{"id":59629,"date":"2023-10-05T07:06:13","date_gmt":"2023-10-05T14:06:13","guid":{"rendered":"https:\/\/www.syteca.com\/?page_id=59629"},"modified":"2025-10-08T09:06:42","modified_gmt":"2025-10-08T16:06:42","slug":"program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift","status":"publish","type":"page","link":"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift","title":{"rendered":"Rozwi\u0105zanie zapewniaj\u0105ce zgodno\u015b\u0107 z programem bezpiecze\u0144stwa klient\u00f3w SWIFT (CSP)"},"content":{"rendered":"\n\t\t<div  class=\"block-f5079566-0004-4154-8340-b273d4980858 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-33f1a298-a759-4ec5-8657-c6a2fbeb87af areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-06767dc3-5c8a-4746-b379-df642c4be14b row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9f4e21aa-6e40-4237-aa04-d082b77c2ced col areoi-element d-flex flex-column align-items-center d-md-block align-self-center\">\n\t\t\t\n\t\t\t\n\n<h1 class=\"wp-block-heading has-text-align-center mb-4\">Rozwi\u0105zanie zapewniaj\u0105ce zgodno\u015b\u0107 z programem bezpiecze\u0144stwa klient\u00f3w SWIFT (CSP)<\/h1>\n\n\n\n<p class=\"has-text-align-center p-poppins mb-0 main-screen-description\">Monitorowanie aktywno\u015bci wewn\u0119trznej i wykrywanie anomalii.  Reaguj na incydenty. <strong>ALL-IN-ONE<\/strong><\/p>\n\n\n\n\t\t<div  class=\"block-fe2ab81d-5e8a-4366-b436-dd1bcb368f76 areoi-element  d-flex flex-column flex-md-row align-items-center justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-23bf6d8e-b086-4039-a88c-8bd6fef74945 btn areoi-has-url position-relative me-lg-2  me-md-2 me-sm-2 me-lg-4 mb-3 hsBtn-demo btn-info  btn-info\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tDost\u0119p do portalu demonstracyjnego \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-73ce0ee1-77c0-4e3c-a888-abf319b5a509 btn areoi-has-url position-relative  mb-3 btn-outline-secondary\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tKontakt \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9428c056-03eb-4d36-99db-c13c1a448840 areoi-element lets-talk overflow-hidden\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a28b1584-40e1-447d-842c-3213af0a030d areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-fe2f94de-d77e-4a85-872a-133e4836a42b row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9ff6eab0-043c-4896-b816-f84dd8e9b484 col areoi-element align-self-center align-self-md-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"pe-xxl-5 p-poppins text-18-15\" style=\"font-style:normal;font-weight:500\">Program bezpiecze\u0144stwa klient\u00f3w SWIFT (CSP) ma na celu zwi\u0119kszenie bezpiecze\u0144stwa interakcji w sieci SWIFT oraz ochron\u0119 podmiot\u00f3w finansowych przed cyberzagro\u017ceniami i oszustwami.<\/p>\n\n\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:500\">Spe\u0142nienie wymaga\u0144 SWIFT CSP mo\u017ce pom\u00f3c Twojej organizacji w zwi\u0119kszeniu og\u00f3lnej odporno\u015bci na zagro\u017cenia cybernetyczne, unikni\u0119ciu kar i sankcji oraz podkre\u015bleniu wiarygodno\u015bci w oczach klient\u00f3w.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b650c22d-713d-4da8-9125-a24caedd1f2e col areoi-element align-self-lg-center d-none d-sm-none d-md-none d-lg-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full text-xxl-end\"><img decoding=\"async\" width=\"816\" height=\"450\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/02234217\/pic.png\" alt=\"\" class=\"wp-image-33400\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/02234217\/pic.png 816w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/02234217\/pic-300x165.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/02234217\/pic-768x424.png 768w\" sizes=\"(max-width: 816px) 100vw, 816px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-73604c08-c68c-4d85-b703-d2a364c95f34 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3e9f05c8-53c2-4be3-8262-251f9fb05728 areoi-element container rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-528d5488-0692-4b46-9511-30b1e05423d6 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-c12185e5-9a7b-464e-8fd7-6bb7ad4d0aae col areoi-element col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading text-center text-xl-start mb-5 mb-xl-0 has-white-color has-text-color\">Korzy\u015bci wynikaj\u0105ce z zastosowania Syteca w celu zapewnienia zgodno\u015bci z wymogami SWIFT CSP<\/h2>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-4ccb3351-28d2-47d5-86f8-f8a4ef551bfd col areoi-element d-flex flex-wrap col-12 col-md-6 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bf2d269d-fd0e-4107-a451-2a0541a483e7 areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 has-white-color has-text-color\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Zwi\u0119ksz bezpiecze\u0144stwo organizacji<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d0c96961-4794-4587-8e06-d1f7abf207ff areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 has-white-color has-text-color\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Wykrywanie zagro\u017ce\u0144 wewn\u0119trznych<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d8b09e86-fa2e-48f8-b795-df3db13ac973 areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 has-white-color has-text-color\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Unikaj kar finansowych i proces\u00f3w s\u0105dowych<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-40018c16-879d-4abc-87c7-64e5f49e290f col areoi-element d-flex flex-wrap col-12 col-md-6 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bf2d269d-fd0e-4107-a451-2a0541a483e7 areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 has-white-color has-text-color\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Bezpieczny dost\u0119p do danych finansowych<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d0c96961-4794-4587-8e06-d1f7abf207ff areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 has-white-color has-text-color\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Zapobieganie naruszeniom bezpiecze\u0144stwa danych<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d8b09e86-fa2e-48f8-b795-df3db13ac973 areoi-element d-flex align-items-center pb-4 pb-xl-0\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:32px\"><img decoding=\"async\" width=\"32\" height=\"32\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/03003946\/checkbox.svg\" alt=\"\" class=\"wp-image-33454\"\/><\/figure>\n\n\n\n<p class=\"mb-0 p-poppins ps-3 has-white-color has-text-color\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Szybko reaguj na zdarzenia<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-60dbec61-9165-4e8e-b118-08454567a119 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 234,0.15)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-4\">Kogo dotyczy SWIFT CSP?<\/h2>\n\n\n\n<p class=\"has-text-align-center p-poppins text-18-15 mb-0\">SWIFT CSP ma zastosowanie do instytucji finansowych i organizacji korzystaj\u0105cych z us\u0142ug SWIFT<br>w zakresie komunikacji finansowej i transakcji:<\/p>\n\n\n\n\t\t<div  class=\"block-b31cd6e9-37a5-4996-a646-36ed1b26e2d1 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-03c7ad3c-a30b-4234-9762-c6730c7d3589 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-2cca471f-cb6f-4a9b-99b6-ededf44b3c57 col areoi-element mb-4 col-12 col-md-6 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2d1a2105-7135-419f-8c4b-cb3ee9377e4d areoi-element rounded-bg-13px d-flex justify-content-center align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.25rem;font-style:normal;font-weight:600\">Banki<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e076ac32-de53-467d-8bdd-f7ddaa2a00f4 col areoi-element mb-4 col-12 col-md-6 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d9b6eccc-bef6-4a4f-8a3e-5dc1b11508fa areoi-element rounded-bg-13px d-flex justify-content-center align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.25rem;font-style:normal;font-weight:600\">Sp\u00f3\u0142dzielcze kasy oszcz\u0119dno\u015bciowo-kredytowe<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-2cca471f-cb6f-4a9b-99b6-ededf44b3c57 col areoi-element mb-4 col-12 col-md-6 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2d1a2105-7135-419f-8c4b-cb3ee9377e4d areoi-element rounded-bg-13px d-flex justify-content-center align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.25rem;font-style:normal;font-weight:600\">Firmy maklerskie<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-dc4c826b-afd7-4a64-9b97-cdbea2a94b2b col areoi-element mb-4 col-12 col-md-6 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-05bd371b-70ff-4f91-b287-10eec469f289 areoi-element rounded-bg-13px d-flex justify-content-center align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.25rem;font-style:normal;font-weight:600\">Dzia\u0142y finansowe<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-2cca471f-cb6f-4a9b-99b6-ededf44b3c57 col areoi-element mb-4 col-12 col-md-6 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2d1a2105-7135-419f-8c4b-cb3ee9377e4d areoi-element rounded-bg-13px d-flex justify-content-center align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.25rem;font-style:normal;font-weight:600\">Operatorzy p\u0142atno\u015bci<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-82078351-f946-4601-b7dc-eff7aa30a448 col areoi-element mb-4 col-12 col-md-6 col-lg-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ff76ff06-a039-4122-99d9-d285f2ce3f08 areoi-element rounded-bg-13px d-flex justify-content-center align-items-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.25rem;font-style:normal;font-weight:600\">Podmioty \u015bwiadcz\u0105ce us\u0142ugi finansowe<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-001592f9-afd0-49f4-bf13-fefa0a5e3ee6 areoi-element container\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-4\">Kluczowe cele programu SWIFT Customer Security Programme (CSP)<\/h2>\n\n\n\n\t\t<div  class=\"block-aee70489-2d24-4383-8a5b-7aa26b4591fd areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center with-link p-poppins text-18-15 mb-0\">SWIFT CSP obejmuje <a href=\"https:\/\/www.swift.com\/myswift\/customer-security-programme-csp\/security-controls\" target=\"_blank\" rel=\"noreferrer noopener\">Customer Security Controls Framework<\/a> (CSCF), kt\u00f3ry definiuje wymagania dotycz\u0105ce kontroli bezpiecze\u0144stwa oraz wytyczne, jakie instytucje finansowe musz\u0105 wdro\u017cy\u0107, aby zabezpieczy\u0107 swoje operacje zwi\u0105zane z systemem SWIFT. SWIFT CSCF przek\u0142ada 24 obowi\u0105zkowe oraz 8 zalecanych kontroli bezpiecze\u0144stwa na nast\u0119puj\u0105ce cele: <\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div id=\"accordion-md\" class=\"block-e9d7a47f-6f76-4bcc-a5e4-848debd9c5b1 accordion\">\n\t\t\t\n\n\t\t<div  class=\"block-2192daca-63c4-432d-8e82-f7972ecacb29 accordion-item accordion-item-01 d-lg-flex mb-4 align-items-center\">\n\n\t\t\t<p \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-2192daca-63c4-432d-8e82-f7972ecacb29-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-2192daca-63c4-432d-8e82-f7972ecacb29-collapse\" \n\t\t\t\t\taria-expanded=\"true\" \n\t\t\t\t\taria-controls=\"block-2192daca-63c4-432d-8e82-f7972ecacb29-collapse\"\n\t\t\t\t>\n\t\t\t\t\tZabezpiecz swoje \u015brodowisko\n\t\t\t\t<\/button>\n\t\t\t<\/p>\n\n\t\t\t<div \n\t\t\t\tid=\"block-2192daca-63c4-432d-8e82-f7972ecacb29-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse show\" \n\t\t\t\taria-labelledby=\"block-2192daca-63c4-432d-8e82-f7972ecacb29-header\"\n\t\t\t\tdata-bs-parent=\".block-e9d7a47f-6f76-4bcc-a5e4-848debd9c5b1\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<ol class=\"wp-block-list ps-lg-5\">\n<li class=\"p-poppins text-20-16\" style=\"font-style:normal;font-weight:500\"> Ogranicz dost\u0119p do internetu i chro\u0144 systemy krytyczne przed og\u00f3lnym \u015brodowiskiem IT<\/li>\n\n\n\n<li class=\"p-poppins text-20-16\" style=\"font-style:normal;font-weight:500\">Ogranicz powierzchni\u0119 ataku i podatno\u015bci<\/li>\n\n\n\n<li class=\"p-poppins text-20-16\" style=\"font-style:normal;font-weight:500\">Zabezpiecz fizycznie \u015brodowisko<\/li>\n<\/ol>\n\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f51b0adf-8944-4e80-840b-50af1455f830 accordion-item accordion-item-02 d-lg-flex mb-4 align-items-center\">\n\n\t\t\t<p \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-f51b0adf-8944-4e80-840b-50af1455f830-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-f51b0adf-8944-4e80-840b-50af1455f830-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-f51b0adf-8944-4e80-840b-50af1455f830-collapse\"\n\t\t\t\t>\n\t\t\t\t\tKontroluj i ogranicz dost\u0119p\n\t\t\t\t<\/button>\n\t\t\t<\/p>\n\n\t\t\t<div \n\t\t\t\tid=\"block-f51b0adf-8944-4e80-840b-50af1455f830-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-f51b0adf-8944-4e80-840b-50af1455f830-header\"\n\t\t\t\tdata-bs-parent=\".block-e9d7a47f-6f76-4bcc-a5e4-848debd9c5b1\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<ol start=\"4\" class=\"wp-block-list ps-lg-3 ps-xl-5\">\n<li class=\"p-poppins text-20-16\" style=\"font-style:normal;font-weight:500\">Zapobiegaj przej\u0119ciu po\u015bwiadcze\u0144<\/li>\n\n\n\n<li class=\"p-poppins text-20-16\" style=\"font-style:normal;font-weight:500\">Zarz\u0105dzaj to\u017csamo\u015bciami i rozdzielaj uprawnienia<\/li>\n<\/ol>\n\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d938bf14-1e8c-4664-b1c1-7700e72d04fe accordion-item accordion-item-03 d-lg-flex align-items-center\">\n\n\t\t\t<p \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-d938bf14-1e8c-4664-b1c1-7700e72d04fe-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-d938bf14-1e8c-4664-b1c1-7700e72d04fe-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-d938bf14-1e8c-4664-b1c1-7700e72d04fe-collapse\"\n\t\t\t\t>\n\t\t\t\t\tWykrywaj i reaguj\n\t\t\t\t<\/button>\n\t\t\t<\/p>\n\n\t\t\t<div \n\t\t\t\tid=\"block-d938bf14-1e8c-4664-b1c1-7700e72d04fe-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-d938bf14-1e8c-4664-b1c1-7700e72d04fe-header\"\n\t\t\t\tdata-bs-parent=\".block-e9d7a47f-6f76-4bcc-a5e4-848debd9c5b1\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<ol start=\"6\" class=\"wp-block-list ps-lg-5 ms-lg-4 ms-xl-0\">\n<li class=\"p-poppins text-20-16\" style=\"font-style:normal;font-weight:500\">Wykrywaj nietypow\u0105 aktywno\u015b\u0107 w systemach lub rejestrach transakcji<\/li>\n\n\n\n<li class=\"p-poppins text-20-16\" style=\"font-style:normal;font-weight:500\">Planuj reagowanie na incydenty i wymian\u0119 informacji<\/li>\n<\/ol>\n\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-21338989-959a-4c56-b8f7-806f5afd5e73 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-47d75ce5-bdca-4ec5-afa1-a0d7e142239b areoi-element container\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-4\">Zachowaj zgodno\u015b\u0107 z SWIFT CSP, korzystaj\u0105c z Syteca<\/h2>\n\n\n\n<p class=\"has-text-align-center p-poppins text-18-15 mb-4 pb-3\">Syteca to uniwersalna platforma do zarz\u0105dzania ryzykiem wewn\u0119trznym, zaprojektowana w celu odstraszania, wykrywania i zak\u0142\u00f3cania zagro\u017ce\u0144 zwi\u0105zanych z dzia\u0142alno\u015bci\u0105 cz\u0142owieka w Twoim \u015brodowisku IT.<br>Zapewnij bezpieczne zarz\u0105dzanie infrastruktur\u0105 SWIFT, spe\u0142nij wi\u0119kszo\u015b\u0107 wymaga\u0144 programu SWIFT CSP i chro\u0144 wra\u017cliwe zasoby swojej organizacji, wdra\u017caj\u0105c Syteca.  <\/p>\n\n\n\n<hr class=\"wp-block-separator aligncenter has-text-color has-alpha-channel-opacity has-background mb-4 mb-lg-5 is-style-default\" style=\"background-color:#1a3b4e;color:#1a3b4e\"\/>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center mb-5\">Szczeg\u00f3\u0142owe mapowanie kontroli bezpiecze\u0144stwa SWIFT CSP na funkcje Syteca<\/h3>\n\n\n\n\t\t<div id=\"swift-tabs\" class=\"block-39f7a67f-3dac-450d-a92a-d8798e433371 areoi-tabs\">\n\t\t\t\n\n\t\t<nav role=\"tablist\" id=\"nav-tab\" class=\"block-91bb0fda-3cc2-4630-b58c-5d491ce3c236 nav d-none d-md-flex flex-column flex-md-row nav-tabs\">\n\t\t\t\n\n\t\t<a aria-controls=\"nav-1\" aria-selected=\"true\" data-bs-target=\"#nav-1\" data-bs-toggle=\"tab\" id=\"nav-tab-1\" class=\"block-7ef8df5f-7d59-4767-a83f-f12b7a4d6498 nav-link nav-link active p-poppins active\" href=\"#tab-1755574799704-0\">\n\t\t\tZabezpiecz swoje \u015brodowisko\n\t\t<\/a>\n\t\n\n\n\t\t<a aria-controls=\"nav-2\" aria-selected=\"false\" data-bs-target=\"#nav-2\" data-bs-toggle=\"tab\" id=\"nav-tab-2\" class=\"block-744ceb98-2493-48e7-9f60-c9d58d2562ef nav-link nav-link p-poppins\" href=\"#tab-1755574799717-1\">\n\t\t\tKontroluj i ogranicz dost\u0119p\n\t\t<\/a>\n\t\n\n\n\t\t<a aria-controls=\"nav-3\" aria-selected=\"false\" data-bs-target=\"#nav-3\" data-bs-toggle=\"tab\" id=\"nav-tab-3\" class=\"block-26df6350-bc54-41d6-b070-7049418d231a nav-link nav-link p-poppins\" href=\"#tab-1755574799726-2\">\n\t\t\tWykrywaj i reaguj\n\t\t<\/a>\n\t\n \n\t\t<\/nav>\n\t\n\n\n\t\t<div id=\"nav-tabContent\" class=\"block-7269bd6d-b05d-44aa-b349-d6dce6a4bc7a areoi-element tab-content  mt-md-4 pt-md-3 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div id=\"accordionSwift\" class=\"block-c6b2dd08-8de6-41e8-859b-ebd186cbae89 areoi-element accordion\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ff5f31e8-6c62-47cf-b887-328de6ec5055 areoi-element accordion-item d-flex flex-wrap justify-content-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"d-md-none rounded-0 accordion-button min-vw-100 nav-link-mobile p-poppins mb-0 has-text-color has-background\" id=\"headingOne\" style=\"color:#ffffff;background-color:#4790ea;font-size:1.25rem\" aria-controls=\"collapseOne\" aria-expanded=\"true\" data-bs-target=\"#collapseOne\" data-bs-toggle=\"collapse\">Kontroluj i ogranicz dost\u0119p<\/p>\n\n\n\n\t\t<div aria-labelledby=\"headingOne\" data-bs-parent=\"#accordionSwift\" id=\"collapseOne\" class=\"block-e86ab46d-8942-40e4-829c-23acdd73fdde areoi-element accordion-collapse collapse show\">\n\t\t\t\n\t\t\t\n\n\t\t<div aria-labelledby=\"nav-tab-1\" role=\"tabpanel\" id=\"nav-1\" class=\"block-488ad73a-43e1-4ac2-8da8-bf42793d8e14 areoi-element tab-pane fade show active accordion-body px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f2f26b48-ae81-42d3-af51-fb8c946853f1 areoi-element table-block-3 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0eba2475-4e8f-452d-bf68-302be348dfa1 areoi-element d-none d-md-flex header-cells flex-column flex-md-row justify-content-between\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0830f57d-4dfc-484f-afe0-1365e1c3862c areoi-element d-inline col-left\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#1a3b4e;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b9538d78-91a7-4761-9728-10fec4078e1e areoi-element d-inline col-right\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#5059ab;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">1.1<\/mark> Ochrona \u015brodowiska SWIFT<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">OBOWI\u0104ZKOWE<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Zapewnij ochron\u0119 infrastruktury SWIFT u\u017cytkownika przed potencjalnie naruszonymi elementami og\u00f3lnego \u015brodowiska IT oraz \u015brodowiska zewn\u0119trznego.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Chro\u0144 stref\u0119 bezpieczn\u0105 SWIFT, konfiguruj\u0105c serwer po\u015brednicz\u0105cy (jump server) i zapewniaj\u0105c dost\u0119p do niego wy\u0142\u0105cznie zaufanym administratorom (zob. <a href=\"#architecture-type-a\">Architektura typu A<\/a>).<\/li>\n\n\n\n<li class=\"with-link mb-3\">Zapewnij widoczno\u015b\u0107 i wykrywaj ryzyka cyberbezpiecze\u0144stwa w swojej strefie bezpiecznej dzi\u0119ki <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/monitoring-aktywnosci-uzytkownika\" target=\"_blank\" rel=\"noreferrer noopener\">ci\u0105g\u0142emu monitorowaniu aktywno\u015bci u\u017cytkownik\u00f3w<\/a>.<\/li>\n\n\n\n<li class=\"with-link\">Zarz\u0105dzaj <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/zarzadzanie-dostepem-uprzywilejowanym\" target=\"_blank\" rel=\"noreferrer noopener\">dost\u0119pem u\u017cytkownik\u00f3w<\/a> w spos\u00f3b szczeg\u00f3\u0142owy, <a href=\"https:\/\/www.syteca.com\/pl?page_id=61016\" target=\"_blank\" rel=\"noreferrer noopener\">monitoruj aktywno\u015b\u0107 uprzywilejowanych u\u017cytkownik\u00f3w<\/a> i <a href=\"https:\/\/www.syteca.com\/pl?page_id=61266\" target=\"_blank\" rel=\"noreferrer noopener\">reaguj na zagro\u017cenia<\/a> w \u015brodowisku SWIFT.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-32495769-9952-4e14-9e47-07cbcf924e98 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">1.2<\/mark> Kontrola uprzywilejowanych kont systemu operacyjnego<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">OBOWI\u0104ZKOWE<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Ogranicz i kontroluj przydzielanie oraz u\u017cywanie kont systemu operacyjnego o poziomie uprawnie\u0144 administratora.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">U\u017cyj funkcji <a href=\"https:\/\/www.syteca.com\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">dodatkowego uwierzytelniania w Syteca<\/a>, aby identyfikowa\u0107 u\u017cytkownik\u00f3w kont wsp\u00f3\u0142dzielonych, takich jak wbudowane konta administratora, oraz zapewnia\u0107 im dost\u0119p.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Unikaj u\u017cywania kont wbudowanych, zapewniaj\u0105c u\u017cytkownikom <a href=\"https:\/\/www.syteca.com\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">uprzywilejowanym tymczasowe uprawnienia dost\u0119pu<\/a> i loginy z obowi\u0105zkow\u0105 <a href=\"https:\/\/docs.syteca.com\/view\/administrator-approval-on-login\" target=\"_blank\" rel=\"noreferrer noopener\">r\u0119czn\u0105 akceptacj\u0105 przez oficera ds. bezpiecze\u0144stwa<\/a>.<\/li>\n\n\n\n<li class=\"with-link\"><a href=\"https:\/\/www.syteca.com\/pl\/produkt\/monitoring-aktywnosci-uzytkownika\" target=\"_blank\" rel=\"noreferrer noopener\">Monitoruj aktywno\u015b\u0107 u\u017cytkownik\u00f3w<\/a> w strefie bezpiecznej, aby kontrolowa\u0107 wszystkie dzia\u0142ania na poziomie administratora, w tym polecenia sudo oraz wykonywane skrypty.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">1.3<\/mark> Ochrona platformy wirtualizacji lub chmurowej<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">OBOWI\u0104ZKOWE<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Zabezpiecz platform\u0119 wirtualizacji lub chmurow\u0105 oraz maszyny wirtualne (VM) hostuj\u0105ce komponenty zwi\u0105zane z SWIFT na takim samym poziomie jak systemy fizyczne.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Zabezpiecz komponenty zwi\u0105zane z SWIFT hostowane na platformie wirtualnej, wdra\u017caj\u0105c Syteca, kt\u00f3ra obs\u0142uguje <a href=\"https:\/\/www.syteca.com\/en\/product\/supported-platforms\/vdi-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">VMware Horizon<\/a>, <a href=\"https:\/\/www.syteca.com\/en\/product\/supported-platforms\/vdi-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Hyper-V<\/a>, <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/monitoring-serwerow\/citrix\" target=\"_blank\" rel=\"noreferrer noopener\">Citrix<\/a>, <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/monitoring-serwerow\/amazon-workspaces-monitorowanie\" target=\"_blank\" rel=\"noreferrer noopener\">Amazon WorkSpaces<\/a>, <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/wdrozenie\/aws\" target=\"_blank\" rel=\"noreferrer noopener\">AWS (Amazon Web Services)<\/a> oraz <a href=\"https:\/\/www.syteca.com\/en\/product\/supported-platforms\/windows-virtual-desktop-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">Windows Virtual Desktops<\/a>.<\/li>\n\n\n\n<li class=\"with-link\">Upro\u015b\u0107 wdro\u017cenie Syteca w swoim \u015brodowisku wirtualnym, integruj\u0105c j\u0105 z golden image maszyny wirtualnej oraz konfiguruj\u0105c elastyczne licencjonowanie p\u0142ywaj\u0105ce.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-32495769-9952-4e14-9e47-07cbcf924e98 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">1.4<\/mark> Ograniczenie dost\u0119pu do internetu<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">OBOWI\u0104ZKOWE<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Kontroluj\/chro\u0144 dost\u0119p do internetu z komputer\u00f3w operator\u00f3w oraz system\u00f3w znajduj\u0105cych si\u0119 w strefie bezpiecznej.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">U\u017cyj <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/zarzadzanie-dostepem-uprzywilejowanym\" target=\"_blank\" rel=\"noreferrer noopener\">modu\u0142u PAM<\/a> w Syteca, aby skonfigurowa\u0107 dost\u0119p do zasob\u00f3w za po\u015brednictwem serwera po\u015brednicz\u0105cego (jump server), kt\u00f3ry nie ma dost\u0119pu do internetu.<\/li>\n\n\n\n<li class=\"with-link\">Wykorzystaj modu\u0142 Connection Manager w Syteca, aby zast\u0105pi\u0107 pow\u0142ok\u0119 systemu Windows, uniemo\u017cliwiaj\u0105c u\u017cytkownikom dost\u0119p do internetu.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">1.5 <\/mark>Ochrona \u015brodowiska klienta<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">OBOWI\u0104ZKOWE<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Zapewnij ochron\u0119 infrastruktury \u0142\u0105czno\u015bci klienta przed \u015brodowiskiem zewn\u0119trznym oraz potencjalnie naruszonymi elementami og\u00f3lnego \u015brodowiska IT.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link\">Chro\u0144 \u015brodowisko klienta, zapewniaj\u0105c dost\u0119p u\u017cytkownikom przy u\u017cyciu modu\u0142u Connection Manager w Syteca.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-32495769-9952-4e14-9e47-07cbcf924e98 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">2.1<\/mark> Bezpiecze\u0144stwo wewn\u0119trznego przep\u0142ywu danych<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">OBOWI\u0104ZKOWE<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Zapewnij poufno\u015b\u0107, integralno\u015b\u0107 i autentyczno\u015b\u0107 przep\u0142ywu danych aplikacji pomi\u0119dzy komponentami u\u017cytkownika zwi\u0105zanymi z SWIFT.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Nadzoruj interakcje z danymi i wykrywaj oznaki potencjalnego niew\u0142a\u015bciwego post\u0119powania z danymi poprzez <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/session-recording\" target=\"_blank\" rel=\"noreferrer noopener\">monitorowanie i rejestrowanie aktywno\u015bci u\u017cytkownik\u00f3w<\/a> w \u015brodowisku IT.<\/li>\n\n\n\n<li class=\"with-link\">Ogranicz ryzyko nieautoryzowanego dost\u0119pu i manipulacji danymi poprzez wdro\u017cenie zaawansowanych mechanizm\u00f3w <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/zarzadzanie-dostepem-uprzywilejowanym\" target=\"_blank\" rel=\"noreferrer noopener\">kontroli dost\u0119pu i uwierzytelniania w Syteca<\/a>.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">2.6 <\/mark>Poufno\u015b\u0107 i integralno\u015b\u0107 sesji operatora<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">OBOWI\u0104ZKOWE<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Chro\u0144 poufno\u015b\u0107 i integralno\u015b\u0107 interaktywnych sesji operatora \u0142\u0105cz\u0105cych si\u0119 z infrastruktur\u0105 SWIFT.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Rejestruj aktywno\u015b\u0107 u\u017cytkownik\u00f3w w sesjach operatora, zapewniaj\u0105c pe\u0142n\u0105 poufno\u015b\u0107 danych osobowych dzi\u0119ki <a href=\"https:\/\/www.syteca.com\/pl\/prywatnosc-uzytkownikow\" target=\"_blank\" rel=\"noreferrer noopener\">anonimizacji monitorowanych danych<\/a>.<\/li>\n\n\n\n<li class=\"with-link\">Chro\u0144 dane sesji przed nieautoryzowanym dost\u0119pem lub manipulacj\u0105 dzi\u0119ki funkcjom <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/zarzadzanie-dostepem-uprzywilejowanym\" target=\"_blank\" rel=\"noreferrer noopener\">zarz\u0105dzania dost\u0119pem<\/a>, szyfrowaniu oraz niezmiennym rejestrom audytowym w Syteca.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-32495769-9952-4e14-9e47-07cbcf924e98 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">2.8<\/mark> Ochrona zlecanych na zewn\u0105trz dzia\u0142a\u0144 krytycznych<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">OBOWI\u0104ZKOWE<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Zapewnij ochron\u0119 lokalnej infrastruktury SWIFT przed ryzykami zwi\u0105zanymi z outsourcingiem dzia\u0142a\u0144 krytycznych.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\"><a href=\"https:\/\/www.syteca.com\/pl\/produkt\/zarzadzanie-dostepem-uprzywilejowanym\" target=\"_blank\" rel=\"noreferrer noopener\">Zapewnij bezpieczny dost\u0119p podmiotom trzecim<\/a> w strefie bezpiecznej bez ujawniania po\u015bwiadcze\u0144. <\/li>\n\n\n\n<li class=\"with-link mb-3\">Zapewnij podmiotom trzecim <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/zarzadzanie-dostepem-uprzywilejowanym\" target=\"_blank\" rel=\"noreferrer noopener\">jednorazowe has\u0142a<\/a> i ogranicz czas ich sesji u\u017cytkownika w swojej infrastrukturze IT.<\/li>\n\n\n\n<li class=\"with-link\">Skonfiguruj obowi\u0105zkow\u0105 r\u0119czn\u0105 akceptacj\u0119 logowania przez oficera ds. bezpiecze\u0144stwa, a nast\u0119pnie nadz\u00f3r <a href=\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/firmy-zewnetrzne\" target=\"_blank\" rel=\"noreferrer noopener\">wideo w czasie rzeczywistym nad aktywno\u015bci\u0105 podmiot\u00f3w trzecich<\/a>.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">2.9<\/mark> Kontrole biznesowe transakcji<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">OBOWI\u0104ZKOWE<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Zapewnij, aby wychodz\u0105ca aktywno\u015b\u0107 transakcyjna mie\u015bci\u0142a si\u0119 w oczekiwanych granicach normalnej dzia\u0142alno\u015bci biznesowej.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Wykorzystaj <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/monitoring-aktywnosci-uzytkownika\" target=\"_blank\" rel=\"noreferrer noopener\">monitorowanie aktywno\u015bci u\u017cytkownik\u00f3w<\/a> oraz <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/zarzadzanie-dostepem-uprzywilejowanym\" target=\"_blank\" rel=\"noreferrer noopener\">zarz\u0105dzanie dost\u0119pem,<\/a> aby ograniczy\u0107 dost\u0119p u\u017cytkownik\u00f3w do okre\u015blonych cz\u0119\u015bci systemu, zapewniaj\u0105c, \u017ce tylko osoby upowa\u017cnione mog\u0105 prowadzi\u0107 dzia\u0142alno\u015b\u0107 z zatwierdzonymi podmiotami.<\/li>\n\n\n\n<li class=\"with-link\">Wykrywaj odchylenia od ustalonych polityk dzi\u0119ki funkcjom <a href=\"https:\/\/www.syteca.com\/pl?page_id=61266\" target=\"_blank\" rel=\"noreferrer noopener\">alert\u00f3w i reagowania<\/a> na incydenty w Syteca.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-c1d49766-8c58-401f-bd20-7d5d00947619 areoi-element accordion-item d-flex flex-wrap justify-content-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"d-md-none rounded-0 accordion-button min-vw-100 nav-link-mobile p-poppins mb-0 has-text-color has-background\" id=\"headingTwo\" style=\"color:#ffffff;background-color:#4790ea;font-size:1.25rem\" aria-controls=\"collapseTwo\" aria-expanded=\"true\" data-bs-target=\"#collapseTwo\" data-bs-toggle=\"collapse\">Kontroluj i ogranicz dost\u0119p<\/p>\n\n\n\n\t\t<div aria-labelledby=\"headingTwo\" data-bs-parent=\"#accordionSwift\" id=\"collapseTwo\" class=\"block-320f73ef-6ec4-42e1-ab59-da458afc19cc areoi-element accordion-collapse collapse\">\n\t\t\t\n\t\t\t\n\n\t\t<div aria-labelledby=\"nav-tab-2\" role=\"tabpanel\" id=\"nav-2\" class=\"block-267e7042-5b86-4665-b772-3a2018c82475 areoi-element tab-pane accordion-body px-0 fade\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6fd1373c-03d5-4dce-bcf7-11fdfcb1e07d areoi-element table-block-3 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-44925e8f-53ac-40ca-b80c-9e61d8ce9a00 areoi-element d-none d-md-flex header-cells flex-column flex-md-row justify-content-between\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0830f57d-4dfc-484f-afe0-1365e1c3862c areoi-element d-inline col-left\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#1a3b4e;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b9538d78-91a7-4761-9728-10fec4078e1e areoi-element d-inline col-right\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#5059ab;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-14f448de-0cdc-42c1-8a24-6b72e89890c6 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">4.2<\/mark> Uwierzytelnianie wielosk\u0142adnikowe<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">OBOWI\u0104ZKOWE<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Zapobiegaj przej\u0119ciu pojedynczego czynnika uwierzytelniania umo\u017cliwiaj\u0105cego dost\u0119p do system\u00f3w SWIFT poprzez wdro\u017cenie uwierzytelniania wielosk\u0142adnikowego.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link\">Zabezpiecz konta u\u017cytkownik\u00f3w, weryfikuj\u0105c ich to\u017csamo\u015b\u0107 za pomoc\u0105 funkcji uwierzytelniania dwusk\u0142adnikowego (<a href=\"https:\/\/www.syteca.com\/en\/two-factor-authentication-tool\" target=\"_blank\" rel=\"noreferrer noopener\">2FA<\/a>) w Syteca.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bb97746e-3284-4b51-8a69-5495858042da areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">5.1<\/mark> Logiczna kontrola dost\u0119pu<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">OBOWI\u0104ZKOWE<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Wymuszaj stosowanie zasad bezpiecze\u0144stwa dotycz\u0105cych dost\u0119pu zgodnego z potrzeb\u0105 wiedzy, minimalnych uprawnie\u0144 oraz rozdzia\u0142u obowi\u0105zk\u00f3w dla kont operator\u00f3w.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Wymuszaj zasad\u0119 minimalnych uprawnie\u0144 oraz rozdzia\u0142 obowi\u0105zk\u00f3w, wykorzystuj\u0105c funkcje <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/zarzadzanie-dostepem-uprzywilejowanym\" target=\"_blank\" rel=\"noreferrer noopener\">zarz\u0105dzania dost\u0119pem uprzywilejowanym (PAM)<\/a> w Syteca.<\/li>\n\n\n\n<li class=\"with-link mb-3\">U\u017cyj funkcji <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/zarzadzanie-dostepem-uprzywilejowanym\" target=\"_blank\" rel=\"noreferrer noopener\">zarz\u0105dzania has\u0142ami<\/a> w Syteca, aby zapewni\u0107 u\u017cytkownikom jednorazowy dost\u0119p, ograniczy\u0107 czas ich sesji oraz zautomatyzowa\u0107 nadawanie po\u015bwiadcze\u0144.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Skonfiguruj proces \u017c\u0105dania i zatwierdzania w celu szczeg\u00f3\u0142owego zarz\u0105dzania uprawnieniami dost\u0119pu.<\/li>\n\n\n\n<li class=\"with-link\">Konfiguracja procesu \u017c\u0105dania i zatwierdzania w celu szczeg\u00f3\u0142owego zarz\u0105dzania uprawnieniami dost\u0119pu.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ec1fc205-5ae5-4903-9fd6-e8ae7fe48384 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">5.1<\/mark> Ochrona repozytorium hase\u0142<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">OBOWI\u0104ZKOWE<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Chro\u0144 fizycznie i logicznie repozytorium zapisanych hase\u0142.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Zabezpiecz swoje has\u0142a, przechowuj\u0105c je w zaszyfrowanym skarbcu hase\u0142 Syteca.<\/li>\n\n\n\n<li class=\"with-link mb-3\"><a href=\"https:\/\/www.syteca.com\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">Uwierzytelniaj u\u017cytkownik\u00f3w<\/a> bez ujawniania im po\u015bwiadcze\u0144.<\/li>\n\n\n\n<li class=\"with-link\">Automatycznie rotuj po\u015bwiadczenia kont bez udzia\u0142u u\u017cytkownik\u00f3w.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ff5f31e8-6c62-47cf-b887-328de6ec5055 areoi-element accordion-item d-flex flex-wrap justify-content-center\">\n\t\t\t\n\t\t\t\n\n<p class=\"rounded-0 d-md-none accordion-button min-vw-100 nav-link-mobile p-poppins mb-0 has-text-color has-background\" id=\"headingThree\" style=\"color:#ffffff;background-color:#4790ea;font-size:1.25rem\" aria-controls=\"collapseThree\" aria-expanded=\"true\" data-bs-target=\"#collapseThree\" data-bs-toggle=\"collapse\">Wykrywaj i reaguj<\/p>\n\n\n\n\t\t<div aria-labelledby=\"headingThree\" data-bs-parent=\"#accordionSwift\" id=\"collapseThree\" class=\"block-e86ab46d-8942-40e4-829c-23acdd73fdde areoi-element accordion-collapse collapse\">\n\t\t\t\n\t\t\t\n\n\t\t<div aria-labelledby=\"nav-tab-3\" role=\"tabpanel\" id=\"nav-3\" class=\"block-6bcbfd6f-7f04-42f0-9fcc-1a55a35dbd16 areoi-element tab-pane accordion-body px-0 fade\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f2f26b48-ae81-42d3-af51-fb8c946853f1 areoi-element table-block-3 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0eba2475-4e8f-452d-bf68-302be348dfa1 areoi-element d-none d-md-flex header-cells flex-column flex-md-row justify-content-between\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0830f57d-4dfc-484f-afe0-1365e1c3862c areoi-element d-inline col-left\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#1a3b4e;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b9538d78-91a7-4761-9728-10fec4078e1e areoi-element d-inline col-right\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center p-3 p-poppins text-20-16 d-flex align-items-center h-100 justify-content-center has-text-color has-background\" style=\"color:#fbfbfb;background-color:#5059ab;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">6.4<\/mark> Rejestrowanie i monitorowanie<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">OBOWI\u0104ZKOWE<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Rejestruj zdarzenia zwi\u0105zane z bezpiecze\u0144stwem oraz wykrywaj anomalne dzia\u0142ania i operacje w lokalnym \u015brodowisku SWIFT.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\"><a href=\"https:\/\/www.syteca.com\/pl\/produkt\/monitoring-aktywnosci-uzytkownika\" target=\"_blank\" rel=\"noreferrer noopener\">Monitoruj aktywno\u015b\u0107 u\u017cytkownik\u00f3w<\/a> oraz obserwuj na \u017cywo i odtwarzaj zarejestrowane sesje u\u017cytkownik\u00f3w w lokalnym \u015brodowisku SWIFT.<\/li>\n\n\n\n<li class=\"with-link mb-3\"><a href=\"https:\/\/www.syteca.com\/pl\/produkt\/session-recording\" target=\"_blank\" rel=\"noreferrer noopener\">Rejestruj sesje u\u017cytkownik\u00f3w<\/a> w formacie przeszukiwalnych zrzut\u00f3w ekranu indeksowanych wielowarstwow\u0105 metadanymi, w tym nazwami uruchomionych aplikacji, odwiedzonych adres\u00f3w URL, wprowadzonych polece\u0144 oraz wpisanych znak\u00f3w z klawiatury.<\/li>\n\n\n\n<li class=\"with-link\">Zbieraj zaszyfrowane logi wszystkich zmian w konfiguracjach Syteca, aby zwi\u0119kszy\u0107 odpowiedzialno\u015b\u0107 administrator\u00f3w systemu.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-32495769-9952-4e14-9e47-07cbcf924e98 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">6.5A <\/mark>Wykrywanie w\u0142ama\u0144<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#10ce9e;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">ZALECANE<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Wykrywaj i powstrzymuj anomaln\u0105 aktywno\u015b\u0107 sieciow\u0105 w lokalnym lub zdalnym \u015brodowisku SWIFT.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Otrzymuj powiadomienia w czasie rzeczywistym o zdarzeniach zwi\u0105zanych z bezpiecze\u0144stwem dzi\u0119ki konfigurowalnym <a href=\"https:\/\/www.syteca.com\/pl?page_id=61266\" target=\"_blank\" rel=\"noreferrer noopener\">alertom aktywno\u015bci u\u017cytkownik\u00f3w<\/a> w Syteca.<\/li>\n\n\n\n<li class=\"with-link\">Wykorzystaj modu\u0142 analizy zachowa\u0144 u\u017cytkownik\u00f3w i podmiot\u00f3w (UEBA) w Syteca oparty na sztucznej inteligencji do automatycznego wykrywania anomalii w zachowaniu u\u017cytkownik\u00f3w, takich jak logowanie do systemu poza godzinami pracy.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">7.1<\/mark> Planowanie reagowania na incydenty cyberbezpiecze\u0144stwa<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">OBOWI\u0104ZKOWE<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Zapewnij sp\u00f3jne i skuteczne podej\u015bcie do zarz\u0105dzania incydentami cyberbezpiecze\u0144stwa.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\"><a href=\"https:\/\/www.syteca.com\/pl?page_id=61266\" target=\"_blank\" rel=\"noreferrer noopener\">Zapewnij szybk\u0105 reakcj\u0119<\/a> na wykryte zagro\u017cenia i incydenty bezpiecze\u0144stwa poprzez blokowanie u\u017cytkownik\u00f3w, ograniczanie niedozwolonych urz\u0105dze\u0144 USB oraz zatrzymywanie podejrzanych proces\u00f3w.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Zbieraj wszystkie informacje zwi\u0105zane z bezpiecze\u0144stwem w jednym miejscu, integruj\u0105c Syteca z systemem SIEM oraz systemem zg\u0142oszeniowym.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Usprawnij zarz\u0105dzanie incydentami dzi\u0119ki funkcjom <a href=\"https:\/\/www.syteca.com\/pl?page_id=61268\" target=\"_blank\" rel=\"noreferrer noopener\">raportowania <\/a>i <a href=\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/zbadaj-incydenty-bezpieczenstwa\" target=\"_blank\" rel=\"noreferrer noopener\">analizy incydent\u00f3w<\/a> w Syteca.<\/li>\n\n\n\n<li class=\"with-link\">Eksportuj sesje u\u017cytkownik\u00f3w w chronionym formacie na potrzeby analiz \u015bledczych.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-32495769-9952-4e14-9e47-07cbcf924e98 areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6b2dad63-5761-4e45-9c2f-bd01dbd2137e areoi-element col-12 d-inline py-md-4 col-left cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">7.2<\/mark> Szkolenia i podnoszenie \u015bwiadomo\u015bci w zakresie bezpiecze\u0144stwa<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#4790ea;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">OBOWI\u0104ZKOWE<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Zapewnij, aby ca\u0142y personel by\u0142 \u015bwiadomy swoich obowi\u0105zk\u00f3w w zakresie bezpiecze\u0144stwa i je realizowa\u0142, poprzez regularne szkolenia oraz dzia\u0142ania podnosz\u0105ce \u015bwiadomo\u015b\u0107 w zakresie bezpiecze\u0144stwa.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7ef02b9a-1dbc-49be-853e-f8a5310798ed areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right cell-bg\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link mb-3\">Wspieraj szkolenia z zakresu bezpiecze\u0144stwa, <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/session-recording\" target=\"_blank\" rel=\"noreferrer noopener\">prezentuj\u0105c dane zebrane przez Syteca<\/a> w formie materia\u0142\u00f3w wideo o charakterze edukacyjnym.<\/li>\n\n\n\n<li class=\"with-link mb-3\">Pomagaj u\u017cytkownikom w rozwijaniu dobrych nawyk\u00f3w w zakresie cyberbezpiecze\u0144stwa, wy\u015bwietlaj\u0105c powiadomienia ostrzegawcze w odpowiedzi na niedozwolone dzia\u0142ania.<\/li>\n\n\n\n<li class=\"with-link\">Nadzoruj, w jaki spos\u00f3b pracownicy przyswoili materia\u0142y szkoleniowe, <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/monitoring-aktywnosci-uzytkownika\" target=\"_blank\" rel=\"noreferrer noopener\">monitoruj\u0105c ich zachowanie<\/a>.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3116e5c4-31f4-47d1-84d4-ba3978f693ef areoi-element d-flex flex-column flex-md-row\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6d50e20c-1081-41e7-8ac8-afdccde972e6 areoi-element col-12 d-inline py-md-4 col-left\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-md-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#1a3b4e;font-size:1.13rem;font-style:normal;font-weight:600\">Kontrola bezpiecze\u0144stwa wymagana przez SWIFT CSP<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3387b868-e55c-4582-8a84-18101090c388 areoi-element d-flex justify-content-lg-between flex-column-reverse flex-lg-row px-3 px-lg-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-18-15\" style=\"font-style:normal;font-weight:600\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#86898b\" class=\"has-inline-color\">7.4A <\/mark>Ocena ryzyka oparta na scenariuszach<\/p>\n\n\n\n<p class=\"ms-xl-3 h-100 mt-4 mt-md-0 p-poppins d-flex justify-content-center align-items-center has-text-color has-background\" style=\"color:#ffffff;background-color:#10ce9e;font-size:13px;font-style:normal;font-weight:600; max-width:125px;border-radius:99px;padding:5px 12px\">ZALECANE<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"px-3 px-lg-4 mb-0\">Oce\u0144 ryzyko i gotowo\u015b\u0107 organizacji w oparciu o wiarygodne scenariusze atak\u00f3w cybernetycznych.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-46d6e6bf-da64-4982-bc6f-717dcf001157 areoi-element col-12 d-inline d-md-flex align-items-center py-md-4 col-right\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f9ca2802-73b6-4abb-8a0a-2074fc0baf84 areoi-element d-flex justify-content-center d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center min-vw-100 p-poppins text-20-16 px-5 py-3 mt-4 mb-0 has-text-color has-background\" style=\"color:#ffffff;background-color:#5059ab;font-size:1.13rem;font-style:normal;font-weight:600\">Odpowiadaj\u0105ca funkcjonalno\u015b\u0107 Syteca<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<ul class=\"wp-block-list mb-0 ms-3 ms-lg-4 py-4 py-md-0 pe-3 px-lg-4\">\n<li class=\"with-link\"><a href=\"https:\/\/www.syteca.com\/pl?page_id=61268\" target=\"_blank\" rel=\"noreferrer noopener\">Przeprowadzaj audyty bezpiecze\u0144stwa <\/a>w celu oceny skuteczno\u015bci \u015brodk\u00f3w ochrony organizacji wobec r\u00f3\u017cnych scenariuszy atak\u00f3w cybernetycznych oraz identyfikacji potencjalnych podatno\u015bci.<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-05dd2942-bd64-460c-ae94-eca3036eaaef areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-0 pb-5\">Schematy wdro\u017cenia<\/h2>\n\n\n\n\t\t<div  class=\"block-4f1e058b-3cc9-481b-988c-cbd3014496b1 areoi-element container marked-container marked-container-green mt-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-88ccc4a9-1ad9-43a8-a437-b9f326810121 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-19626473-12af-4ebb-9cf9-73e37592a4f9 col areoi-element col-12\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading mb-3 mb-md-4 h3-marked\" id=\"architecture-type-a\">Architektura typu A: infrastruktura SWIFT w lokalizacji u\u017cytkownika<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1260\" height=\"807\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04004035\/Scheme-A.svg\" alt=\"\" class=\"wp-image-33847\"\/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-14f90241-e241-4582-8f20-bdb2e39eccec areoi-element container marked-container marked-container-green\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d0752c14-06ca-49c9-9912-b4b20b0e2e3c row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-19626473-12af-4ebb-9cf9-73e37592a4f9 col areoi-element col-12\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading mb-3 mb-md-4 h3-marked\">Architektura typu B: infrastruktura SWIFT poza lokalizacj\u0105 u\u017cytkownika<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1260\" height=\"582\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04004056\/Scheme-B.svg\" alt=\"\" class=\"wp-image-33854\"\/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-482cd139-19ca-410a-8815-1ddd91ffdb61 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center pb-5 has-text-color\" style=\"color:#ffffff\">Dlaczego Syteca?<\/h2>\n\n\n\n\t\t<div  class=\"block-b462f339-5997-4c1b-91a4-a804a236a314 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2466dbb9-e8be-4277-b563-39ad5d3a82b7 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-30bfbb28-a547-4052-89ea-ac6eb306173f col areoi-element col-12 col-md-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ba5a62e8-eef2-4ff8-987b-ae34866c1bed areoi-element d-flex align-items-center pb-4 flex-md-column\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image pb-md-3\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04001341\/rocket.svg\" alt=\"\" class=\"wp-image-33774\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left p-poppins text-18-15 mb-0 ps-3 px-md-3 pt-md-1 text-md-center has-text-color\" style=\"color:#fffbfb;font-style:normal;font-weight:600\">\u0141atwa konserwacja i wdro\u017cenie<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-30bfbb28-a547-4052-89ea-ac6eb306173f col areoi-element col-12 col-md-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ba5a62e8-eef2-4ff8-987b-ae34866c1bed areoi-element d-flex align-items-center pb-4 flex-md-column\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image pb-md-3\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04002814\/licensing.svg\" alt=\"\" class=\"wp-image-33794\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left p-poppins text-18-15 mb-0 ps-3 px-md-3 pt-md-1 text-md-center has-text-color\" style=\"color:#fffbfb;font-style:normal;font-weight:600\">Elastyczne licencjonowanie<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bea2f6d5-878e-45b9-93ed-3abf250cda0f col areoi-element col-12 col-md-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-c1008a6c-3825-4e48-89de-60f8f704b783 areoi-element d-flex align-items-center pb-4 flex-md-column\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image pb-md-3\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04002923\/enterprise.svg\" alt=\"\" class=\"wp-image-33808\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left p-poppins text-18-15 mb-0 ps-3 px-md-3 pt-md-1 text-md-center has-text-color\" style=\"color:#fffbfb;font-style:normal;font-weight:600\">Idealne rozwi\u0105zanie dla firm niezale\u017cnie od ich wielko\u015bci<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-943c2de5-5a93-41a8-bf36-c0abd8718588 col areoi-element col-12 col-md-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a2b4261e-910c-4f9d-80bd-c9738a14713b areoi-element d-flex align-items-center pb-4 flex-md-column\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image pb-md-3\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04002852\/support.svg\" alt=\"\" class=\"wp-image-33801\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left p-poppins text-18-15 mb-0 ps-3 px-md-3 pt-md-1 text-md-center has-text-color\" style=\"color:#fffbfb;font-style:normal;font-weight:600\">Wsparcie 24\/7 od wewn\u0119trznego zespo\u0142u<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-943c2de5-5a93-41a8-bf36-c0abd8718588 col areoi-element col-12 col-md-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a2b4261e-910c-4f9d-80bd-c9738a14713b areoi-element d-flex align-items-center pb-4 flex-md-column\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image pb-md-3\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04002957\/lightweight.svg\" alt=\"\" class=\"wp-image-33815\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left p-poppins text-18-15 mb-0 ps-3 px-md-3 pt-md-1 text-md-center has-text-color\" style=\"color:#fffbfb;font-style:normal;font-weight:600\">Lekki agent oprogramowania<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7843897a-cc45-4835-a25f-fa4c03112c41 col areoi-element col-12 col-md-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-1c424610-8104-4216-a33d-58738342b3d8 areoi-element d-flex align-items-center pb-4 flex-md-column\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image pb-md-3\">\n<figure class=\"aligncenter size-large\" style=\"min-width:60px\"><img decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04003040\/data.svg\" alt=\"\" class=\"wp-image-33829\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left p-poppins text-18-15 mb-0 ps-3 px-md-3 pt-md-1 text-md-center has-text-color\" style=\"color:#fffbfb;font-style:normal;font-weight:600\">Wysoce zoptymalizowane formaty przechowywania danych<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9ce5d62b-ff08-472a-b30f-210166152223 col areoi-element col-12 col-md-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-eed4ffe1-85f0-4563-b7ea-0da14fc97743 areoi-element d-flex align-items-center pb-4 flex-md-column\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image pb-md-3\">\n<figure class=\"aligncenter size-large\" style=\"min-width:60px\"><img decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04003022\/server.svg\" alt=\"\" class=\"wp-image-33822\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left p-poppins text-18-15 mb-0 ps-3 px-md-3 pt-md-1 text-md-center has-text-color\" style=\"color:#fffbfb;font-style:normal;font-weight:600\">Pe\u0142ne wsparcie dla system\u00f3w operacyjnych serwerowych i stacyjnych<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9ce5d62b-ff08-472a-b30f-210166152223 col areoi-element col-12 col-md-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-eed4ffe1-85f0-4563-b7ea-0da14fc97743 areoi-element d-flex align-items-center pb-4 flex-md-column\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image pb-md-3\">\n<figure class=\"aligncenter size-large\" style=\"min-width:60px\"><img decoding=\"async\" width=\"60\" height=\"61\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/10\/04003058\/protection.svg\" alt=\"\" class=\"wp-image-33836\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left p-poppins text-18-15 mb-0 ps-3 px-md-3 pt-md-1 text-md-center has-text-color\" style=\"color:#fffbfb;font-style:normal;font-weight:600\">Ochrona prywatno\u015bci dzi\u0119ki anonimizacji danych u\u017cytkownik\u00f3w<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d5bca69d-998c-4d69-822d-1ab54814d510 areoi-element container\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-5\">FAQ<\/h2>\n\n\n\n\t\t<div  class=\"block-5d43915f-bd7e-4412-94a2-0587b296fd0c row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-ab61b939-df46-4405-807a-8a0a34b54b19 col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f0162fcd-1e8d-463f-923f-a311180256ee accordion\">\n\t\t\t\n\n\t\t<div  class=\"block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c-collapse\" \n\t\t\t\t\taria-expanded=\"true\" \n\t\t\t\t\taria-controls=\"block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c-collapse\"\n\t\t\t\t>\n\t\t\t\t\tCzym jest SWIFT CSP?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse show\" \n\t\t\t\taria-labelledby=\"block-fc931ad0-9a98-4e77-a2ed-4060f4b81c9c-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-fc9ecaa4-c53a-4c01-ab82-878bb8e98ba4 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>SWIFT CSP, czyli SWIFT Customer Security Programme, to kompleksowe ramy cyberbezpiecze\u0144stwa opracowane w celu podniesienia poziomu praktyk bezpiecze\u0144stwa w instytucjach finansowych korzystaj\u0105cych z transakcji SWIFT. SWIFT CSP obejmuje Customer Security Controls Framework (CSCF), kt\u00f3ry ustanawia kontrole bezpiecze\u0144stwa i wytyczne dla instytucji finansowych w zakresie ochrony przed zagro\u017ceniami cybernetycznymi. Program SWIFT CSP zawiera r\u00f3wnie\u017c wytyczne oraz wymogi dotycz\u0105ce samoatestacji, maj\u0105ce na celu ograniczenie ryzyka cyberbezpiecze\u0144stwa w sieci SWIFT.  <\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f40c8174-5b70-4409-a2fd-0e2839c1c019 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-f40c8174-5b70-4409-a2fd-0e2839c1c019-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-f40c8174-5b70-4409-a2fd-0e2839c1c019-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-f40c8174-5b70-4409-a2fd-0e2839c1c019-collapse\"\n\t\t\t\t>\n\t\t\t\t\tCo si\u0119 stanie, je\u015bli organizacja nie b\u0119dzie zgodna z SWIFT CSP?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-f40c8174-5b70-4409-a2fd-0e2839c1c019-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-f40c8174-5b70-4409-a2fd-0e2839c1c019-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-29a487f9-8ce1-43d4-9fe8-36f50f76cbcc areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>Brak zgodno\u015bci z SWIFT CSP mo\u017ce mie\u0107 negatywne konsekwencje dla instytucji finansowej, w tym szkody wizerunkowe, odpowiedzialno\u015b\u0107 prawn\u0105, a nawet kary finansowe. Sam program SWIFT Customer Security Programme nie mo\u017ce nak\u0142ada\u0107 sankcji finansowych na organizacje. Jednak niewdro\u017cenie odpowiednich zabezpiecze\u0144 w zakresie wra\u017cliwych danych finansowych mo\u017ce skutkowa\u0107 karami i sankcjami wynikaj\u0105cymi z innych przepis\u00f3w oraz <a href=\"\/en\/blog\/banking-and-financial-cyber-security-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">regulacji dotycz\u0105cych cyberbezpiecze\u0144stwa w sektorze finansowym<\/a>. W niekt\u00f3rych powa\u017cnych przypadkach braku zgodno\u015bci SWIFT mo\u017ce zawiesi\u0107 organizacji mo\u017cliwo\u015b\u0107 realizowania mi\u0119dzynarodowych transakcji finansowych w sieci SWIFT.   <\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-0a0ec48a-69d1-44f0-b184-31de8d011440 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-0a0ec48a-69d1-44f0-b184-31de8d011440-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-0a0ec48a-69d1-44f0-b184-31de8d011440-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-0a0ec48a-69d1-44f0-b184-31de8d011440-collapse\"\n\t\t\t\t>\n\t\t\t\t\tJakie s\u0105 najcz\u0119stsze wyzwania zwi\u0105zane z zapewnieniem zgodno\u015bci z SWIFT CSP?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-0a0ec48a-69d1-44f0-b184-31de8d011440-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-0a0ec48a-69d1-44f0-b184-31de8d011440-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-db0816f5-a231-47f6-b0d0-bbdb2f99f747 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>Jednym z najcz\u0119stszych wyzwa\u0144 zwi\u0105zanych ze spe\u0142nieniem wymaga\u0144 SWIFT CSP jest zapewnienie odpowiednich zasob\u00f3w. Znalezienie zasob\u00f3w finansowych, technologicznych i ludzkich oraz <a href=\"\/en\/blog\/how-to-effectively-communicate-it-security-to-the-executive-board\" target=\"_blank\" rel=\"noreferrer noopener\">uzasadnienie ich potrzeby przed zarz\u0105dem<\/a> mo\u017ce by\u0107 trudne. Wdro\u017cenie niezb\u0119dnych \u015brodk\u00f3w cyberbezpiecze\u0144stwa opisanych przez SWIFT mo\u017ce wymaga\u0107 znacz\u0105cych inwestycji. Wyzwanie mo\u017ce stanowi\u0107 r\u00f3wnie\u017c \u015bledzenie i zrozumienie konkretnych kontroli wymaganych przez SWIFT CSP.<br>Skorzystanie z us\u0142ug zewn\u0119trznych konsultant\u00f3w SWIFT CSP oraz wdro\u017cenie kompleksowych rozwi\u0105za\u0144 cyberbezpiecze\u0144stwa, takich jak <a href=\"\/en\" target=\"_blank\" rel=\"noreferrer noopener\">Syteca<\/a>, mo\u017ce pom\u00f3c organizacji spe\u0142ni\u0107 wi\u0119kszo\u015b\u0107 wymaga\u0144.    <\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5-collapse\"\n\t\t\t\t>\n\t\t\t\t\tJak przeprowadzi\u0107 niezale\u017cn\u0105 ocen\u0119 SWIFT?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-f84bcbdc-7fb8-4a68-98bb-3a52e36945f5-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-4168ed8d-5059-48ff-93cd-bc0794174a63 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>Od 2022 roku SWIFT wymaga, aby organizacje wspiera\u0142y swoje samooceny niezale\u017cnymi ocenami SWIFT. Niezale\u017cny zewn\u0119trzny audytor powinien oceni\u0107 zgodno\u015b\u0107 instytucji finansowej z wymaganiami SWIFT CSP. Organizacja mo\u017ce wybra\u0107 audytora z listy zatwierdzonych audytor\u00f3w SWIFT CSP lub wskaza\u0107 w\u0142asnego. Przeprowadzany corocznie audyt SWIFT CSP obejmuje dokonanie oceny na miejscu wdro\u017conych \u015brodk\u00f3w cyberbezpiecze\u0144stwa, przeprowadzenie analizy luk w zgodno\u015bci oraz przygotowanie szczeg\u00f3\u0142owego raportu z oceny. Na podstawie tego raportu organizacja opracowuje plan dzia\u0142a\u0144 naprawczych, aby wyeliminowa\u0107 r\u00f3\u017cnice mi\u0119dzy w\u0142asnymi \u015brodkami bezpiecze\u0144stwa a kontrolami wymaganymi przez SWIFT CSP. Po zako\u0144czeniu niezale\u017cnego audytu organizacja przekazuje do SWIFT podsumowanie oceny oraz informacje o podj\u0119tych dzia\u0142aniach naprawczych.     <\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-ac323aab-1154-4c3a-bb7e-855dde8b2a41 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-ac323aab-1154-4c3a-bb7e-855dde8b2a41-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-ac323aab-1154-4c3a-bb7e-855dde8b2a41-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-ac323aab-1154-4c3a-bb7e-855dde8b2a41-collapse\"\n\t\t\t\t>\n\t\t\t\t\tCzy SWIFT przedstawia jakie\u015b \u015brodki zwi\u0119kszaj\u0105ce bezpiecze\u0144stwo sieci?\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-ac323aab-1154-4c3a-bb7e-855dde8b2a41-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-ac323aab-1154-4c3a-bb7e-855dde8b2a41-header\"\n\t\t\t\tdata-bs-parent=\".block-f0162fcd-1e8d-463f-923f-a311180256ee\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n\t\t<div  class=\"block-999e6e81-184d-4cf6-80f0-024a2e80e2fe areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(248, 251, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p>Tak. SWIFT Customer Security Controls Framework wymaga od organizacji ograniczenia dost\u0119pu do internetu oraz utworzenia <em>strefy bezpiecznej SWIFT<\/em> w celu ochrony krytycznych system\u00f3w zwi\u0105zanych z SWIFT przed og\u00f3lnym \u015brodowiskiem IT<em>. <\/em>Jest to wydzielone \u015brodowisko zawieraj\u0105ce jedynie niezb\u0119dne systemy p\u0142atnicze i oprogramowanie, chronione zaporami sieciowymi. Kolejnym istotnym \u015brodkiem wymaganym przez SWIFT CSP jest wdro\u017cenie kontroli zarz\u0105dzania <a href=\"https:\/\/www.syteca.com\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">to\u017csamo\u015bciami <\/a>i <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/zarzadzanie-dostepem-uprzywilejowanym\" target=\"_blank\" rel=\"noreferrer noopener\">dost\u0119pem<\/a>, w tym <a href=\"https:\/\/www.syteca.com\/en\/two-factor-authentication-tool\" target=\"_blank\" rel=\"noreferrer noopener\">uwierzytelniania dwusk\u0142adnikowego<\/a>, aby zapewni\u0107 zasad\u0119 minimalnych uprawnie\u0144. Wreszcie, SWIFT CSP wymaga od instytucji finansowych wdro\u017cenia \u015brodk\u00f3w bezpiecze\u0144stwa, takich jak ci\u0105g\u0142e <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/monitoring-aktywnosci-uzytkownika\" target=\"_blank\" rel=\"noreferrer noopener\">monitorowanie aktywno\u015bci u\u017cytkownik\u00f3w<\/a> i zaawansowane <a href=\"https:\/\/www.syteca.com\/pl?page_id=61266\" target=\"_blank\" rel=\"noreferrer noopener\">wykrywanie zagro\u017ce\u0144<\/a>, aby m\u00f3c szybko identyfikowa\u0107 i reagowa\u0107 na zagro\u017cenia bezpiecze\u0144stwa. Rozbudowana funkcjonalno\u015b\u0107 <a href=\"\/en\" target=\"_blank\" rel=\"noreferrer noopener\">Syteca <\/a>w zakresie zarz\u0105dzania ryzykiem wewn\u0119trznym mo\u017ce pom\u00f3c organizacji wdro\u017cy\u0107 wi\u0119kszo\u015b\u0107 wymaga\u0144 bezpiecze\u0144stwa SWIFT oraz chroni\u0107 wra\u017cliwe dane finansowe.  <\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-45b57971-717c-443c-922f-f0df5b8248ea areoi-element d-flex justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-78c79352-3373-4cf5-96b7-d8110802c031 btn areoi-has-url position-relative btn-outline-secondary\"\n\t href=\"https:\/\/docs.syteca.com\/view\/faq-troubleshooting\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tWi\u0119cej cz\u0119sto zadawanych pyta\u0144 \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-414d3b4f-bf1a-4b73-9e06-c6cf59691a47 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-11b6e401-6951-4d0e-b884-830193dcc8b7 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9f6c2f8a-0f3b-4f68-b76a-c8230e238439 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center\">Spe\u0142niaj inne wymagania bezpiecze\u0144stwa IT z Syteca<\/h2>\n\n\n\n\t\t<div  class=\"block-ce59ecde-e09c-4dc0-8772-a2845b211ce1 row areoi-element standard-set\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-b5b19f3a-8089-430d-b8df-57779e2561cb col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-b76cc725-7c87-49f5-8142-351b878979d7 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100 \"><a href=\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/iso-compliance-solution\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 27001<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a6bed40c-b544-464a-a83b-b3204282f7cf col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a124878b-4ffa-4003-b4cc-a0b614be59c9 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/pci-dss-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">PCI DSS.<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-33613801-d2d1-48a5-a170-d3cd136178ca col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-8add58f2-3e03-40bd-825b-92e94567f5f8 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"\/pl\/rozwiazanie\/meeting-compliance-requirements\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift\" target=\"_blank\" rel=\"noreferrer noopener\">SWIFT CSP<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e43326f9-047f-494e-af2d-695055055472 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e7b7441d-517e-4d22-8c31-5939b6b7cf14 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/meeting-compliance-requirements\/zgodnosc-z-norma-sox\" target=\"_blank\" rel=\"noreferrer noopener\">SOX<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9ed3edea-864d-4cd9-8204-0f39f65ea416 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2c0dd273-60c2-48b0-a1d1-0d5bf595e4f0 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/fisma-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">FISMA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f5c71927-e795-4fc7-b5d8-1336d19fefb0 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-71978f43-04dc-4ab3-83ed-a8c22cca778e areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/meeting-compliance-requirements\/gdpr-zgodnosc\" target=\"_blank\" rel=\"noreferrer noopener\">RODO<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f3b08ab4-5a59-4633-af80-1f6ede1c1bf6 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-c6aee13f-6acd-496a-b450-3c7793846e59 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/meeting-compliance-requirements\/zgodnosc-nist\" target=\"_blank\" rel=\"noreferrer noopener\">NIST 800-53<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-af56e4f7-5aa8-4e97-9e7f-1110ff8c81d6 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-d277acf6-c0e8-4906-b4b8-9eeb22640812 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/meeting-compliance-requirements\/zgodnosc-nist-800-171\" target=\"_blank\" rel=\"noreferrer noopener\">NIST 800-171<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-6c49f66f-789d-4a8e-a47d-f2eef32621f7 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-988ff469-99a6-48bb-a06c-749de2e59159 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nerc-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NERC<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9977c2a2-163d-48ca-ba4f-9b6132704998 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e40e22a8-388b-4aa8-bd14-36c9f33c479b areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/meeting-compliance-requirements\/zgodnosc-z-glba\" target=\"_blank\" rel=\"noreferrer noopener\">GLBA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-38bc542e-0b69-47f3-89c2-01acc885743b col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-7da2f8b4-83f4-4b04-94ca-8093fb5d0020 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nispom-change-2-and-h-r-act-666\" target=\"_blank\" rel=\"noreferrer noopener\">NISPOM Change 2 and H.R. 666<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-954a3a8e-95fa-406a-a329-4ce26852cb6a col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0820a35f-52fd-4605-bd29-8f6f7d0e2431 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/meeting-compliance-requirements\/zgodnosc-z-soc-2\" target=\"_blank\" rel=\"noreferrer noopener\">SOC 2<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9977c2a2-163d-48ca-ba4f-9b6132704998 col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e40e22a8-388b-4aa8-bd14-36c9f33c479b areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/meeting-compliance-requirements\/oprogramowanie-zapewniajace-zgodnosc-z-hipaa\" target=\"_blank\" rel=\"noreferrer noopener\">HIPAA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-38bc542e-0b69-47f3-89c2-01acc885743b col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-7da2f8b4-83f4-4b04-94ca-8093fb5d0020 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/dora-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">DORA<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-954a3a8e-95fa-406a-a329-4ce26852cb6a col areoi-element col-12 col-md-6 col-lg-3 col-xl-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0820a35f-52fd-4605-bd29-8f6f7d0e2431 areoi-element card-b-rounded h-100\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 h-100\"><a href=\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nis2-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NIS2<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-8c89124e-253f-4805-9f93-347c86377a5b areoi-element lets-talk overflow-hidden\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 234,0.2)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-72b6197e-3dfe-4ec1-89f6-e5d6a1394c3a areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-03ae15ca-7610-4452-ac69-d7f00edd880d row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-0e8081c0-dbaf-469c-bf7f-523ca6f7694a col areoi-element align-self-md-center col-xxl-5\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading text-center text-md-start\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#4790ea\" class=\"has-inline-color\">Porozmawiajmy<\/mark> o potrzebach w zakresie ochrony danych przedsi\u0119biorstwa<\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"text-center text-md-start opacity-75 pe-xxl-5\">Bezpiecze\u0144stwo danych korporacyjnych nigdy nie by\u0142o bardziej zagro\u017cone ni\u017c obecnie. Skontaktuj si\u0119 z nami, aby dowiedzie\u0107 si\u0119 wi\u0119cej o tym, jak Ekran System mo\u017ce zapewni\u0107 ochron\u0119 Twoich danych przed zagro\u017ceniami wewn\u0119trznymi.<\/p>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t<div  class=\"block-cf14a16c-6c30-4ce2-96c4-909d173f9c7b areoi-element d-flex justify-content-center justify-content-md-start\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-5446f9ca-cbaa-42df-8020-fec51b20785e btn areoi-has-url position-relative btn-secondary\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tSkontaktuj si\u0119 \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3a7702ac-7e87-4702-abff-88e557a0d73c col areoi-element align-self-md-center col-xxl-7 d-none d-sm-none d-md-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/12\/Rectangle-205.png\" alt=\"\"\/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":16,"featured_media":0,"parent":37650,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-full.php","meta":{"footnotes":""},"class_list":["post-59629","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Rozwi\u0105zanie zapewniaj\u0105ce zgodno\u015b\u0107 z programem SWIFT Customer Security Program (CSP) | Syteca<\/title>\n<meta name=\"description\" content=\"Dowiedz si\u0119, jak Syteca mo\u017ce pom\u00f3c Ci spe\u0142ni\u0107 wymagania programu SWIFT Customer Security Program (CSP) i przej\u015b\u0107 audyty zgodno\u015bci.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rozwi\u0105zanie zapewniaj\u0105ce zgodno\u015b\u0107 z programem SWIFT Customer Security Program (CSP) | Syteca\" \/>\n<meta property=\"og:description\" content=\"Dowiedz si\u0119, jak Syteca mo\u017ce pom\u00f3c Ci spe\u0142ni\u0107 wymagania programu SWIFT Customer Security Program (CSP) i przej\u015b\u0107 audyty zgodno\u015bci.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-08T16:06:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/10\/pic.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data1\" content=\"13 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift\",\"url\":\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift\",\"name\":\"Rozwi\u0105zanie zapewniaj\u0105ce zgodno\u015b\u0107 z programem SWIFT Customer Security Program (CSP) | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/pl#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/10\/pic.png\",\"datePublished\":\"2023-10-05T14:06:13+00:00\",\"dateModified\":\"2025-10-08T16:06:42+00:00\",\"description\":\"Dowiedz si\u0119, jak Syteca mo\u017ce pom\u00f3c Ci spe\u0142ni\u0107 wymagania programu SWIFT Customer Security Program (CSP) i przej\u015b\u0107 audyty zgodno\u015bci.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift#primaryimage\",\"url\":\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/10\/pic.png\",\"contentUrl\":\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/10\/pic.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Rozwiazanie\",\"item\":\"https:\/\/www.syteca.com\/pl\/rozwiazanie\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rozwi\u0105zanie Zapewniaj\u0105ce Zgodno\u015b\u0107 IT\",\"item\":\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Rozwi\u0105zanie zapewniaj\u0105ce zgodno\u015b\u0107 z programem bezpiecze\u0144stwa klient\u00f3w SWIFT (CSP)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/pl#website\",\"url\":\"https:\/\/www.syteca.com\/pl\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/pl?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rozwi\u0105zanie zapewniaj\u0105ce zgodno\u015b\u0107 z programem SWIFT Customer Security Program (CSP) | Syteca","description":"Dowiedz si\u0119, jak Syteca mo\u017ce pom\u00f3c Ci spe\u0142ni\u0107 wymagania programu SWIFT Customer Security Program (CSP) i przej\u015b\u0107 audyty zgodno\u015bci.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift","og_locale":"pl_PL","og_type":"article","og_title":"Rozwi\u0105zanie zapewniaj\u0105ce zgodno\u015b\u0107 z programem SWIFT Customer Security Program (CSP) | Syteca","og_description":"Dowiedz si\u0119, jak Syteca mo\u017ce pom\u00f3c Ci spe\u0142ni\u0107 wymagania programu SWIFT Customer Security Program (CSP) i przej\u015b\u0107 audyty zgodno\u015bci.","og_url":"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift","og_site_name":"Syteca","article_modified_time":"2025-10-08T16:06:42+00:00","og_image":[{"url":"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/10\/pic.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Szacowany czas czytania":"13 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift","url":"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift","name":"Rozwi\u0105zanie zapewniaj\u0105ce zgodno\u015b\u0107 z programem SWIFT Customer Security Program (CSP) | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/pl#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift#primaryimage"},"thumbnailUrl":"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/10\/pic.png","datePublished":"2023-10-05T14:06:13+00:00","dateModified":"2025-10-08T16:06:42+00:00","description":"Dowiedz si\u0119, jak Syteca mo\u017ce pom\u00f3c Ci spe\u0142ni\u0107 wymagania programu SWIFT Customer Security Program (CSP) i przej\u015b\u0107 audyty zgodno\u015bci.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift#primaryimage","url":"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/10\/pic.png","contentUrl":"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/10\/pic.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci\/program-zgodnosci-z-wymogami-bezpieczenstwa-klientow-swift#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Rozwiazanie","item":"https:\/\/www.syteca.com\/pl\/rozwiazanie"},{"@type":"ListItem","position":2,"name":"Rozwi\u0105zanie Zapewniaj\u0105ce Zgodno\u015b\u0107 IT","item":"https:\/\/www.syteca.com\/pl\/rozwiazanie\/spelnianie-wymagan-zgodnosci"},{"@type":"ListItem","position":3,"name":"Rozwi\u0105zanie zapewniaj\u0105ce zgodno\u015b\u0107 z programem bezpiecze\u0144stwa klient\u00f3w SWIFT (CSP)"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/pl#website","url":"https:\/\/www.syteca.com\/pl","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/pl?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/pl\/wp-json\/wp\/v2\/pages\/59629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/pl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.syteca.com\/pl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/pl\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/pl\/wp-json\/wp\/v2\/comments?post=59629"}],"version-history":[{"count":0,"href":"https:\/\/www.syteca.com\/pl\/wp-json\/wp\/v2\/pages\/59629\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/pl\/wp-json\/wp\/v2\/pages\/37650"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/pl\/wp-json\/wp\/v2\/media?parent=59629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}