{"id":303,"date":"2019-12-26T11:05:05","date_gmt":"2019-12-26T09:05:05","guid":{"rendered":"http:\/\/itis-adobe.bmg-ua.com\/?page_id=303"},"modified":"2021-04-26T16:59:12","modified_gmt":"2021-04-26T14:59:12","slug":"protection-office-365-and-web-traffic","status":"publish","type":"page","link":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/","title":{"rendered":"Protection of Office 365 and web traffic"},"content":{"rendered":"\n\t<section class=\"lightBg\">\n        <div class=\"container\">\n            <div class=\"blocks project_inside\">\n                <div class=\"content_solution\">\n                    <div class=\"center\"><h1>Protection of Office 365 and web traffic<\/h1><\/div>\n\t\t\t\t\t<p>A set of technologies for protection against spam, malware, viruses, phishing, malicious links and other threats. Improvement in security levels and reduction in load on mail servers.&nbsp;<\/p>\n<p>Functionality:<br>\n<\/p><ul class=\"type1\"><li>protection against spam and malware in&nbsp;email;<\/li><li>protection of web traffic against complex threats;<\/li><li>transparent and controlled environment;<\/li><li>detailed analytics of recent threats.<\/li><\/ul>\n\n\t\t\t\t\t<div class=\"center p30\"><button class=\"button empty\" id=\"myModalButContent\" data-toggle=\"modal\" data-send=\"\u041a\u043d\u043e\u043f\u043a\u0430 \u0432 \u0442\u0435\u043a\u0441\u0442\u0435 \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b. \u0421\u0442\u0440\u0430\u043d\u0438\u0446\u0430 Protection of Office 365 and web traffic\" data-ga=\"gtag('event', 'event_name', {'event_category': 'consultationZahistOffice365', 'event_action': 'send_ZahistOffice365'});\" data-target=\"#myModal\">REQUEST A CONSULTATION<\/button><\/div>\n\t\t\t\t<\/div>\n                <div class=\"sidebar_solution\">\n\t\t\t\t\t<div class=\"blocks sidebar\">\n\t\t\t\t\t\t<div class=\"block \">\n                            <h3>Business value<\/h3>\n\t\t\t\t\t\t\t<h4><img class=\"alignnone size-full wp-image-1735\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/03\/browser.png\" alt width=\"40\" height=\"40\"> Ready-made service&nbsp;<\/h4>\n<h4><img class=\"alignnone size-full wp-image-1752\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/03\/password.png\" alt width=\"40\" height=\"40\"> Protection of confidential information<\/h4>\n<h4><img class=\"alignnone size-full wp-image-1743\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/03\/employee.png\" alt width=\"40\" height=\"40\"> Saving of financial and IT resources<\/h4>\n\n                        <\/div>\n\t\t\t\t\t\t<div class=\"block \">\n                            <h3>Partners<\/h3>\n\t\t\t\t\t\t\t<div class=\"blocks solutions_partner\">\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/microsoft_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/mcafee_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/trend_micro_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/symantec_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/cisco_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"block\">\n\t\t\t\t\t\t\t\t\t<img class=\"full\" src=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/sophos_partner.png\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n                        <\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n            <\/div>\n        <\/div>\n    <\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":2629,"parent":214,"menu_order":9,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_typography_post_enhancements_disabled":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0411\u0435\u0437\u043f\u0435\u043a\u0430 \u041a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u0414\u043e\u0434\u0430\u0442\u043a\u0456\u0432 | \u0412\u0435\u0431-\u0442\u0440\u0430\u0444\u0456\u043a\u0443 | ITIS<\/title>\n<meta name=\"description\" content=\"\u0417\u0430\u0445\u0438\u0441\u0442 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u0434\u043e\u0434\u0430\u0442\u043a\u0456\u0432 \u0432\u0456\u0434 \u0432\u0456\u0440\u0443\u0441\u0456\u0432, \u0441\u043f\u0430\u043c\u0443, \u0444\u0456\u0448\u0438\u043d\u0433\u0443, \u0437\u043b\u043e\u043c\u0456\u0432, \u0430\u0442\u0430\u043a. \u0417\u0430\u0445\u0438\u0441\u0442 \u0432\u0435\u0431-\u0442\u0440\u0430\u0444\u0456\u043a\u0443. \u0420\u0456\u0448\u0435\u043d\u043d\u044f: Cisco Umbrella, AMP (Advanced Malware Protection), Microsoft, Palo Alto, McAfee, Trend Micro.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0411\u0435\u0437\u043f\u0435\u043a\u0430 \u041a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u0414\u043e\u0434\u0430\u0442\u043a\u0456\u0432 | \u0412\u0435\u0431-\u0442\u0440\u0430\u0444\u0456\u043a\u0443 | ITIS\" \/>\n<meta property=\"og:description\" content=\"\u0417\u0430\u0445\u0438\u0441\u0442 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u0434\u043e\u0434\u0430\u0442\u043a\u0456\u0432 \u0432\u0456\u0434 \u0432\u0456\u0440\u0443\u0441\u0456\u0432, \u0441\u043f\u0430\u043c\u0443, \u0444\u0456\u0448\u0438\u043d\u0433\u0443, \u0437\u043b\u043e\u043c\u0456\u0432, \u0430\u0442\u0430\u043a. \u0417\u0430\u0445\u0438\u0441\u0442 \u0432\u0435\u0431-\u0442\u0440\u0430\u0444\u0456\u043a\u0443. \u0420\u0456\u0448\u0435\u043d\u043d\u044f: Cisco Umbrella, AMP (Advanced Malware Protection), Microsoft, Palo Alto, McAfee, Trend Micro.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/\" \/>\n<meta property=\"og:site_name\" content=\"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-26T14:59:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/e-mail-and-web.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.itis.net.ua\/#website\",\"url\":\"https:\/\/www.itis.net.ua\/\",\"name\":\"ITIS \\u0441\\u0438\\u0441\\u0442\\u0435\\u043c\\u043d\\u0430 \\u0456\\u043d\\u0442\\u0435\\u0433\\u0440\\u0430\\u0446\\u0456\\u044f\",\"description\":\"\\u041f\\u0440\\u043e\\u0444\\u0435\\u0441\\u0456\\u0439\\u043d\\u0430 I\\u0422-\\u043f\\u0456\\u0434\\u0442\\u0440\\u0438\\u043c\\u043a\\u0430 \\u0412\\u0430\\u0448\\u043e\\u0433\\u043e \\u0431\\u0456\\u0437\\u043d\\u0435\\u0441\\u0443\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.itis.net.ua\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/e-mail-and-web.jpg\",\"contentUrl\":\"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/e-mail-and-web.jpg\",\"width\":1600,\"height\":1067,\"caption\":\"Ransomware alert message on a laptop screen - man at work\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/#webpage\",\"url\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/\",\"name\":\"\\u0406\\u043d\\u0444\\u043e\\u0440\\u043c\\u0430\\u0446\\u0456\\u0439\\u043d\\u0430 \\u0411\\u0435\\u0437\\u043f\\u0435\\u043a\\u0430 \\u041a\\u043e\\u0440\\u043f\\u043e\\u0440\\u0430\\u0442\\u0438\\u0432\\u043d\\u0438\\u0445 \\u0414\\u043e\\u0434\\u0430\\u0442\\u043a\\u0456\\u0432 | \\u0412\\u0435\\u0431-\\u0442\\u0440\\u0430\\u0444\\u0456\\u043a\\u0443 | ITIS\",\"isPartOf\":{\"@id\":\"https:\/\/www.itis.net.ua\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/#primaryimage\"},\"datePublished\":\"2019-12-26T09:05:05+00:00\",\"dateModified\":\"2021-04-26T14:59:12+00:00\",\"description\":\"\\u0417\\u0430\\u0445\\u0438\\u0441\\u0442 \\u043a\\u043e\\u0440\\u043f\\u043e\\u0440\\u0430\\u0442\\u0438\\u0432\\u043d\\u0438\\u0445 \\u0434\\u043e\\u0434\\u0430\\u0442\\u043a\\u0456\\u0432 \\u0432\\u0456\\u0434 \\u0432\\u0456\\u0440\\u0443\\u0441\\u0456\\u0432, \\u0441\\u043f\\u0430\\u043c\\u0443, \\u0444\\u0456\\u0448\\u0438\\u043d\\u0433\\u0443, \\u0437\\u043b\\u043e\\u043c\\u0456\\u0432, \\u0430\\u0442\\u0430\\u043a. \\u0417\\u0430\\u0445\\u0438\\u0441\\u0442 \\u0432\\u0435\\u0431-\\u0442\\u0440\\u0430\\u0444\\u0456\\u043a\\u0443. \\u0420\\u0456\\u0448\\u0435\\u043d\\u043d\\u044f: Cisco Umbrella, AMP (Advanced Malware Protection), Microsoft, Palo Alto, McAfee, Trend Micro.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Main\",\"item\":\"https:\/\/www.itis.net.ua\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\\u041d\\u0430\\u0448\\u0456 \\u0440\\u0456\\u0448\\u0435\\u043d\\u043d\\u044f\",\"item\":\"https:\/\/www.itis.net.ua\/solution\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\\u041a\\u0438\\u0431\\u0435\\u0440\\u0431\\u0435\\u0437\\u043e\\u043f\\u0430\\u0441\\u043d\\u043e\\u0441\\u0442\\u044c\",\"item\":\"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"\\u0417\\u0430\\u0449\\u0438\\u0442\\u0430 Office 365 \\u0438 \\u0432\\u0435\\u0431-\\u0442\\u0440\\u0430\\u0444\\u0438\\u043a\\u0430\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0411\u0435\u0437\u043f\u0435\u043a\u0430 \u041a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u0414\u043e\u0434\u0430\u0442\u043a\u0456\u0432 | \u0412\u0435\u0431-\u0442\u0440\u0430\u0444\u0456\u043a\u0443 | ITIS","description":"\u0417\u0430\u0445\u0438\u0441\u0442 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u0434\u043e\u0434\u0430\u0442\u043a\u0456\u0432 \u0432\u0456\u0434 \u0432\u0456\u0440\u0443\u0441\u0456\u0432, \u0441\u043f\u0430\u043c\u0443, \u0444\u0456\u0448\u0438\u043d\u0433\u0443, \u0437\u043b\u043e\u043c\u0456\u0432, \u0430\u0442\u0430\u043a. \u0417\u0430\u0445\u0438\u0441\u0442 \u0432\u0435\u0431-\u0442\u0440\u0430\u0444\u0456\u043a\u0443. \u0420\u0456\u0448\u0435\u043d\u043d\u044f: Cisco Umbrella, AMP (Advanced Malware Protection), Microsoft, Palo Alto, McAfee, Trend Micro.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/","og_locale":"en_US","og_type":"article","og_title":"\u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0411\u0435\u0437\u043f\u0435\u043a\u0430 \u041a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u0414\u043e\u0434\u0430\u0442\u043a\u0456\u0432 | \u0412\u0435\u0431-\u0442\u0440\u0430\u0444\u0456\u043a\u0443 | ITIS","og_description":"\u0417\u0430\u0445\u0438\u0441\u0442 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u0434\u043e\u0434\u0430\u0442\u043a\u0456\u0432 \u0432\u0456\u0434 \u0432\u0456\u0440\u0443\u0441\u0456\u0432, \u0441\u043f\u0430\u043c\u0443, \u0444\u0456\u0448\u0438\u043d\u0433\u0443, \u0437\u043b\u043e\u043c\u0456\u0432, \u0430\u0442\u0430\u043a. \u0417\u0430\u0445\u0438\u0441\u0442 \u0432\u0435\u0431-\u0442\u0440\u0430\u0444\u0456\u043a\u0443. \u0420\u0456\u0448\u0435\u043d\u043d\u044f: Cisco Umbrella, AMP (Advanced Malware Protection), Microsoft, Palo Alto, McAfee, Trend Micro.","og_url":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/","og_site_name":"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f","article_modified_time":"2021-04-26T14:59:12+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/e-mail-and-web.jpg","path":"\/var\/www\/itisyk\/itis.net.ua\/wp-content\/uploads\/2020\/04\/e-mail-and-web.jpg","size":"full","id":2629,"alt":"","pixels":1707200,"type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.itis.net.ua\/#website","url":"https:\/\/www.itis.net.ua\/","name":"ITIS \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f","description":"\u041f\u0440\u043e\u0444\u0435\u0441\u0456\u0439\u043d\u0430 I\u0422-\u043f\u0456\u0434\u0442\u0440\u0438\u043c\u043a\u0430 \u0412\u0430\u0448\u043e\u0433\u043e \u0431\u0456\u0437\u043d\u0435\u0441\u0443","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itis.net.ua\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/e-mail-and-web.jpg","contentUrl":"https:\/\/www.itis.net.ua\/wp-content\/uploads\/2020\/04\/e-mail-and-web.jpg","width":1600,"height":1067,"caption":"Ransomware alert message on a laptop screen - man at work"},{"@type":"WebPage","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/#webpage","url":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/","name":"\u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0411\u0435\u0437\u043f\u0435\u043a\u0430 \u041a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u0414\u043e\u0434\u0430\u0442\u043a\u0456\u0432 | \u0412\u0435\u0431-\u0442\u0440\u0430\u0444\u0456\u043a\u0443 | ITIS","isPartOf":{"@id":"https:\/\/www.itis.net.ua\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/#primaryimage"},"datePublished":"2019-12-26T09:05:05+00:00","dateModified":"2021-04-26T14:59:12+00:00","description":"\u0417\u0430\u0445\u0438\u0441\u0442 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u0438\u0445 \u0434\u043e\u0434\u0430\u0442\u043a\u0456\u0432 \u0432\u0456\u0434 \u0432\u0456\u0440\u0443\u0441\u0456\u0432, \u0441\u043f\u0430\u043c\u0443, \u0444\u0456\u0448\u0438\u043d\u0433\u0443, \u0437\u043b\u043e\u043c\u0456\u0432, \u0430\u0442\u0430\u043a. \u0417\u0430\u0445\u0438\u0441\u0442 \u0432\u0435\u0431-\u0442\u0440\u0430\u0444\u0456\u043a\u0443. \u0420\u0456\u0448\u0435\u043d\u043d\u044f: Cisco Umbrella, AMP (Advanced Malware Protection), Microsoft, Palo Alto, McAfee, Trend Micro.","breadcrumb":{"@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/protection-office-365-and-web-traffic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Main","item":"https:\/\/www.itis.net.ua\/"},{"@type":"ListItem","position":2,"name":"\u041d\u0430\u0448\u0456 \u0440\u0456\u0448\u0435\u043d\u043d\u044f","item":"https:\/\/www.itis.net.ua\/solution\/"},{"@type":"ListItem","position":3,"name":"\u041a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c","item":"https:\/\/www.itis.net.ua\/en\/solution\/sybersecurity\/"},{"@type":"ListItem","position":4,"name":"\u0417\u0430\u0449\u0438\u0442\u0430 Office 365 \u0438 \u0432\u0435\u0431-\u0442\u0440\u0430\u0444\u0438\u043a\u0430"}]}]}},"_links":{"self":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/303"}],"collection":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/comments?post=303"}],"version-history":[{"count":36,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/303\/revisions"}],"predecessor-version":[{"id":4666,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/303\/revisions\/4666"}],"up":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/pages\/214"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/media\/2629"}],"wp:attachment":[{"href":"https:\/\/www.itis.net.ua\/en\/wp-json\/wp\/v2\/media?parent=303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}