{"id":214,"date":"2019-12-19T09:36:40","date_gmt":"2019-12-19T07:36:40","guid":{"rendered":"http:\/\/itis-adobe.bmg-ua.com\/?page_id=214"},"modified":"2021-04-26T16:52:27","modified_gmt":"2021-04-26T14:52:27","slug":"sybersecurity","status":"publish","type":"page","link":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\n\n\t<section class=\"whiteBg\">\n        <div class=\"container\">\n        <div class=\"blocks solution_inside our_solution\">\n\t\t\t<div class=\"block\">\n                <div class=\"img_cont\" style=\"background-image: url(https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/Network-Security.jpg);\"><\/div>\n                <div class=\"text_cont\">\n                    <div class=\"wrapp\">\n                        <h3>Network perimeter protection<\/h3>\n                        <p>Protection of hardware, software, data and personnel<\/p>\n                    <\/div>\n                    <a href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-perimeter-protection\/\" class=\"button empty\">MORE<\/a>\n                <\/div>\n            <\/div>\n\t\t\t<div class=\"block\">\n                <div class=\"img_cont\" style=\"background-image: url(https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/Workstation-protection.jpg);\"><\/div>\n                <div class=\"text_cont\">\n                    <div class=\"wrapp\">\n                        <h3>Protection of workstations<\/h3>\n                        <p>A comprehensive response to attacks on servers, computers, tablets and mobile devices<\/p>\n                    <\/div>\n                    <a href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-of-workstations\/\" class=\"button empty\">MORE<\/a>\n                <\/div>\n            <\/div>\n\t\t\t<div class=\"block\">\n                <div class=\"img_cont\" style=\"background-image: url(https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/SOC.jpg);\"><\/div>\n                <div class=\"text_cont\">\n                    <div class=\"wrapp\">\n                        <h3>SOC. Construction of a security operations centre<\/h3>\n                        <p>A centralised division of a company that combines SIEM technology, people and processes<\/p>\n                    <\/div>\n                    <a href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/soc\/\" class=\"button empty\">MORE<\/a>\n                <\/div>\n            <\/div>\n\t\t\t<div class=\"block\">\n                <div class=\"img_cont\" style=\"background-image: url(https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/PAM-e1585739659329.jpg);\"><\/div>\n                <div class=\"text_cont\">\n                    <div class=\"wrapp\">\n                        <h3>Account and Privileged Access Management<\/h3>\n                        <p>Audit of actions, control of access, authentication and authorisation of process control<\/p>\n                    <\/div>\n                    <a href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/account-and-privileged-fccess-management\/\" class=\"button empty\">MORE<\/a>\n                <\/div>\n            <\/div>\n\t\t\t<div class=\"block\">\n                <div class=\"img_cont\" style=\"background-image: url(https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/DLP.jpg);\"><\/div>\n                <div class=\"text_cont\">\n                    <div class=\"wrapp\">\n                        <h3>DLP. Data Leak Protection<\/h3>\n                        <p>Hardware and software technology for preventing leaks of confidential information outside the company<\/p>\n                    <\/div>\n                    <a href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/dlp\/\" class=\"button empty\">MORE<\/a>\n                <\/div>\n            <\/div>\n\t\t\t<div class=\"block\">\n                <div class=\"img_cont\" style=\"background-image: url(https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/MDM.jpg);\"><\/div>\n                <div class=\"text_cont\">\n                    <div class=\"wrapp\">\n                        <h3>MDM. Mobile Device Management<\/h3>\n                        <p>Control and protection of mobile devices used by the organisation and&nbsp;staff<\/p>\n                    <\/div>\n                    <a href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/mdm\/\" class=\"button empty\">MORE<\/a>\n                <\/div>\n            <\/div>\n\t\t\t<div class=\"block\">\n                <div class=\"img_cont\" style=\"background-image: url(https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/SIEM.jpg);\"><\/div>\n                <div class=\"text_cont\">\n                    <div class=\"wrapp\">\n                        <h3>SIEM. Security Information and Event Management<\/h3>\n                        <p>Combination of network activity into a single address data&nbsp;set<\/p>\n                    <\/div>\n                    <a href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/siem\/\" class=\"button empty\">MORE<\/a>\n                <\/div>\n            <\/div>\n\t\t\t<div class=\"block\">\n                <div class=\"img_cont\" style=\"background-image: url(https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/Deception.jpg);\"><\/div>\n                <div class=\"text_cont\">\n                    <div class=\"wrapp\">\n                        <h3>Deception technology<\/h3>\n                        <p>real-time detection, analysis and protection against zero-day attacks and other complex attacks<\/p>\n                    <\/div>\n                    <a href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/deception-technology\/\" class=\"button empty\">MORE<\/a>\n                <\/div>\n            <\/div>\n\t\t\t<div class=\"block\">\n                <div class=\"img_cont\" style=\"background-image: url(https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/e-mail-and-web.jpg);\"><\/div>\n                <div class=\"text_cont\">\n                    <div class=\"wrapp\">\n                        <h3>Protection of Office 365 and web traffic<\/h3>\n                        <p>Protection of email systems from complex, unknown and unusual threats, and checking of traffic<\/p>\n                    <\/div>\n                    <a href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/\" class=\"button empty\">MORE<\/a>\n                <\/div>\n            <\/div>\n\t\t\t<div class=\"block\">\n                <div class=\"img_cont\" style=\"background-image: url(https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/Network-telemetry.jpg);\"><\/div>\n                <div class=\"text_cont\">\n                    <div class=\"wrapp\">\n                        <h3>Network telemetry and anomaly detection<\/h3>\n                        <p>A mechanism for dealing with advanced threats using network activity analysis<\/p>\n                    <\/div>\n                    <a href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/network-telemetry-and-anomaly-detection\/\" class=\"button empty\">MORE<\/a>\n                <\/div>\n            <\/div>\n\t\t\t<div class=\"block\">\n                <div class=\"img_cont\" style=\"background-image: url(https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/CASB.jpg);\"><\/div>\n                <div class=\"text_cont\">\n                    <div class=\"wrapp\">\n                        <h3>CASB. Cloud Access Security Broker<\/h3>\n                        <p>Cloud security technology<\/p>\n                    <\/div>\n                    <a href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/casb\/\" class=\"button empty\">MORE<\/a>\n                <\/div>\n            <\/div>\n\t\t\t<div class=\"block\">\n                <div class=\"img_cont\" style=\"background-image: url(https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/Vulnerability-Scanning-Assessment-Management.jpg);\"><\/div>\n                <div class=\"text_cont\">\n                    <div class=\"wrapp\">\n                        <h3>Vulnerability Scanning, Discovery and Management<\/h3>\n                        <p>Preventive measures for reducing information security risks<\/p>\n                    <\/div>\n                    <a href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/vulnerability-scanning-discovery-management\/\" class=\"button empty\">MORE<\/a>\n                <\/div>\n            <\/div>\n        <\/div>\n        <\/div>\n    <\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":2735,"parent":63,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_typography_post_enhancements_disabled":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ITIS | \u041a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0430 | \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0411\u0435\u0437\u043f\u0435\u043a\u0430 \u0411\u0456\u0437\u043d\u0435\u0441\u0443<\/title>\n<meta name=\"description\" content=\"\u0410\u0443\u0434\u0438\u0442 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0431\u0435\u0437\u043f\u0435\u043a\u0438: \u043f\u043e\u0448\u0443\u043a \u0442\u0430 \u043b\u0456\u043a\u0432\u0456\u0434\u0430\u0446\u0456\u044f \u0440\u0438\u0437\u0438\u043a\u0456\u0432 \u0456 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u043e\u0441\u0442\u0435\u0439 \u0456\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0438. \u0417\u0430\u0445\u0438\u0441\u0442 \u043e\u0431\u043b\u0456\u043a\u043e\u0432\u0438\u0445 \u0437\u0430\u043f\u0438\u0441\u0456\u0432, \u0434\u0430\u043d\u0438\u0445 \u0432\u0456\u0434 \u0430\u0442\u0430\u043a \u043d\u0443\u043b\u044c\u043e\u0432\u043e\u0433\u043e \u0434\u043d\u044f.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ITIS | \u041a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0430 | \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0411\u0435\u0437\u043f\u0435\u043a\u0430 \u0411\u0456\u0437\u043d\u0435\u0441\u0443\" \/>\n<meta property=\"og:description\" content=\"\u0410\u0443\u0434\u0438\u0442 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0431\u0435\u0437\u043f\u0435\u043a\u0438: \u043f\u043e\u0448\u0443\u043a \u0442\u0430 \u043b\u0456\u043a\u0432\u0456\u0434\u0430\u0446\u0456\u044f \u0440\u0438\u0437\u0438\u043a\u0456\u0432 \u0456 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u043e\u0441\u0442\u0435\u0439 \u0456\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0438. \u0417\u0430\u0445\u0438\u0441\u0442 \u043e\u0431\u043b\u0456\u043a\u043e\u0432\u0438\u0445 \u0437\u0430\u043f\u0438\u0441\u0456\u0432, \u0434\u0430\u043d\u0438\u0445 \u0432\u0456\u0434 \u0430\u0442\u0430\u043a \u043d\u0443\u043b\u044c\u043e\u0432\u043e\u0433\u043e \u0434\u043d\u044f.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-26T14:52:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.itis.net.ua\/#website\",\"url\":\"https:\/\/www.itis.net.ua\/\",\"name\":\"ITIS \\u0441\\u0438\\u0441\\u0442\\u0435\\u043c\\u043d\\u0430 \\u0456\\u043d\\u0442\\u0435\\u0433\\u0440\\u0430\\u0446\\u0456\\u044f\",\"description\":\"\\u041f\\u0440\\u043e\\u0444\\u0435\\u0441\\u0456\\u0439\\u043d\\u0430 I\\u0422-\\u043f\\u0456\\u0434\\u0442\\u0440\\u0438\\u043c\\u043a\\u0430 \\u0412\\u0430\\u0448\\u043e\\u0433\\u043e \\u0431\\u0456\\u0437\\u043d\\u0435\\u0441\\u0443\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.itis.net.ua\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/cybersecurity.jpg\",\"contentUrl\":\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/cybersecurity.jpg\",\"width\":1024,\"height\":768},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/#webpage\",\"url\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/\",\"name\":\"ITIS | \\u041a\\u0456\\u0431\\u0435\\u0440\\u0431\\u0435\\u0437\\u043f\\u0435\\u043a\\u0430 | \\u0406\\u043d\\u0444\\u043e\\u0440\\u043c\\u0430\\u0446\\u0456\\u0439\\u043d\\u0430 \\u0411\\u0435\\u0437\\u043f\\u0435\\u043a\\u0430 \\u0411\\u0456\\u0437\\u043d\\u0435\\u0441\\u0443\",\"isPartOf\":{\"@id\":\"https:\/\/www.itis.net.ua\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/#primaryimage\"},\"datePublished\":\"2019-12-19T07:36:40+00:00\",\"dateModified\":\"2021-04-26T14:52:27+00:00\",\"description\":\"\\u0410\\u0443\\u0434\\u0438\\u0442 \\u0441\\u0438\\u0441\\u0442\\u0435\\u043c\\u0438 \\u0431\\u0435\\u0437\\u043f\\u0435\\u043a\\u0438: \\u043f\\u043e\\u0448\\u0443\\u043a \\u0442\\u0430 \\u043b\\u0456\\u043a\\u0432\\u0456\\u0434\\u0430\\u0446\\u0456\\u044f \\u0440\\u0438\\u0437\\u0438\\u043a\\u0456\\u0432 \\u0456 \\u0432\\u0440\\u0430\\u0437\\u043b\\u0438\\u0432\\u043e\\u0441\\u0442\\u0435\\u0439 \\u0456\\u043d\\u0444\\u0440\\u0430\\u0441\\u0442\\u0440\\u0443\\u043a\\u0442\\u0443\\u0440\\u0438. \\u0417\\u0430\\u0445\\u0438\\u0441\\u0442 \\u043e\\u0431\\u043b\\u0456\\u043a\\u043e\\u0432\\u0438\\u0445 \\u0437\\u0430\\u043f\\u0438\\u0441\\u0456\\u0432, \\u0434\\u0430\\u043d\\u0438\\u0445 \\u0432\\u0456\\u0434 \\u0430\\u0442\\u0430\\u043a \\u043d\\u0443\\u043b\\u044c\\u043e\\u0432\\u043e\\u0433\\u043e \\u0434\\u043d\\u044f.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Main\",\"item\":\"https:\/\/www.itis.net.ua\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\\u041d\\u0430\\u0448\\u0456 \\u0440\\u0456\\u0448\\u0435\\u043d\\u043d\\u044f\",\"item\":\"https:\/\/www.itis.net.ua\/solution\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\\u041a\\u0438\\u0431\\u0435\\u0440\\u0431\\u0435\\u0437\\u043e\\u043f\\u0430\\u0441\\u043d\\u043e\\u0441\\u0442\\u044c\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ITIS | \u041a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0430 | \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0411\u0435\u0437\u043f\u0435\u043a\u0430 \u0411\u0456\u0437\u043d\u0435\u0441\u0443","description":"\u0410\u0443\u0434\u0438\u0442 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0431\u0435\u0437\u043f\u0435\u043a\u0438: \u043f\u043e\u0448\u0443\u043a \u0442\u0430 \u043b\u0456\u043a\u0432\u0456\u0434\u0430\u0446\u0456\u044f \u0440\u0438\u0437\u0438\u043a\u0456\u0432 \u0456 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u043e\u0441\u0442\u0435\u0439 \u0456\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0438. \u0417\u0430\u0445\u0438\u0441\u0442 \u043e\u0431\u043b\u0456\u043a\u043e\u0432\u0438\u0445 \u0437\u0430\u043f\u0438\u0441\u0456\u0432, \u0434\u0430\u043d\u0438\u0445 \u0432\u0456\u0434 \u0430\u0442\u0430\u043a \u043d\u0443\u043b\u044c\u043e\u0432\u043e\u0433\u043e \u0434\u043d\u044f.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"ITIS | \u041a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0430 | \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0411\u0435\u0437\u043f\u0435\u043a\u0430 \u0411\u0456\u0437\u043d\u0435\u0441\u0443","og_description":"\u0410\u0443\u0434\u0438\u0442 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0431\u0435\u0437\u043f\u0435\u043a\u0438: \u043f\u043e\u0448\u0443\u043a \u0442\u0430 \u043b\u0456\u043a\u0432\u0456\u0434\u0430\u0446\u0456\u044f \u0440\u0438\u0437\u0438\u043a\u0456\u0432 \u0456 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u043e\u0441\u0442\u0435\u0439 \u0456\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0438. \u0417\u0430\u0445\u0438\u0441\u0442 \u043e\u0431\u043b\u0456\u043a\u043e\u0432\u0438\u0445 \u0437\u0430\u043f\u0438\u0441\u0456\u0432, \u0434\u0430\u043d\u0438\u0445 \u0432\u0456\u0434 \u0430\u0442\u0430\u043a \u043d\u0443\u043b\u044c\u043e\u0432\u043e\u0433\u043e \u0434\u043d\u044f.","og_url":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/","og_site_name":"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f","article_modified_time":"2021-04-26T14:52:27+00:00","og_image":[{"width":1024,"height":768,"url":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/cybersecurity.jpg","path":"\/var\/www\/itisyk\/itis.net.ua\/wp-content\/uploads\/2020\/04\/cybersecurity.jpg","size":"full","id":2735,"alt":"","pixels":786432,"type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.itis.net.ua\/#website","url":"https:\/\/www.itis.net.ua\/","name":"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f","description":"\u041f\u0440\u043e\u0444\u0435\u0441\u0456\u0439\u043d\u0430 I\u0422-\u043f\u0456\u0434\u0442\u0440\u0438\u043c\u043a\u0430 \u0412\u0430\u0448\u043e\u0433\u043e \u0431\u0456\u0437\u043d\u0435\u0441\u0443","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itis.net.ua\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/cybersecurity.jpg","contentUrl":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/cybersecurity.jpg","width":1024,"height":768},{"@type":"WebPage","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/#webpage","url":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/","name":"ITIS | \u041a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0430 | \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0411\u0435\u0437\u043f\u0435\u043a\u0430 \u0411\u0456\u0437\u043d\u0435\u0441\u0443","isPartOf":{"@id":"https:\/\/www.itis.net.ua\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/#primaryimage"},"datePublished":"2019-12-19T07:36:40+00:00","dateModified":"2021-04-26T14:52:27+00:00","description":"\u0410\u0443\u0434\u0438\u0442 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0431\u0435\u0437\u043f\u0435\u043a\u0438: \u043f\u043e\u0448\u0443\u043a \u0442\u0430 \u043b\u0456\u043a\u0432\u0456\u0434\u0430\u0446\u0456\u044f \u0440\u0438\u0437\u0438\u043a\u0456\u0432 \u0456 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u043e\u0441\u0442\u0435\u0439 \u0456\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0438. \u0417\u0430\u0445\u0438\u0441\u0442 \u043e\u0431\u043b\u0456\u043a\u043e\u0432\u0438\u0445 \u0437\u0430\u043f\u0438\u0441\u0456\u0432, \u0434\u0430\u043d\u0438\u0445 \u0432\u0456\u0434 \u0430\u0442\u0430\u043a \u043d\u0443\u043b\u044c\u043e\u0432\u043e\u0433\u043e \u0434\u043d\u044f.","breadcrumb":{"@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Main","item":"https:\/\/www.itis.net.ua\/"},{"@type":"ListItem","position":2,"name":"\u041d\u0430\u0448\u0456 \u0440\u0456\u0448\u0435\u043d\u043d\u044f","item":"https:\/\/www.itis.net.ua\/solution\/"},{"@type":"ListItem","position":3,"name":"\u041a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c"}]}]}},"_links":{"self":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/214"}],"collection":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/comments?post=214"}],"version-history":[{"count":15,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/214\/revisions"}],"predecessor-version":[{"id":4126,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/214\/revisions\/4126"}],"up":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/63"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/media\/2735"}],"wp:attachment":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/media?parent=214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}