzone automatycznie poprzez zdefiniowanie ich w szablonach.<\/div><\/div><\/div><div class=\"fusion-panel panel-default przycisk_tog_zielony panel-913249b29fcaf55d4 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_913249b29fcaf55d4\"><a aria-expanded=\"false\" aria-controls=\"913249b29fcaf55d4\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-18967-6\" data-target=\"#913249b29fcaf55d4\" href=\"#913249b29fcaf55d4\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Ujednolicone zarz\u0105dzanie i raportowanie dzi\u0119ki intuicyjnej i konfigurowalnej konsoli<\/span><\/a><\/h4><\/div><div id=\"913249b29fcaf55d4\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_913249b29fcaf55d4\"><div class=\"panel-body toggle-content fusion-clearfix\">Konfigurowalny pulpit nawigacyjny umo\u017cliwia prosty i szybki dost\u0119p do stanu bezpiecze\u0144stwa organizacji dzi\u0119ki kompleksowym informacjom statystycznym, a tak\u017ce podsumowaniu incydent\u00f3w i trend\u00f3w bezpiecze\u0144stwa za pomoc\u0105 graficznych wykres\u00f3w i list. Konfigurowalne raporty XDR mog\u0105 by\u0107 generowane zgodnie z harmonogramem lub na \u017c\u0105danie.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-12 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:50px;--awb-padding-bottom:80px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-43 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-center half_left_column_landing do_gory\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:30px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-22\" style=\"--awb-font-size:20px;--awb-line-height:1.4;--awb-text-color:var(--awb-color3);--awb-text-font-family:&quot;Exo 2&quot;;--awb-text-font-style:normal;--awb-text-font-weight:600;\"><p style=\"text-align: justify;\">Rozwi\u0105zanie posiada prosty model licencjonowania.<\/p>\n<\/div><div class=\"fusion-text fusion-text-23\" style=\"--awb-font-size:18px;--awb-line-height:1.4;--awb-text-color:var(--awb-color3);\"><p>Do wyboru mamy jedn\u0105 z trzech poni\u017cszych opcji, r\u00f3\u017cni\u0105 si\u0119 one przepustowo\u015bci\u0105 oraz przetwarzaniem wydarze\u0144 na sekund\u0119:<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-44 fusion_builder_column_1_1 1_1 fusion-flex-column half_right_column_landing image_landing7_column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:100%;--awb-margin-top-medium:30px;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-10 hover-type-none\"><img decoding=\"async\" width=\"1135\" height=\"108\" title=\"hillstone2\" src=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/hillstone2.png\" alt class=\"img-responsive wp-image-13923\" srcset=\"https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/hillstone2-200x19.png 200w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/hillstone2-400x38.png 400w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/hillstone2-600x57.png 600w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/hillstone2-800x76.png 800w, https:\/\/teneg.pl\/its\/wp-content\/uploads\/sites\/2\/2024\/07\/hillstone2.png 1135w\" sizes=\"(max-width: 1024px) 100vw, (max-width: 640px) 100vw, 1135px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-45 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-animated\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInDown\" data-animationDuration=\"0.5\" data-animationDelay=\"0.3\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-modal modal fade modal-1 kontakt_pop_up\" tabindex=\"-1\" role=\"dialog\" aria-labelledby=\"modal-heading-1\" aria-hidden=\"true\" style=\"--awb-border-color:rgba(255,255,255,0);--awb-background:#ffffff;\"><div class=\"modal-dialog modal-lg\" role=\"document\"><div class=\"modal-content fusion-modal-content\"><div class=\"modal-header\"><button class=\"close\" type=\"button\" data-dismiss=\"modal\" aria-hidden=\"true\" aria-label=\"Close\">&times;<\/button><h3 class=\"modal-title\" id=\"modal-heading-1\" data-dismiss=\"modal\" aria-hidden=\"true\"> <\/h3><\/div><div class=\"modal-body fusion-clearfix\"><div class=\"fusion-widget-area awb-widget-area-element fusion-widget-area-1 fusion-content-widget-area\" style=\"--awb-margin-top:0px;--awb-margin-right:0px;--awb-margin-bottom:0px;--awb-margin-left:0px;--awb-title-size:0px;--awb-title-color:#333333;--awb-padding:0px 0px 0px 0px;\"><div id=\"custom_html-5\" class=\"widget_text widget widget_custom_html\" style=\"border-style: solid;border-color:transparent;border-width:0px;\"><div class=\"heading\"><h4 class=\"widget-title\">Pop up kontakt<\/h4><\/div><div class=\"textwidget custom-html-widget\"><div style=\"font-size: 18px; font-family: 'Lato'; padding: 10px 5px; margin: 0 auto; font-weight: 500; width: 100%;\">\r\n<div class=\"czarny_przycisk\" style=\"text-align: center; color: #000; margin-bottom: 25px;\">\r\n\t<a style=\"color: #000; font-weight: 500;\" href=\"tel:+48733814554\"><i class=\"fa fa-mobile\" style=\"margin-right: 12px; display: inline-block;\" aria-hidden=\"true\"><\/i>733 814 554<\/a>\r\n\t<\/div>\r\n<div class=\"czarny_przycisk\" style=\"text-align: center; color: #000; margin-bottom: 25px;\">\r\n\t<a style=\"color: #000; font-weight: 500;\" href=\"ma&#105;&#108;&#116;&#111;&#x3a;&#x6b;&#x6f;&#x6e;&#x74;ak&#116;&#64;&#116;&#101;&#x6e;&#x65;&#x67;&#x2e;&#x70;l\"><i class=\"fa fa-at\" style=\"margin-right: 10px; color: black; font-size: 16px;\"><\/i>&#x6b;&#111;n&#x74;&#x61;&#107;t&#x40;&#x74;&#101;n&#x65;&#x67;&#46;p&#x6c;<\/a>\r\n\t<\/div>\r\n<div class=\"czarny_przycisk\" style=\"text-align: center; color: #000;\">\r\n\t<a style=\"color: #000; font-weight: 500;\" href=\"https:\/\/teneg.pl\/its\/kontakt\/\"><i class=\"fa fa-pencil-square-o\" style=\"color: black; margin-right: 10px;\"><\/i>Formularz kontaktowy<\/a>\r\n\t<\/div>\r\n<\/div><\/div><\/div><div class=\"fusion-additional-widget-content\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":17,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"footnotes":""},"class_list":["post-18967","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/pages\/18967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/comments?post=18967"}],"version-history":[{"count":10,"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/pages\/18967\/revisions"}],"predecessor-version":[{"id":19728,"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/pages\/18967\/revisions\/19728"}],"wp:attachment":[{"href":"https:\/\/teneg.pl\/its\/wp-json\/wp\/v2\/media?parent=18967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}