{"id":60396,"date":"2024-01-13T04:09:10","date_gmt":"2024-01-13T11:09:10","guid":{"rendered":"https:\/\/www.syteca.com\/?page_id=60396"},"modified":"2025-09-18T01:01:44","modified_gmt":"2025-09-18T08:01:44","slug":"edukacja","status":"publish","type":"page","link":"https:\/\/www.syteca.com\/pl\/branze\/edukacja","title":{"rendered":"Rozwi\u0105zania cyberbezpiecze\u0144stwa dla sektora edukacji"},"content":{"rendered":"\n\t\t<div  class=\"block-d4931686-86f3-4e8d-8224-4e75d632d35f areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(14, 70, 107,0.16)\">\n\t                        <\/div>\n\n\t                    \n\t                        \t<div class=\"areoi-background__image\" style=\"background-image:url(https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13033314\/Hero-bg.png)\"><\/div>\n\t                        \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-50a79949-ae91-41cc-ad4d-bfbeb46fadd4 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-89572014-079c-4804-8099-0f7936be7418 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-195e9bd3-8e2c-43b5-b0ec-277cf2270431 col areoi-element my-5\">\n\t\t\t\n\t\t\t\n\n<h1 class=\"wp-block-heading has-text-align-center mb-4 has-white-color has-text-color\">Rozwi\u0105zania cyberbezpiecze\u0144stwa dla edukacji<\/h1>\n\n\n\n<p class=\"has-text-align-center mb-5 mx-auto text-18-15 p-poppins has-white-color has-text-color\">Chro\u0144 dane wra\u017cliwe, zarz\u0105dzaj ryzykiem wewn\u0119trznym i spe\u0142niaj wymagania w zakresie cyberbezpiecze\u0144stwa dzi\u0119ki kompleksowej platformie do zarz\u0105dzania ryzykiem wewn\u0119trznym.<\/p>\n\n\n\n\t\t<div  class=\"block-a5b98f32-f31c-4f08-b237-d040d0b7ad23 areoi-element  d-flex flex-column flex-md-row align-items-center justify-content-center mt-md-4\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-67bd3125-4f9a-400c-8eb5-86a265d95b1f btn areoi-has-url position-relative me-md-4 mb-3 hsBtn-demo btn-info  btn-info\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tDost\u0119p do portalu demonstracyjnego \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-12de22e3-0186-44e1-a196-b77ecdc396ff btn areoi-has-url position-relative  mb-3 btn-outline-light\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tKontakt \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\t\t<div  class=\"block-d2e33a46-5e5e-42d9-bfec-7f2aca53b070 areoi-element main-numbers\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6918c5bb-a474-45b3-9f7c-8b42f6950f03 areoi-element container mx-sm-auto w-auto\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-4e5631df-37a2-4cf7-aa5a-519ff1c8fde6 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-f71aed47-0479-47bb-b2e8-3922c70657b5 col areoi-element d-flex px-0 col-12\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2f6c49d1-79c5-4acd-a0ff-7e32c0945bbf areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center\">Kontrola nad uprawnieniami uprzywilejowanymi<\/h2>\n\n\n\n\t\t<div  class=\"block-f5e6f557-577e-4b12-ae74-15cbac76c656 areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ab2c516b-43ec-477b-83de-91f4a51ae9a0 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-bd04cea9-ba61-4a43-b9ad-30982629641f col areoi-element mb-4 mb-xl-0 col-md-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-b24de249-c107-4095-a75e-30d94585ca10 areoi-element d-flex shadow-none align-items-md-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 65, 68,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large ms-md-3 mt-md-1 me-3 h-100\"><img decoding=\"async\" width=\"40\" height=\"40\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13044228\/Alert-icon.svg\" alt=\"\" class=\"wp-image-37267\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-e79c5887-a9a6-46be-8bd7-20a59ac77ccb areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 text-26-22 has-text-color has-link-color wp-elements-982cc3fa55ecf8f2347522a6dd51c47b\" style=\"color:#ff4144;font-style:normal;font-weight:600\">2 297 atak\u00f3w<\/p>\n\n\n\n<p class=\"p-poppins mb-0 text-18-15\" style=\"font-style:normal;font-weight:600\">przeciwko instytucjom edukacyjnym zg\u0142aszanych jest co tydzie\u0144.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"opacity-50 mt-2 mb-0 text-md-end\" style=\"font-size:14px;font-style:italic;font-weight:400\">Zgodnie z raportem Cyber Attack Trends: 2022 Mid-Year Report firmy Check Point.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3484e9a6-9607-4898-9857-722496905f5e col areoi-element col-md-12 col-xl-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-b027344a-338b-416a-8b6b-6beb28904e3e areoi-element d-flex shadow-none align-items-md-center\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 65, 68,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large ms-md-3 mt-md-1 me-3 h-100\"><img decoding=\"async\" width=\"40\" height=\"40\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13044228\/Alert-icon.svg\" alt=\"\" class=\"wp-image-37267\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-e79c5887-a9a6-46be-8bd7-20a59ac77ccb areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 text-26-22 has-text-color has-link-color wp-elements-877f8d9de3a4d51c513052230af340e8\" style=\"color:#ff4144;font-style:normal;font-weight:600\">3,65 miliona dolar\u00f3w<\/p>\n\n\n\n<p class=\"p-poppins mb-0 text-18-15\" style=\"font-style:normal;font-weight:600\">to \u015bredni koszt naruszenia danych w sektorze edukacji.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"opacity-50 mt-2 mb-0 text-md-end\" style=\"font-size:14px;font-style:italic;font-weight:400\">Zgodnie z raportem Cost of a Data Breach Report 2023 firmy IBM Security.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p class=\"has-text-align-left\">Instytucje edukacyjne coraz cz\u0119\u015bciej polegaj\u0105 na platformach cyfrowych do przechowywania i zarz\u0105dzania danymi osobowymi student\u00f3w i pracownik\u00f3w, dokumentacj\u0105 kadry, danymi finansowymi oraz wynikami bada\u0144. Dlatego sta\u0142y si\u0119 podatne na cyberataki i zagro\u017cenia wewn\u0119trzne, co podkre\u015bla znaczenie wdro\u017cenia niezawodnej ochrony. <\/p>\n\n\n\n<p class=\"has-text-align-left\">Z\u0142o\u015bliwi aktorzy atakuj\u0105 zar\u00f3wno prywatne, jak i publiczne instytucje edukacyjne ze wzgl\u0119du na ogromn\u0105 ilo\u015b\u0107 danych wra\u017cliwych znajduj\u0105cych si\u0119 w sieci, kt\u00f3re mog\u0105 by\u0107 wykorzystane w celach finansowych, szpiegowskich, dla wygody, a nawet wy\u0142\u0105cznie dla zabawy.<\/p>\n\n\n\n<p class=\"has-text-align-left mb-0\">Sektor edukacji stoi przed wieloma wyzwaniami w zakresie ochrony danych wra\u017cliwych:<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bfafbc1d-f582-4710-99ba-024cbfc2eadc col areoi-element d-flex shadow-none col-12\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(17, 207, 159,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-4fc16947-f010-4140-b95d-409816583160 row areoi-element w-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9bdc4227-397a-44e2-93e2-a59a96d6b507 col areoi-element col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-4cbd95bb-0a7e-403b-a52d-483d45761a4c areoi-element rounded-bg-13px d-flex w-100 align-items-center\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large w-auto\" style=\"min-width:30px\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg\" alt=\"\" class=\"wp-image-22314\"\/><\/figure>\n\n\n\n<p class=\"p-poppins mb-0 ms-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Zapobieganie wyciekom danych i kradzie\u017cy w\u0142asno\u015bci intelektualnej<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-8c40663b-6174-467e-aa61-6a63596eaa76 areoi-element rounded-bg-13px d-flex w-100 align-items-center\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large w-auto\" style=\"min-width:30px\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg\" alt=\"\" class=\"wp-image-22314\"\/><\/figure>\n\n\n\n<p class=\"p-poppins mb-0 ms-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Zabezpieczanie zasob\u00f3w chmurowych i lokalnych przed nadu\u017cyciami uprawnie\u0144<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bdf6eae8-9a05-4493-8890-0de3165cfff7 col areoi-element col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-022eff8c-0571-4b9e-9d85-d21f2bc4ce7b areoi-element rounded-bg-13px d-flex w-100 align-items-center\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large w-auto\" style=\"min-width:30px\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg\" alt=\"\" class=\"wp-image-22314\"\/><\/figure>\n\n\n\n<p class=\"p-poppins mb-0 ms-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Poprawa widoczno\u015bci sieciowej<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-31a1ceee-ca35-4386-89e1-c9017dff3d20 areoi-element rounded-bg-13px d-flex w-100 align-items-center\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large w-auto\" style=\"min-width:30px\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg\" alt=\"\" class=\"wp-image-22314\"\/><\/figure>\n\n\n\n<p class=\"p-poppins mb-0 ms-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Budowanie skutecznego planu reagowania na incydenty<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bc825cf0-908f-4dfc-b171-e5315c778adb col areoi-element col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-8a9721b4-4d0f-40fd-a672-12579eb71eed areoi-element rounded-bg-13px d-flex w-100 align-items-center\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large w-auto\" style=\"min-width:30px\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg\" alt=\"\" class=\"wp-image-22314\"\/><\/figure>\n\n\n\n<p class=\"p-poppins mb-0 ms-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Zarz\u0105dzanie ryzykiem cyberbezpiecze\u0144stwa ze strony podmiot\u00f3w trzecich<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b862ec24-12fa-4fdc-abd3-7f64f009629a areoi-element rounded-bg-13px d-flex w-100 align-items-center\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large w-auto\" style=\"min-width:30px\"><img decoding=\"async\" width=\"28\" height=\"28\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/check-bg-icon.svg\" alt=\"\" class=\"wp-image-22314\"\/><\/figure>\n\n\n\n<p class=\"p-poppins mb-0 ms-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Zapewnienie zgodno\u015bci z przepisami o ochronie prywatno\u015bci i wymaganiami w zakresie cyberbezpiecze\u0144stwa<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-0b072b4a-9afb-4c02-a08a-536d935f9516 col areoi-element d-flex shadow-none col-12\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-md-1 mt-4 ps-0\">Wdro\u017cenie rozwi\u0105za\u0144 z zakresu cyberbezpiecze\u0144stwa w sektorze edukacji jest kluczowe dla zapobiegania naruszeniom prywatno\u015bci oraz utrzymania zaufania uczni\u00f3w, rodzic\u00f3w i interesariuszy.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\t\t<div  class=\"block-6df55816-3162-42be-bb71-d4eae92504d9 areoi-element values\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-235b85c6-daf7-4179-83b0-7d3c9ab697e1 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-0ed9e07a-d742-442c-898d-9f55f036ccb1 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-b669322f-4829-4428-909a-e9bdca759e15 col areoi-element d-flex flex-lg-column col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-left\">Syteca <mark style=\"background-color:rgba(0, 0, 0, 0);color:#548ff9\" class=\"has-inline-color\">umo\u017cliwia <\/mark>instytucjom edukacyjnym<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full is-resized d-none d-lg-block pt-5\"><img decoding=\"async\" width=\"1122\" height=\"814\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13033544\/pic-2.png\" alt=\"\" class=\"wp-image-37161\" style=\"width:562px;height:457px\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13033544\/pic-2.png 1122w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13033544\/pic-2-300x218.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13033544\/pic-2-1024x743.png 1024w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13033544\/pic-2-768x557.png 768w\" sizes=\"(max-width: 1122px) 100vw, 1122px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-da7ad4f9-d796-467d-86b1-2d48500c4afe col areoi-element d-flex flex-lg-column col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-63e3a4d3-3ada-44d0-bba9-ed8233733284 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-db4dd990-61b8-4abe-b030-8e5570c8708d col areoi-element d-flex flex-lg-column col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large me-4 mb-lg-4\"><img decoding=\"async\" width=\"87\" height=\"86\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Increase-network-visibility.svg\" alt=\"\" class=\"wp-image-23037\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-a53fd812-d7ee-48d6-ad45-133b44be20ce areoi-element\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading\" style=\"font-size:1.25rem\">Zwi\u0119kszy\u0107 przejrzysto\u015b\u0107 sieci<\/h3>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"background-color:#1a3b4e;color:#1a3b4e\"\/>\n\n\n\n<p>Zapobiega\u0107 zagro\u017ceniom wewn\u0119trznym \u2014 uzyska\u0107 pe\u0142n\u0105 widoczno\u015b\u0107 dzia\u0142a\u0144 u\u017cytkownik\u00f3w.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a04b08a5-ebdf-4a4b-ad3a-49ccf72cc2ab col areoi-element d-flex flex-lg-column col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large me-4 mb-lg-4\"><img decoding=\"async\" width=\"86\" height=\"86\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13040619\/Manage-privileged-access.svg\" alt=\"\" class=\"wp-image-37196\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-f01222df-d580-4ea1-a884-d6d23df4795b areoi-element\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading\" style=\"font-size:1.25rem\">Zarz\u0105dza\u0107 dost\u0119pem u\u017cytkownik\u00f3w<\/h3>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"background-color:#1a3b4e;color:#1a3b4e\"\/>\n\n\n\n<p>Zapewni\u0107 bezpieczny, szczeg\u00f3\u0142owy dost\u0119p do kluczowych zasob\u00f3w.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-dfef54e6-e16f-4210-bf0d-6ce22bfddbcd col areoi-element d-flex flex-lg-column col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large me-4 mb-lg-4\"><img decoding=\"async\" width=\"86\" height=\"86\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13040644\/Prevent-the-loss-of-sensitive-data.svg\" alt=\"\" class=\"wp-image-37203\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-d0b9e523-0016-4600-8a1b-541aa8592baf areoi-element\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading\" style=\"font-size:1.25rem\">Zapobiega\u0107 utracie wra\u017cliwych danych<\/h3>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"background-color:#1a3b4e;color:#1a3b4e\"\/>\n\n\n\n<p>Wykrywa\u0107 i szybko reagowa\u0107 na naruszenia bezpiecze\u0144stwa danych.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-21f47365-5822-4d2e-8c06-d1ee5896b21d col areoi-element d-flex flex-lg-column col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large me-4 mb-lg-4\"><img decoding=\"async\" width=\"86\" height=\"86\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13040740\/Meet-compliance-requirements.svg\" alt=\"\" class=\"wp-image-37210\"\/><\/figure>\n\n\n\n\t\t<div  class=\"block-9d969b07-82c2-4aca-b5b0-b82a2bffe2ce areoi-element\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading\" style=\"font-size:1.25rem\">Zapewnia\u0107 zgodno\u015b\u0107 z wymaganiami w zakresie cyberbezpiecze\u0144stwa<\/h3>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"background-color:#1a3b4e;color:#1a3b4e\"\/>\n\n\n\n<p>Zapewnia\u0107 ochron\u0119 danych zgodnie z FERPA, HIPAA, PCI DSS oraz innymi przepisami i standardami.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\t\t<div  class=\"block-25a84c91-1e3e-47b5-9a19-4dc160217f3f areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center\">Oprogramowanie bezpiecze\u0144stwa skoncentrowane na cz\u0142owieku dla instytucji edukacyjnych<\/h2>\n\n\n\n\t\t<div  class=\"block-de3a74eb-ff8f-4dc1-a9b6-46e8189a9a39 areoi-element container ultim-cyber\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-28352d6a-11b6-4910-aedc-5b83cdbe067c row areoi-element justify-content-center px-3 px-md-4 px-lg-0 mx-lg-5\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-a0516394-4373-42c7-9baf-d25e6b616c8a col areoi-element card m-3 align-items-center col-6 col-sm-6 col-md-2\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mt-3 mb-2\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13040805\/schools.svg\" alt=\"\" class=\"wp-image-37218\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center p-poppins\" style=\"font-style:normal;font-weight:600\">Szko\u0142y i college\u2019e spo\u0142eczno\u015bciowe<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a0516394-4373-42c7-9baf-d25e6b616c8a col areoi-element card m-3 align-items-center col-6 col-sm-6 col-md-2\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mt-3 mb-2\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13040816\/high-education.svg\" alt=\"\" class=\"wp-image-37225\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center p-poppins\" style=\"font-style:normal;font-weight:600\">Uczelnie wy\u017csze<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a0516394-4373-42c7-9baf-d25e6b616c8a col areoi-element card m-3 align-items-center col-6 col-sm-6 col-md-2\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mt-3 mb-2\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13040824\/ministries.svg\" alt=\"\" class=\"wp-image-37232\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center p-poppins\" style=\"font-style:normal;font-weight:600\">Ministerstwa i departamenty edukacji<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a0516394-4373-42c7-9baf-d25e6b616c8a col areoi-element card m-3 align-items-center col-6 col-sm-6 col-md-2\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large mt-3 mb-2\"><img decoding=\"async\" width=\"50\" height=\"50\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13040835\/online-academies.svg\" alt=\"\" class=\"wp-image-37239\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center p-poppins\" style=\"font-style:normal;font-weight:600\">Akademie online<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-4a99b95f-7441-4552-9237-7e66fe1c8bc2 row areoi-element justify-content-center px-3 px-lg-5 mx-lg-3 row-cols-1\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-bfc5ec49-ca25-4eb0-bed4-5b479be07568 col areoi-element card mt-3 mx-lg-3 col-12\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center pt-3 p-poppins\" style=\"font-style:normal;font-weight:500\">Zapewnij bezpiecze\u0144stwo sieci edukacyjnej oraz skuteczne zarz\u0105dzanie ryzykiem wewn\u0119trznym na wszystkich platformach w Twoim \u015brodowisku.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bfc5ec49-ca25-4eb0-bed4-5b479be07568 col areoi-element card mt-3 mx-lg-3 col-12\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center pt-3 p-poppins\" style=\"font-style:normal;font-weight:500\">\u015aled\u017a interakcje u\u017cytkownik\u00f3w z wra\u017cliwymi danymi osobowymi i w\u0142asno\u015bci\u0105 intelektualn\u0105.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-bfc5ec49-ca25-4eb0-bed4-5b479be07568 col areoi-element card mt-3 mx-lg-3 col-12\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center pt-3 p-poppins\" style=\"font-style:normal;font-weight:500\">Minimalizuj powierzchni\u0119 ataku poprzez ograniczenie dost\u0119pu do krytycznych system\u00f3w dla student\u00f3w, pracownik\u00f3w i zewn\u0119trznych dostawc\u00f3w us\u0142ug.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d9fe3ae9-55cd-469c-9fd1-b01c23166689 col areoi-element card mt-3 mx-lg-3 col-12\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center pt-3 p-poppins\" style=\"font-style:normal;font-weight:500\">Zapobiegaj zagro\u017ceniom wewn\u0119trznym poprzez szybkie wykrywanie i reagowanie na podejrzane dzia\u0142ania w Twojej sieci.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-0748dbb1-ddf9-4437-a6c6-26c1ff337385 col areoi-element card mt-3 mx-lg-3 col-12\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center pt-3 p-poppins\" style=\"font-style:normal;font-weight:500\">Spe\u0142niaj wymagania zgodno\u015bci, aby wzmocni\u0107 swoj\u0105 postaw\u0119 w zakresie cyberbezpiecze\u0144stwa i budowa\u0107 zaufanie w\u015br\u00f3d student\u00f3w, partner\u00f3w oraz interesariuszy.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-37bafdbe-f1a6-4936-adf2-b8cbdde01874 areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center opacity-50 p-poppins\" style=\"font-size:14px;font-style:italic;font-weight:500\">Niezale\u017cnie od tego, czy szukasz skutecznych rozwi\u0105za\u0144 z zakresu cyberbezpiecze\u0144stwa dla szk\u00f3\u0142, uczelni wy\u017cszych, akademii online, ministerstw czy departament\u00f3w edukacji \u2014 Syteca ma dla Ciebie odpowiednie rozwi\u0105zania.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\t\t<div  class=\"block-332b2e3b-edf0-4b31-a24c-66b948938ebb areoi-element w-100 industry\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-3 title-6 has-text-color\" style=\"color:#1a3b4e\">M\u00f3wi\u0105 o nas<\/h2>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t<div  class=\"block-0a656f97-b6ea-411c-92e3-dafd5925f4bb areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-def2aeaf-2f71-4a6b-9819-cdec6f14442b row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-f561bb5f-9c26-4913-853c-c7661fa38c16 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-068daca5-2ac5-40e7-acf6-ffa02f149eec areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image card-img-top kuppingercole\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/10\/image-22.svg\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center btn-link my-auto\" style=\"font-size:1.06em;font-style:normal;font-weight:600\"><a href=\"https:\/\/www.kuppingercole.com\/research\/lc80636\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">Syteca w raporcie 2021 Kuppingercole Leadership Compass for PAM<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3ec497ab-773e-4847-b048-4cd581495916 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bfcf909a-fd4b-4a65-ad8b-7f34123c6d5f areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image card-img-top gather\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/10\/image-24.svg\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center btn-link my-auto\" style=\"font-size:1.06em;font-style:normal;font-weight:600\"><a href=\"https:\/\/www.gartner.com\/en\/documents\/6256651\" target=\"_blank\" rel=\"noreferrer noopener\">Uwzgl\u0119dnione w raporcie Gartner 2025 Market Guide for Insider Risk Management Solutions<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d03bf8d7-9a4c-4963-8eaa-debf52b8ba16 col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-9bf20b21-401a-4740-a8ca-fed8699b1e01 areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image card-img-top microsoft\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/10\/image-26.svg\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center btn-link my-auto\" style=\"font-size:1.06rem;font-style:normal;font-weight:600\"><a href=\"https:\/\/azuremarketplace.microsoft.com\/en-us\/marketplace\/apps\/syteca.syteca?tab=Overview\" target=\"_blank\" rel=\"noreferrer noopener\">Syteca jako Value Added Partner<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-0fb07459-1c77-4608-83dc-5c7c385082bb col areoi-element col-12 col-sm-6 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-276fecf4-71ec-4772-bcda-0b3f141c9205 areoi-element card-b-rounded d-flex flex-column h-100\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image card-img-top nist\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/10\/NIST_logo-1.svg\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center btn-link my-auto\" style=\"font-size:1.06rem;font-style:normal;font-weight:600\"><a href=\"https:\/\/www.nccoe.nist.gov\/financial-services\/privileged-account-management\" target=\"_blank\" rel=\"noreferrer noopener\">Syteca w NIST Special Publication<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\t\t<div  class=\"block-2388638f-f36e-4fe5-9e96-9f5acfd22b4d areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center mb-4 has-white-color has-text-color\">Stw\u00f3rz skuteczny program przeciwdzia\u0142ania zagro\u017ceniom wewn\u0119trznym<\/h2>\n\n\n\n\t\t<div  class=\"block-1a9e3e4b-d0b2-4df7-aac3-d755f7ff1168 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-1f3cd68e-5253-44b3-a75c-1ca0382ed477 row areoi-element row-cols-1 row-cols-md-2\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-f25cbde5-a556-4e52-911d-39ba09f02aa5 col areoi-element align-self-sm-center align-self-md-center align-self-lg-center col-md-4\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image text-xxl-end\">\n<figure class=\"alignright size-full\"><img decoding=\"async\" width=\"529\" height=\"717\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13035237\/pic-3.png\" alt=\"\" class=\"wp-image-37180\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13035237\/pic-3.png 529w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13035237\/pic-3-221x300.png 221w\" sizes=\"(max-width: 529px) 100vw, 529px\" \/><\/figure>\n<\/div>\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b6523172-dfbe-4401-adbc-6eb73d6864b7 col areoi-element d-flex flex-column align-items-center align-items-md-start align-self-center align-self-md-center col-md-8\">\n\t\t\t\n\t\t\t\n\n<h3 class=\"wp-block-heading py-3 text-center text-md-start has-white-color has-text-color\">Praktyczny przewodnik CISO i zestaw arkuszy do budowy programu przeciwdzia\u0142ania zagro\u017ceniom wewn\u0119trznym<\/h3>\n\n\n\n<p class=\"opacity-75 text-center text-md-start has-text-color has-link-color wp-elements-9246f54b9050fceea489aefcbbb7c06f\" style=\"color:#ffffff\">Dowiedz si\u0119, jak stworzy\u0107 kompleksowy program przeciwdzia\u0142ania zagro\u017ceniom wewn\u0119trznym i wykorzystaj do\u0142\u0105czone arkusze do oceny jego skuteczno\u015bci.<\/p>\n\n\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-1dc9b080-4b6f-4383-9eec-20ce79f24dd8 btn areoi-has-url position-relative mt-4 btn-info\"\n\t href=\"\/en\/resources\/white-papers\/guide-n-worksheets-for-insider-threat-program\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tPobierz przewodnik \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\t\t<div  class=\"block-b765ca28-0298-46f5-a74a-92f36db02e0a areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-06fb4a42-09f6-4d4b-8c91-3f6c3315d70b row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-2fb4e6fe-cf99-4051-9872-867e239e3409 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center title-2\">Jak Syteca pomaga wzmocni\u0107 cyberbezpiecze\u0144stwo w instytucjach edukacyjnych<\/h2>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\t\t<div  class=\"block-84a15774-cb33-47cc-8bc2-386ecc69a732 areoi-element container mitigating accordion-with-img\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-4070a44b-a76e-4b29-8e8c-95cecec74245 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-aad32ce2-d5c9-42c5-b9c5-ca5dececb0ca col areoi-element d-none d-sm-none d-md-none d-lg-none d-xl-block\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bc5db12d-8526-4042-b22e-12f69a2f51b3 areoi-element card\">\n\t\t\t\n\t\t\t\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-d0940ba8-c8ba-4139-99f4-6612a9064977 col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-63e3f931-21c7-4e83-a982-98745dfc60cf accordion home-accordion\">\n\t\t\t\n\n\t\t<div  class=\"block-bc177922-b3be-4e4b-9dac-3df2075c3b3e accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-bc177922-b3be-4e4b-9dac-3df2075c3b3e-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-bc177922-b3be-4e4b-9dac-3df2075c3b3e-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-bc177922-b3be-4e4b-9dac-3df2075c3b3e-collapse\"\n\t\t\t\t>\n\t\t\t\t\tDog\u0142\u0119bne monitorowanie aktywno\u015bci u\u017cytkownik\u00f3w\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-bc177922-b3be-4e4b-9dac-3df2075c3b3e-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-bc177922-b3be-4e4b-9dac-3df2075c3b3e-header\"\n\t\t\t\tdata-bs-parent=\".block-63e3f931-21c7-4e83-a982-98745dfc60cf\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Uzyskaj przejrzysty wgl\u0105d w to, jak Twoi studenci, pracownicy i interesariusze korzystaj\u0105 z wra\u017cliwych zasob\u00f3w. Monitoruj aktywno\u015b\u0107 u\u017cytkownik\u00f3w w czasie rzeczywistym lub przegl\u0105daj zarejestrowane sesje u\u017cytkownik\u00f3w w formacie zrzut\u00f3w ekranu, uzupe\u0142nione szczeg\u00f3\u0142owymi metadanymi. <\/p>\n\n\n\n<p class=\"btn-link\"><a href=\"https:\/\/www.syteca.com\/pl\/produkt\/monitoring-aktywnosci-uzytkownika\" target=\"_blank\" rel=\"noreferrer noopener\">Dowiedz si\u0119 wi\u0119cej<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1021\" height=\"881\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13034444\/Powerful-User-Activity-Monitoring.png\" alt=\"\" class=\"wp-image-37172\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13034444\/Powerful-User-Activity-Monitoring.png 1021w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13034444\/Powerful-User-Activity-Monitoring-300x259.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13034444\/Powerful-User-Activity-Monitoring-768x663.png 768w\" sizes=\"(max-width: 1021px) 100vw, 1021px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-fdccb084-c380-4e1a-a6f4-a9530999fd83 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-fdccb084-c380-4e1a-a6f4-a9530999fd83-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-fdccb084-c380-4e1a-a6f4-a9530999fd83-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-fdccb084-c380-4e1a-a6f4-a9530999fd83-collapse\"\n\t\t\t\t>\n\t\t\t\t\tLekki system zarz\u0105dzania dost\u0119pem\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-fdccb084-c380-4e1a-a6f4-a9530999fd83-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-fdccb084-c380-4e1a-a6f4-a9530999fd83-header\"\n\t\t\t\tdata-bs-parent=\".block-63e3f931-21c7-4e83-a982-98745dfc60cf\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Przyznawaj, rozszerzaj i cofaj dost\u0119p do swoich wra\u017cliwych zasob\u00f3w. Zatwierdzaj \u017c\u0105dania dost\u0119pu i umo\u017cliwiaj tymczasowy dost\u0119p do kluczowych danych tylko wtedy, gdy u\u017cytkownicy potrzebuj\u0105 go do wykonania okre\u015blonych zada\u0144. <\/p>\n\n\n\n<p class=\"btn-link\"><a href=\"https:\/\/www.syteca.com\/pl\/produkt\/zarzadzanie-dostepem-uprzywilejowanym\" target=\"_blank\" rel=\"noreferrer noopener\">Dowiedz si\u0119 wi\u0119cej<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"499\" height=\"456\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-581-1.png\" alt=\"\" class=\"wp-image-22871\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-581-1.png 499w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-581-1-300x274.png 300w\" sizes=\"(max-width: 499px) 100vw, 499px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-cd69a16a-7873-4f05-bbff-14c5bac02a23 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-cd69a16a-7873-4f05-bbff-14c5bac02a23-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-cd69a16a-7873-4f05-bbff-14c5bac02a23-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-cd69a16a-7873-4f05-bbff-14c5bac02a23-collapse\"\n\t\t\t\t>\n\t\t\t\t\tZaawansowane rozwi\u0105zanie do zarz\u0105dzania to\u017csamo\u015bci\u0105\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-cd69a16a-7873-4f05-bbff-14c5bac02a23-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-cd69a16a-7873-4f05-bbff-14c5bac02a23-header\"\n\t\t\t\tdata-bs-parent=\".block-63e3f931-21c7-4e83-a982-98745dfc60cf\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Weryfikuj to\u017csamo\u015b\u0107 u\u017cytkownik\u00f3w za pomoc\u0105 uwierzytelniania dwusk\u0142adnikowego (2FA) przed przyznaniem im dost\u0119pu oraz rozr\u00f3\u017cniaj dzia\u0142ania u\u017cytkownik\u00f3w na kontach wsp\u00f3\u0142dzielonych dzi\u0119ki dodatkowej autoryzacji.<\/p>\n\n\n\n<p class=\"btn-link\"><a href=\"\/pl\/?page_id=63674\" target=\"_blank\" rel=\"noreferrer noopener\">Dowiedz si\u0119 wi\u0119cej<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1018\" height=\"881\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/High-End-Identity-Management-1.png\" alt=\"\" class=\"wp-image-22885\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/High-End-Identity-Management-1.png 1018w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/High-End-Identity-Management-1-300x260.png 300w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/High-End-Identity-Management-1-768x665.png 768w\" sizes=\"(max-width: 1018px) 100vw, 1018px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-c82160ad-0f24-4b57-b7ad-290ee959d7c7 accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-c82160ad-0f24-4b57-b7ad-290ee959d7c7-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-c82160ad-0f24-4b57-b7ad-290ee959d7c7-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-c82160ad-0f24-4b57-b7ad-290ee959d7c7-collapse\"\n\t\t\t\t>\n\t\t\t\t\tSolidne monitorowanie zewn\u0119trznych dostawc\u00f3w\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-c82160ad-0f24-4b57-b7ad-290ee959d7c7-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-c82160ad-0f24-4b57-b7ad-290ee959d7c7-header\"\n\t\t\t\tdata-bs-parent=\".block-63e3f931-21c7-4e83-a982-98745dfc60cf\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Zapewnij bezpieczny dost\u0119p do punkt\u00f3w ko\u0144cowych swojej organizacji dla zdalnych student\u00f3w, zewn\u0119trznych dostawc\u00f3w us\u0142ug i innych u\u017cytkownik\u00f3w zewn\u0119trznych. Monitoruj, w jaki spos\u00f3b obchodz\u0105 si\u0119 z Twoimi wra\u017cliwymi danymi, i powstrzymuj wszelkie podejrzane dzia\u0142ania. <\/p>\n\n\n\n<p class=\"btn-link\"><a href=\"https:\/\/www.syteca.com\/pl\/rozwiazanie\/firmy-zewnetrzne\" target=\"_blank\" rel=\"noreferrer noopener\">Dowiedz si\u0119 wi\u0119cej<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"499\" height=\"456\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-581-1.png\" alt=\"\" class=\"wp-image-22871\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-581-1.png 499w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-581-1-300x274.png 300w\" sizes=\"(max-width: 499px) 100vw, 499px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-54a0775e-7d56-4dd1-88e2-f358cf7395ed accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-54a0775e-7d56-4dd1-88e2-f358cf7395ed-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-54a0775e-7d56-4dd1-88e2-f358cf7395ed-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-54a0775e-7d56-4dd1-88e2-f358cf7395ed-collapse\"\n\t\t\t\t>\n\t\t\t\t\tAlerty w czasie rzeczywistym oraz odpowied\u017a na incydenty\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-54a0775e-7d56-4dd1-88e2-f358cf7395ed-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-54a0775e-7d56-4dd1-88e2-f358cf7395ed-header\"\n\t\t\t\tdata-bs-parent=\".block-63e3f931-21c7-4e83-a982-98745dfc60cf\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Otrzymuj alerty w czasie rzeczywistym dotycz\u0105ce ryzykownych zachowa\u0144 u\u017cytkownik\u00f3w i narusze\u0144 polityki bezpiecze\u0144stwa. Reaguj szybko na zagro\u017cenia r\u0119cznie lub automatycznie: wy\u015bwietlaj\u0105c komunikat ostrzegawczy, blokuj\u0105c u\u017cytkownika lub zatrzymuj\u0105c proces. <\/p>\n\n\n\n<p class=\"btn-link\"><a href=\"\/pl\/?page_id=61266\" target=\"_blank\" rel=\"noreferrer noopener\">Dowiedz si\u0119 wi\u0119cej<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center top-0\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"511\" height=\"442\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-580-1.png\" alt=\"\" class=\"wp-image-22864\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-580-1.png 511w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-580-1-300x259.png 300w\" sizes=\"(max-width: 511px) 100vw, 511px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-1b146619-c576-4f8f-8434-b66de843f33f accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-1b146619-c576-4f8f-8434-b66de843f33f-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-1b146619-c576-4f8f-8434-b66de843f33f-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-1b146619-c576-4f8f-8434-b66de843f33f-collapse\"\n\t\t\t\t>\n\t\t\t\t\tKompleksowe audytowanie i raportowanie\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-1b146619-c576-4f8f-8434-b66de843f33f-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-1b146619-c576-4f8f-8434-b66de843f33f-header\"\n\t\t\t\tdata-bs-parent=\".block-63e3f931-21c7-4e83-a982-98745dfc60cf\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Otrzymuj alerty w czasie rzeczywistym dotycz\u0105ce ryzykownych zachowa\u0144 u\u017cytkownik\u00f3w i narusze\u0144 polityki bezpiecze\u0144stwa. Reaguj szybko na zagro\u017cenia r\u0119cznie lub automatycznie: wy\u015bwietlaj\u0105c komunikat ostrzegawczy, blokuj\u0105c u\u017cytkownika lub zatrzymuj\u0105c proces. <\/p>\n\n\n\n<p class=\"btn-link\"><a href=\"\/pl\/?page_id=61268\" target=\"_blank\" rel=\"noreferrer noopener\">Dowiedz si\u0119 wi\u0119cej<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"507\" height=\"326\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-676-1.png\" alt=\"\" class=\"wp-image-22878\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-676-1.png 507w, https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/05\/Group-676-1-300x193.png 300w\" sizes=\"(max-width: 507px) 100vw, 507px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b68a0da1-a2c7-40ee-aaee-0bd62367aadb accordion-item\">\n\n\t\t\t<h2 \n\t\t\t\tclass=\"accordion-header\" \n\t\t\t\tid=\"block-b68a0da1-a2c7-40ee-aaee-0bd62367aadb-header\"\n\t\t\t>\n\t\t\t\t<button \n\t\t\t\t\tclass=\"accordion-button collapsed\" \n\t\t\t\t\ttype=\"button\" \n\t\t\t\t\tdata-bs-toggle=\"collapse\" \n\t\t\t\t\tdata-bs-target=\"#block-b68a0da1-a2c7-40ee-aaee-0bd62367aadb-collapse\" \n\t\t\t\t\taria-expanded=\"false\" \n\t\t\t\t\taria-controls=\"block-b68a0da1-a2c7-40ee-aaee-0bd62367aadb-collapse\"\n\t\t\t\t>\n\t\t\t\t\tAnonimizacja danych monitorowania\n\t\t\t\t<\/button>\n\t\t\t<\/h2>\n\n\t\t\t<div \n\t\t\t\tid=\"block-b68a0da1-a2c7-40ee-aaee-0bd62367aadb-collapse\" \n\t\t\t\tclass=\"accordion-collapse collapse\" \n\t\t\t\taria-labelledby=\"block-b68a0da1-a2c7-40ee-aaee-0bd62367aadb-header\"\n\t\t\t\tdata-bs-parent=\".block-63e3f931-21c7-4e83-a982-98745dfc60cf\"\n\t\t\t>\n\t\t\t\t<div class=\"accordion-body\">\n\t\t\t\t\t\n\n<p>Anonimizuj monitorowane dane, aby chroni\u0107 dane osobowe u\u017cytkownik\u00f3w i zapewni\u0107 zgodno\u015b\u0107 ze standardami, przepisami oraz regulacjami dotycz\u0105cymi ochrony prywatno\u015bci. W przypadku konieczno\u015bci zbadania incydent\u00f3w bezpiecze\u0144stwa mo\u017cesz zdezanonimizowa\u0107 dane potrzebne do prowadzenia dochodzenia. <\/p>\n\n\n\n<p class=\"btn-link\"><a href=\"https:\/\/www.syteca.com\/pl\/prywatnosc-uzytkownikow\" target=\"_blank\" rel=\"noreferrer noopener\">Dowiedz si\u0119 wi\u0119cej<\/a><\/p>\n\n\n<div class=\"wp-block-image d-flex align-items-center\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1021\" height=\"880\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13040238\/Thorough-anonymization-of-monitored-user-data.png\" alt=\"\" class=\"wp-image-37188\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13040238\/Thorough-anonymization-of-monitored-user-data.png 1021w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13040238\/Thorough-anonymization-of-monitored-user-data-300x259.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/13040238\/Thorough-anonymization-of-monitored-user-data-768x662.png 768w\" sizes=\"(max-width: 1021px) 100vw, 1021px\" \/><\/figure>\n<\/div>\n \n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\t\t<div  class=\"block-14ac66f2-2166-411e-bfba-0142f88bfe43 areoi-element w-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-030b5312-944d-41eb-a56f-a48385e583e6 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-ebbf50a6-b967-4131-9631-bd44317c4d43 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-0d2bb77a-2a2b-4c3b-9294-15ecfe047098 col areoi-element col-lg-10 col-xl-8 offset-lg-1 offset-xl-2\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center has-white-color has-text-color\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#10ce9e\" class=\"has-inline-color\">Uzyskaj wi\u0119cej<\/mark> dzi\u0119ki oprogramowania klasy korporacyjnej do wykrywania zagro\u017ce\u0144 wewn\u0119trznych<\/h2>\n\n\n\n<p><\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-146e5f08-65ce-4fa0-b260-3613dc103002 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5a66c5e2-2926-4c16-95bb-5ae0fd440a3f row areoi-element getmore\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-c9f78b33-a962-4da6-a44d-8ac917c0c815 col areoi-element col-12 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-6598a2ce-92d9-4588-9e7d-f7c677adc08b areoi-element card hover-card\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(20, 44, 59,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-white-color has-text-color\" style=\"font-size:1.25rem;font-style:normal;font-weight:700\"><a class=\"collapsed\" data-bs-toggle=\"collapse\" href=\"#fast\">Rejestrator meta danych, kt\u00f3ry skraca czas reakcji na zagro\u017cenia<\/a><\/p>\n\n\n\n\t\t<div id=\"fast\" class=\"block-b3781fc8-b062-463f-81ea-877e90aa6a7f areoi-element collapse\">\n\t\t\t\n\t\t\t\n\n<p class=\"opacity-75 with-link has-white-color has-text-color\">Nagrania aktywno\u015bci u\u017cytkownik\u00f3w znacznie u\u0142atwiaj\u0105 prac\u0119 zespo\u0142om SOC i CERT. Mo\u017cliwo\u015b\u0107 wyszukania konkretnej sytuacji na nagraniu, za pomoc\u0105 zapisanych metadanych, sprawia, \u017ce reakcje na incydenty s\u0105 znacznie szybsze i skuteczniejsze. <\/p>\n\n\n\n\t\t<div  class=\"block-6e5b41f1-aee6-4531-9f7c-2f62ba0e8762 areoi-element\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"67\" height=\"67\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/01\/Group-352-1.svg\" alt=\"\" class=\"wp-image-6218\"\/><\/figure>\n<\/div>\n\n\n\t\t<div  class=\"block-c684bdb2-80ba-4211-a9db-3d8730589a80 areoi-element blink\">\n\t\t\t\n\t\t\t\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-08228c72-9b75-45de-bf2e-bf3a88a2d53c col areoi-element col-12 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-33523588-11af-483a-aa29-0f23e2c4ca02 areoi-element card hover-card\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(20, 44, 59,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-white-color has-text-color\" style=\"font-size:1.25rem;font-style:normal;font-weight:700\"><a class=\"collapsed\" data-bs-toggle=\"collapse\" href=\"#aIbased\">Wykrywanie przej\u0119tych kont oparte na sztucznej inteligencji<\/a><\/p>\n\n\n\n\t\t<div id=\"aIbased\" class=\"block-dddf86c8-fb37-4f9c-b811-d7e2fbd5a0ca areoi-element collapse\">\n\t\t\t\n\t\t\t\n\n<p class=\"opacity-75 has-white-color has-text-color\">Cyberprzest\u0119pcy stale udoskonalaj\u0105 swoje sposoby w\u0142amywania si\u0119 na konta uprzywilejowane. Wspierany przez sztuczn\u0105 inteligencj\u0119 system Syteca UEBA potrafi wykry\u0107 hakera, kt\u00f3ry przenikn\u0105\u0142 do systemu korporacyjnego, wykorzystuj\u0105c skradzione po\u015bwiadczenia.<\/p>\n\n\n\n\t\t<div  class=\"block-1f06f511-baef-4df1-a65f-5348c7b3b319 areoi-element\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"64\" height=\"72\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/01\/Group-353-1.svg\" alt=\"\" class=\"wp-image-6211\"\/><\/figure>\n<\/div>\n\n\n\t\t<div  class=\"block-6732bcd8-81fa-4b2e-8e56-d3c55d8823bf areoi-element blink\">\n\t\t\t\n\t\t\t\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-1432d830-5470-49f3-9327-34f953232487 col areoi-element col-12 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-415175f7-9de0-44ca-bcd2-96976029d870 areoi-element card hover-card\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(20, 44, 59,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-white-color has-text-color\" style=\"font-size:1.25rem;font-style:normal;font-weight:700\"><a class=\"collapsed\" data-bs-toggle=\"collapse\" href=\"#lightweight\">Aktywny w Twoim \u015brodowisku w 20 minut lub mniej<\/a><\/p>\n\n\n\n\t\t<div id=\"lightweight\" class=\"block-fdfdefce-2422-4979-a951-12a17b72f271 areoi-element collapse\">\n\t\t\t\n\t\t\t\n\n<p class=\"opacity-75 has-white-color has-text-color\">Ten lekki agent dzia\u0142a cicho i nie jest zauwa\u017calny dla u\u017cytkownik\u00f3w ani innych program\u00f3w. Zebrane dane s\u0105 zapisywane w taki spos\u00f3b aby by\u0142y zoptymalizowane pod wzgl\u0119dem przechowywania oraz tak by mog\u0142y by\u0107 p\u00f3\u017aniej w \u0142atwy spos\u00f3b przeszukiwane.<\/p>\n\n\n\n\t\t<div  class=\"block-91f1f0f9-ec0b-4e7a-a3ba-a213d85a79ed areoi-element\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"67\" height=\"63\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/01\/Group-2.svg\" alt=\"\" class=\"wp-image-6204\"\/><\/figure>\n<\/div>\n\n\n\t\t<div  class=\"block-e0c90246-2fbc-4959-bfdd-87a404af377f areoi-element blink\">\n\t\t\t\n\t\t\t\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-08620988-5445-476b-a9e8-e40b59bca055 col areoi-element col-12 col-lg-3\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-9bd5030e-7737-4796-83d1-88964a053a24 areoi-element card hover-card\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(20, 44, 59,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-white-color has-text-color\" style=\"font-size:1.25rem;font-style:normal;font-weight:700\"><a class=\"collapsed\" data-bs-toggle=\"collapse\" href=\"#active\">Dostosowany do pracy w du\u017cym przedsi\u0119biorstwie<\/a><\/p>\n\n\n\n\t\t<div id=\"active\" class=\"block-0751380d-741e-43d9-a4e3-553bb259bdf1 areoi-element collapse\">\n\t\t\t\n\t\t\t\n\n<p class=\"opacity-75 has-white-color has-text-color\">Syteca jest szybka w instalacji i \u0142atwo integruje si\u0119 z systemami SIEM oraz systemami ticketowymi. Zaawansowana archiwizacja oraz mo\u017cliwo\u015b\u0107 integracji z systemami SIEM.<\/p>\n\n\n\n\t\t<div  class=\"block-9e24aafa-832e-4d4a-b44d-d2bd10d6d431 areoi-element\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"65\" height=\"65\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/01\/Group-354-1.svg\" alt=\"\" class=\"wp-image-6197\"\/><\/figure>\n<\/div>\n\n\n\t\t<div  class=\"block-f555c280-70e5-4dca-8bf1-40cd57e27a05 areoi-element blink\">\n\t\t\t\n\t\t\t\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\t\t<div  class=\"block-633b68e4-6d9b-48b6-9325-81813f7495c6 areoi-element container benefits-extended\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e1f14882-f8fe-4e84-91a0-3a6c519795e3 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9e94d70a-9b5b-4bcb-a55d-838140babeb1 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading has-text-align-center\">Dlaczego firmy wybieraj\u0105 Syteca<\/h2>\n\n\n\n\t\t<div id=\"accordion\" class=\"block-17b517dc-204f-4a94-afe0-d1dce87d1954 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-238cb4d9-5378-4d35-9a07-f3f12891b01d col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-871bbf03-1400-4ed3-ba0e-dcc6784e041b areoi-element card-b-rounded\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3c806568-bca3-4069-b68b-fe08d2f36c4b areoi-element d-flex d-lg-block position-static\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image m-4 m-sm-0 me-sm-4\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/01\/Full-desktop-and-server-OS-support.svg\" alt=\"\" class=\"wp-image-5064\"\/><\/figure>\n<\/div>\n\n\n<p class=\"collapsed mb-0 flex-grow-1 mt-lg-4 has-white-color has-text-color\" style=\"font-size:1.25rem;font-style:normal;font-weight:700\"><a class=\"collapsed\" data-bs-toggle=\"collapse\" href=\"#prevent\">Pe\u0142ne wsparcie dla system\u00f3w operacyjnych dla komputer\u00f3w oraz serwer\u00f3w<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div data-bs-parent=\"#accordion\" id=\"prevent\" class=\"block-7c7f3b79-03dc-464f-9312-f98d5b53df84 areoi-element collapse show\">\n\t\t\t\n\t\t\t\n\n<p class=\"mx-4 mx-sm-0\">Syteca nieprzerwanie monitoruje r\u00f3\u017cne punkty ko\u0144cowe, w tym zar\u00f3wno komputery u\u017cytkownik\u00f3w ko\u0144cowych, jak i serwery, w ka\u017cdej architekturze sieciowej. B\u0119d\u0105c jednym z najlepszych narz\u0119dzi do monitorowania aktywno\u015bci u\u017cytkownik\u00f3w w systemie Windows, Syteca dzia\u0142a r\u00f3wnie\u017c w \u015brodowisku macOS i stanowi pot\u0119\u017cne narz\u0119dzie do audytu sesji w systemach Linux\/UNIX.  Syteca wsp\u00f3\u0142pracuje tak\u017ce z maszynami wirtualnymi. Syteca umo\u017cliwia wdro\u017cenia oparte na agentach oraz na serwerach po\u015brednicz\u0105cych (jump server), jak r\u00f3wnie\u017c dowolne ich po\u0142\u0105czenie.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-27c1d5cc-534c-41ea-a2e5-02af52ea3c0a col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f2e33596-bfa0-4f3a-af30-25fd00903ad7 areoi-element card-b-rounded\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e7044daf-0344-488e-b744-c4aa22ab7dfe areoi-element d-flex d-lg-block position-static\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image m-4 m-sm-0 me-sm-4\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/01\/Enterprise-ready.svg\" alt=\"\" class=\"wp-image-5072\"\/><\/figure>\n<\/div>\n\n\n<p class=\"collapsed mb-0 flex-grow-1 mt-lg-4 has-white-color has-text-color\" style=\"font-size:1.25rem;font-style:normal;font-weight:700\"><a class=\"collapsed\" data-bs-toggle=\"collapse\" href=\"#manage\">Idealne rozwi\u0105zanie dla firm niezale\u017cnie od ich wielko\u015bci<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div DATA-BS-PARENT=\"#accordion\" id=\"manage\" class=\"block-b62defd8-3e03-4622-9a5e-0597e0bd1822 areoi-element collapse\">\n\t\t\t\n\t\t\t\n\n<p class=\"mx-4 mx-sm-0\">Zaprojektowana do \u015bledzenia aktywno\u015bci u\u017cytkownik\u00f3w na dziesi\u0105tkach tysi\u0119cy endpoint\u00f3w, Syteca cechuje si\u0119 wyj\u0105tkow\u0105 stabilno\u015bci\u0105 i wydajno\u015bci\u0105. Platforma zapewnia wysok\u0105 dost\u0119pno\u015b\u0107, mo\u017cliwo\u015b\u0107 wdro\u017cenia w schemacie multi-tenant, zastosowanie pulpit\u00f3w nawigacyjnych do monitorowania zasob\u00f3w oraz kondycji systemu, a tak\u017ce zautomatyzowany proces konserwacji i aktualizacji.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-3dac23ad-3ace-40fb-a6ea-e357ba3e5542 col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5e3f7528-de3c-4a29-8e63-07924d9406b6 areoi-element card-b-rounded\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a70c4821-9dec-4eff-9078-a9887e844ba2 areoi-element d-flex d-lg-block position-static\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image m-4 m-sm-0 me-sm-4\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/01\/More-than-user-activity-monitoring-solution.svg\" alt=\"\" class=\"wp-image-5079\"\/><\/figure>\n<\/div>\n\n\n<p class=\"collapsed mb-0 flex-grow-1 mt-lg-4 has-white-color has-text-color\" style=\"font-size:1.25rem;font-style:normal;font-weight:700\"><a class=\"collapsed\" data-bs-toggle=\"collapse\" href=\"#increase\">Syteca to wi\u0119cej, ni\u017c rozwi\u0105zanie do monitorowania aktywno\u015bci pracownik\u00f3w<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div DATA-BS-PARENT=\"#accordion\" id=\"increase\" class=\"block-568487a7-f395-4ed1-97ae-f39c871c7fe2 areoi-element collapse\">\n\t\t\t\n\t\t\t\n\n<p class=\"mx-4 mx-sm-0 with-link\">Opr\u00f3cz \u015bledzenia aktywno\u015bci u\u017cytkownik\u00f3w, Syteca oferuje zaawansowane funkcje powiadamiania o incydentach i reagowania na nie. Korzystaj\u0105c Korzystaj\u0105c z agenta Syteca, mo\u017cesz skonfigurowa\u0107 zarz\u0105dzanie <a href=\"https:\/\/www.syteca.com\/pl\/produkt\/zarzadzanie-dostepem-uprzywilejowanym\" target=\"_blank\" rel=\"noreferrer noopener\">dost\u0119pem <\/a>i <a href=\"\/pl\/?page_id=63674\" target=\"_blank\" rel=\"noreferrer noopener\">to\u017csamo\u015bci\u0105<\/a>. Poniewa\u017c Syteca zapewnia r\u00f3wnie\u017c monitorowanie aktywno\u015bci u\u017cytkownik\u00f3w serwer\u00f3w, zawsze wiesz, co dzieje si\u0119 w Twojej sieci. <\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-b79d8e7d-c1b0-4748-8f40-28319e282674 col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-af8ed576-1d6b-4c28-a017-b3cd8a83658e areoi-element card-b-rounded\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-fe3fb335-3959-409f-b9df-5763d543788f areoi-element d-flex d-lg-block position-static\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image m-4 m-sm-0 me-sm-4\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"80\" height=\"80\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/01\/Low-total-cost-of-ownership.svg\" alt=\"\" class=\"wp-image-5087\"\/><\/figure>\n<\/div>\n\n\n<p class=\"collapsed mb-0 flex-grow-1 mt-lg-4 has-white-color has-text-color\" style=\"font-size:1.25rem;font-style:normal;font-weight:700\"><a class=\"collapsed\" data-bs-toggle=\"collapse\" href=\"#comply\">Niski ca\u0142kowity koszt u\u017cytkowania<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div DATA-BS-PARENT=\"#accordion\" id=\"comply\" class=\"block-93053b84-768c-40ff-b33c-1122e85305ee areoi-element collapse\">\n\t\t\t\n\t\t\t\n\n<p class=\"mx-4 mx-sm-0\">Unikalny model licencjonowania oferowany przez Syteca umo\u017cliwia op\u0142acalne wdro\u017cenia w ka\u017cdej skali \u2013 od ma\u0142ych projekt\u00f3w pilota\u017cowych po przedsi\u0119wzi\u0119cia klasy enterprise. Ilo\u015b\u0107 przypisanch licencji mo\u017cesz zmieni\u0107 za pomoc\u0105 kilku klikni\u0119\u0107. W przypadku \u015brodowisk wirtualnych \u2013 proces ten jest zautomatyzowany.<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n<h2  class=\"wp-block-heading has-text-align-center\">Polecane \u017ar\u00f3d\u0142a<\/h2>\n\n\t\t<div  class=\"block-b80bcebd-dce9-4755-8e38-298812a8593c areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-307057d5-1f4b-4773-81a1-d06136e7eb5b row areoi-element blog-slider resources-slider\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-0c93b0d5-07e2-4946-8f1a-a4bb2eb0744b col areoi-element\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.syteca.com\/pl\/resources\/case-studies\/seoul-national-university\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"416\" height=\"265\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15021011\/Rectangle-60.png\" alt=\"\" class=\"wp-image-37312\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15021011\/Rectangle-60.png 416w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15021011\/Rectangle-60-300x191.png 300w\" sizes=\"(max-width: 416px) 100vw, 416px\" \/><\/a><\/figure>\n\n\n\n<p class=\"d-inline-block blog-bage my-4 p-poppins lh-base has-background\" style=\"background-color:#f2fafe;font-size:0.8125rem;font-style:normal;font-weight:600\">Case study<\/p>\n\n\n\n<h4 class=\"wp-block-heading mb-4\" style=\"font-size:1.06rem\"><a href=\"https:\/\/www.syteca.com\/pl\/resources\/case-studies\/seoul-national-university\" target=\"_blank\" rel=\"noreferrer noopener\">Ci\u0105g\u0142e monitorowanie prywatno\u015bci na Uniwersytecie Narodowym w Seulu<\/a><\/h4>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-34fe0355-7f4d-4396-874f-76080f9e5302 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.syteca.com\/en\/blog\/cybersecurity-in-educational-institutions\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"416\" height=\"265\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15021019\/Rectangle-60-1.png\" alt=\"\" class=\"wp-image-37319\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15021019\/Rectangle-60-1.png 416w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15021019\/Rectangle-60-1-300x191.png 300w\" sizes=\"(max-width: 416px) 100vw, 416px\" \/><\/a><\/figure>\n\n\n\n<p class=\"d-inline-block blog-bage my-4 p-poppins lh-base has-background\" style=\"background-color:#f2fafe;font-size:0.8125rem;font-style:normal;font-weight:600\">Artyku\u0142 blogowy<\/p>\n\n\n\n<h4 class=\"wp-block-heading mb-4\" style=\"font-size:1.06rem\"><a href=\"https:\/\/www.syteca.com\/en\/blog\/cybersecurity-in-educational-institutions\" target=\"_blank\" rel=\"noreferrer noopener\">Zgodno\u015b\u0107 z cyberbezpiecze\u0144stwem w sektorze us\u0142ug edukacyjnych: Jak chroni\u0107 dane osobowe uczni\u00f3w<\/a><\/h4>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7fd3a084-ff8d-4cff-b964-2490fdd2b972 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.syteca.com\/en\/blog\/cloud-infrastructure-security\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"416\" height=\"265\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15021026\/Rectangle-60-2.png\" alt=\"\" class=\"wp-image-37326\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15021026\/Rectangle-60-2.png 416w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15021026\/Rectangle-60-2-300x191.png 300w\" sizes=\"(max-width: 416px) 100vw, 416px\" \/><\/a><\/figure>\n\n\n\n<p class=\"d-inline-block blog-bage my-4 p-poppins lh-base has-background\" style=\"background-color:#f2fafe;font-size:0.8125rem;font-style:normal;font-weight:600\">Artyku\u0142 blogowy<\/p>\n\n\n\n<h4 class=\"wp-block-heading mb-4\" style=\"font-size:1.06rem\"><a href=\"https:\/\/www.syteca.com\/en\/blog\/cloud-infrastructure-security\" target=\"_blank\" rel=\"noreferrer noopener\">Bezpiecze\u0144stwo infrastruktury w chmurze: 7 najlepszych praktyk ochrony wra\u017cliwych danych<\/a><\/h4>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-769ae13b-f9b4-458d-b6d0-91bcd2227ca9 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.syteca.com\/en\/blog\/5-industries-most-risk-of-data-breaches\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"416\" height=\"264\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15021031\/Rectangle-60-3.png\" alt=\"\" class=\"wp-image-37333\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15021031\/Rectangle-60-3.png 416w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/01\/15021031\/Rectangle-60-3-300x190.png 300w\" sizes=\"(max-width: 416px) 100vw, 416px\" \/><\/a><\/figure>\n\n\n\n<p class=\"d-inline-block blog-bage my-4 p-poppins lh-base has-background\" style=\"background-color:#f2fafe;font-size:0.8125rem;font-style:normal;font-weight:600\">Artyku\u0142 blogowy<\/p>\n\n\n\n<h4 class=\"wp-block-heading mb-4\" style=\"font-size:1.06rem\"><a href=\"https:\/\/www.syteca.com\/en\/blog\/5-industries-most-risk-of-data-breaches\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.syteca.com\/en\/blog\/5-industries-most-risk-of-data-breaches\">5 bran\u017c najbardziej nara\u017conych na cyberataki<\/a><\/h4>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\t\t<div  class=\"block-ad43dc3a-b481-46ea-aa2a-6a5cafb7e144 areoi-element d-flex justify-content-center\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-13919476-14eb-4e3a-b302-74c156093d03 btn areoi-has-url position-relative btn-outline-secondary\"\n\t href=\"\/en\/resources\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tPrzejrzyj wszystkie \u017ar\u00f3d\u0142a \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\t\t<div  class=\"block-388f8e80-6af4-4e2d-9c42-c4b8085dbf25 areoi-element lets-talk overflow-hidden\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 234,0.2)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-53d66ea0-5f28-486f-9fb7-034bd2e27298 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-be9e0d5d-f83f-44e4-a971-55e81aad5d13 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-f0907a22-6f59-4ddb-baec-13fcacbce846 col areoi-element align-self-md-center col-xxl-5\">\n\t\t\t\n\t\t\t\n\n<h2  class=\"wp-block-heading text-center text-md-start\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#548ff9\" class=\"has-inline-color\">Porozmawiajmy <\/mark>o Twoich potrzebach w zakresie ochrony danych w firmie<\/h2>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"text-center text-md-start opacity-75 pe-xxl-5\">Bezpiecze\u0144stwo danych korporacyjnych nigdy nie by\u0142o bardziej zagro\u017cone ni\u017c obecnie. Skontaktuj si\u0119 z nami, aby dowiedzie\u0107 si\u0119 wi\u0119cej o tym, jak Ekran System mo\u017ce zapewni\u0107 ochron\u0119 Twoich danych przed zagro\u017ceniami wewn\u0119trznymi.<\/p>\n\n\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\t\t<div  class=\"block-3e9782d7-d527-442a-8b22-fd566f3a9b41 areoi-element d-flex justify-content-center justify-content-md-start\">\n\t\t\t\n\t\t\t\n\n\t\t\t\t\n\t\t<a \n\t\t\t\n\t\t\tclass=\"block-b5b7919e-b9c4-4b2b-9d56-c9b883843946 btn areoi-has-url position-relative btn-secondary\"\n\t href=\"\/en\/get-in-touch\" rel=\"noreferrer noopener\" target=\"_blank\" >\n\t\t\t\t\t\n\t\t\t\t\tKontakt \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9bc9df52-5c3b-412f-be1f-878b9432c79b col areoi-element align-self-md-center col-xxl-7 d-none d-sm-none d-md-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/12\/Rectangle-205.png\" alt=\"\"\/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t","protected":false},"excerpt":{"rendered":"<p>Polecane \u017ar\u00f3d\u0142a<\/p>\n","protected":false},"author":16,"featured_media":0,"parent":59881,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-full.php","meta":{"footnotes":""},"class_list":["post-60396","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Rozwi\u0105zania z zakresu cyberbezpiecze\u0144stwa dla sektora edukacji | Syteca<\/title>\n<meta name=\"description\" content=\"Poznaj rozwi\u0105zania Syteca w zakresie cyberbezpiecze\u0144stwa dla sektora edukacji, chroni\u0105ce szko\u0142y, instytucje, akademie i ministerstwa przed zagro\u017ceniami wewn\u0119trznymi.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/pl\/branze\/edukacja\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rozwi\u0105zania z zakresu cyberbezpiecze\u0144stwa dla sektora edukacji | Syteca\" \/>\n<meta property=\"og:description\" content=\"Poznaj rozwi\u0105zania Syteca w zakresie cyberbezpiecze\u0144stwa dla sektora edukacji, chroni\u0105ce szko\u0142y, instytucje, akademie i ministerstwa przed zagro\u017ceniami wewn\u0119trznymi.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/pl\/branze\/edukacja\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-18T08:01:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2024\/01\/Alert-icon.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data1\" content=\"14 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/pl\/branze\/edukacja\",\"url\":\"https:\/\/www.syteca.com\/pl\/branze\/edukacja\",\"name\":\"Rozwi\u0105zania z zakresu cyberbezpiecze\u0144stwa dla sektora edukacji | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/pl#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/pl\/branze\/edukacja#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/pl\/branze\/edukacja#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.syteca.com\/wp-content\/uploads\/2024\/01\/Alert-icon.svg\",\"datePublished\":\"2024-01-13T11:09:10+00:00\",\"dateModified\":\"2025-09-18T08:01:44+00:00\",\"description\":\"Poznaj rozwi\u0105zania Syteca w zakresie cyberbezpiecze\u0144stwa dla sektora edukacji, chroni\u0105ce szko\u0142y, instytucje, akademie i ministerstwa przed zagro\u017ceniami wewn\u0119trznymi.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/pl\/branze\/edukacja#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/pl\/branze\/edukacja\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/www.syteca.com\/pl\/branze\/edukacja#primaryimage\",\"url\":\"https:\/\/www.syteca.com\/wp-content\/uploads\/2024\/01\/Alert-icon.svg\",\"contentUrl\":\"https:\/\/www.syteca.com\/wp-content\/uploads\/2024\/01\/Alert-icon.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/pl\/branze\/edukacja#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Bran\u017ce\",\"item\":\"https:\/\/www.syteca.com\/pl\/branze\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rozwi\u0105zania cyberbezpiecze\u0144stwa dla sektora edukacji\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/pl#website\",\"url\":\"https:\/\/www.syteca.com\/pl\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/pl?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rozwi\u0105zania z zakresu cyberbezpiecze\u0144stwa dla sektora edukacji | Syteca","description":"Poznaj rozwi\u0105zania Syteca w zakresie cyberbezpiecze\u0144stwa dla sektora edukacji, chroni\u0105ce szko\u0142y, instytucje, akademie i ministerstwa przed zagro\u017ceniami wewn\u0119trznymi.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/pl\/branze\/edukacja","og_locale":"pl_PL","og_type":"article","og_title":"Rozwi\u0105zania z zakresu cyberbezpiecze\u0144stwa dla sektora edukacji | Syteca","og_description":"Poznaj rozwi\u0105zania Syteca w zakresie cyberbezpiecze\u0144stwa dla sektora edukacji, chroni\u0105ce szko\u0142y, instytucje, akademie i ministerstwa przed zagro\u017ceniami wewn\u0119trznymi.","og_url":"https:\/\/www.syteca.com\/pl\/branze\/edukacja","og_site_name":"Syteca","article_modified_time":"2025-09-18T08:01:44+00:00","og_image":[{"url":"https:\/\/www.syteca.com\/wp-content\/uploads\/2024\/01\/Alert-icon.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Szacowany czas czytania":"14 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/pl\/branze\/edukacja","url":"https:\/\/www.syteca.com\/pl\/branze\/edukacja","name":"Rozwi\u0105zania z zakresu cyberbezpiecze\u0144stwa dla sektora edukacji | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/pl#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/pl\/branze\/edukacja#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/pl\/branze\/edukacja#primaryimage"},"thumbnailUrl":"https:\/\/www.syteca.com\/wp-content\/uploads\/2024\/01\/Alert-icon.svg","datePublished":"2024-01-13T11:09:10+00:00","dateModified":"2025-09-18T08:01:44+00:00","description":"Poznaj rozwi\u0105zania Syteca w zakresie cyberbezpiecze\u0144stwa dla sektora edukacji, chroni\u0105ce szko\u0142y, instytucje, akademie i ministerstwa przed zagro\u017ceniami wewn\u0119trznymi.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/pl\/branze\/edukacja#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/pl\/branze\/edukacja"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/www.syteca.com\/pl\/branze\/edukacja#primaryimage","url":"https:\/\/www.syteca.com\/wp-content\/uploads\/2024\/01\/Alert-icon.svg","contentUrl":"https:\/\/www.syteca.com\/wp-content\/uploads\/2024\/01\/Alert-icon.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/pl\/branze\/edukacja#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Bran\u017ce","item":"https:\/\/www.syteca.com\/pl\/branze"},{"@type":"ListItem","position":2,"name":"Rozwi\u0105zania cyberbezpiecze\u0144stwa dla sektora edukacji"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/pl#website","url":"https:\/\/www.syteca.com\/pl","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/pl?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/pl\/wp-json\/wp\/v2\/pages\/60396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/pl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.syteca.com\/pl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/pl\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/pl\/wp-json\/wp\/v2\/comments?post=60396"}],"version-history":[{"count":0,"href":"https:\/\/www.syteca.com\/pl\/wp-json\/wp\/v2\/pages\/60396\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/pl\/wp-json\/wp\/v2\/pages\/59881"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/pl\/wp-json\/wp\/v2\/media?parent=60396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}