{"id":440,"date":"2021-05-13T15:50:03","date_gmt":"2021-05-13T15:50:03","guid":{"rendered":"http:\/\/35.204.177.156\/home-v2\/"},"modified":"2025-09-10T08:35:57","modified_gmt":"2025-09-10T08:35:57","slug":"home-v2","status":"publish","type":"page","link":"https:\/\/aptdefend.com\/pl\/","title":{"rendered":"Home v2"},"content":{"rendered":"<p>[vc_row unlock_row_content=&#8221;yes&#8221; row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;0&#8243; top_padding=&#8221;0&#8243; bottom_padding=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; equal_height=&#8221;yes&#8221; gutter_size=&#8221;0&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; enable_bottom_divider=&#8221;default&#8221; bottom_divider=&#8221;step_3_4&#8243; shape_bottom_h_use_pixel=&#8221;&#8221; shape_bottom_height=&#8221;1&#8243; shape_bottom_color=&#8221;color-133804&#8243; shape_bottom_opacity=&#8221;33&#8243; shape_bottom_index=&#8221;0&#8243; el_class=&#8221;inverted-device-order&#8221;][vc_column column_width_use_pixel=&#8221;yes&#8221; gutter_size=&#8221;3&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;5&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; column_width_pixel=&#8221;528&#8243;][vc_custom_heading text_size=&#8221;fontsize-485774&#8243; text_weight=&#8221;700&#8243;]Zadbaj o bezpiecze\u0144stwo Twojej firmy[\/vc_custom_heading][vc_column_text text_lead=&#8221;yes&#8221;]W 2020 roku hakerzy zaatakowali ponad 64% firm. Post\u0119puj\u0105ca cyfryzacja i przenoszenie dzia\u0142alno\u015bci do internetu s\u0105 szans\u0105 na szybki rozw\u00f3j, jednak przynosz\u0105 te\u017c wiele zagro\u017ce\u0144. Niewiedza i brak \u015bwiadomo\u015bci tych zjawisk sprawia, \u017ce firma staje si\u0119 \u0142atwym celem dla cyberprzest\u0119pc\u00f3w.<\/p>\n<p>Niebezpiecze\u0144stwo czyha nie tylko na wielkie mi\u0119dzynarodowe organizacje, ale r\u00f3wnie\u017c na ma\u0142e i \u015brednie przedsi\u0119biorstwa, kt\u00f3re najcz\u0119\u015bciej s\u0105 te\u017c gorzej zabezpieczone i \u0142atwiej je oszuka\u0107.[\/vc_column_text][vc_empty_space empty_h=&#8221;1&#8243;][vc_button button_color=&#8221;color-177066&#8243; size=&#8221;btn-xl&#8221; radius=&#8221;btn-square&#8221; border_animation=&#8221;btn-ripple-out&#8221; border_width=&#8221;0&#8243; link=&#8221;url:https%3A%2F%2Faptdefend.com%2Fpl%2Fwyprobuj-za-darmo%2F|title:Wyprobuj&#8221;]Wypr\u00f3buj za darmo[\/vc_button][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; back_image=&#8221;711&#8243; back_position=&#8221;left center&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; mobile_height=&#8221;340&#8243;][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;6&#8243; top_padding=&#8221;2&#8243; bottom_padding=&#8221;2&#8243; overlay_alpha=&#8221;100&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; border_color=&#8221;color-gyho&#8221; border_style=&#8221;solid&#8221; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;100&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_column_text text_lead=&#8221;yes&#8221;]Polecane przez[\/vc_column_text][vc_gallery el_id=&#8221;gallery-85457&#8243; type=&#8221;carousel&#8221; medias=&#8221;226,458&#8243; carousel_lg=&#8221;4&#8243; carousel_md=&#8221;4&#8243; carousel_sm=&#8221;3&#8243; gutter_size=&#8221;4&#8243; media_items=&#8221;media|nolink|original,icon|md&#8221; carousel_height=&#8221;equal&#8221; carousel_interval=&#8221;3000&#8243; carousel_navspeed=&#8221;400&#8243; carousel_loop=&#8221;yes&#8221; stage_padding=&#8221;0&#8243; single_overlay_opacity=&#8221;50&#8243; single_overlay_anim=&#8221;no&#8221; single_text_anim=&#8221;no&#8221; single_image_anim=&#8221;no&#8221; single_padding=&#8221;2&#8243; single_border=&#8221;yes&#8221; title=&#8221;Clients&#8221; items=&#8221;eyIzN19pIjp7InNpbmdsZV9vdmVybGF5X2FuaW0iOiJubyIsInNpbmdsZV9vdmVybGF5X2NvbG9yIjoiIn19&#8243;][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;4&#8243; bottom_padding=&#8221;4&#8243; back_color=&#8221;color-133804&#8243; overlay_alpha=&#8221;100&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; border_color=&#8221;color-gyho&#8221; border_style=&#8221;solid&#8221; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; row_custom_slug_check=&#8221;yes&#8221; row_custom_slug=&#8221;dlaczego&#8221; row_name=&#8221;dlaczego&#8221;][vc_column column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;100&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; back_color=&#8221;color-xsdn&#8221; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; radius=&#8221;xl&#8221; width=&#8221;1\/2&#8243;][vc_custom_heading text_size=&#8221;fontsize-485774&#8243;]Dlaczego APT Defend?[\/vc_custom_heading][vc_column_text]Stworzyli\u015bmy unikalne rozwi\u0105zanie, kt\u00f3re wspomaga proces budowania \u015bwiadomo\u015bci cyberzagro\u017ce\u0144 w\u015br\u00f3d pracownik\u00f3w.<\/p>\n<p>APT Defend to:<\/p>\n<ul>\n<li>szerokie mo\u017cliwo\u015bci prowadzenia symulowanych atak\u00f3w hakerskich dokonywane przez specjalist\u00f3w z zakresu cyberbezpiecze\u0144stwa,<\/li>\n<li>bezpieczne prze\u0107wiczenie najcz\u0119\u015bciej wyst\u0119puj\u0105cych zagro\u017ce\u0144 ze strony przest\u0119pc\u00f3w umo\u017cliwiaj\u0105ce dostosowanie system\u00f3w do w\u0142a\u015bciwej reakcji na atak,<\/li>\n<li>dost\u0119p do szerokiej wiedzy na temat cyberzagro\u017ce\u0144 w wygodnej formie\u00a0e-learningu i w dowolnym momencie,<\/li>\n<li>elastyczne narz\u0119dzie pozwalaj\u0105ce na dostosowanie symulacji, szkole\u0144 oraz polityki bezpiecze\u0144stwa do indywidualnych potrzeb przedsi\u0119biorstwa. Pokazujemy gdzie dok\u0142adnie znajduj\u0105 si\u0119 s\u0142abe punkty, aby zwi\u0119kszy\u0107 nacisk na ochron\u0119 w\u0142a\u015bnie w tych obszarach.<\/li>\n<\/ul>\n<p>APT Defend to produkt stworzony w oparciu o wiedz\u0119 i do\u015bwiadczenia polskich specjalist\u00f3w z zakresu bezpiecze\u0144stwa. Ka\u017cdy kraj ma swoj\u0105 specyfik\u0119, do kt\u00f3rej dostosowuj\u0105 si\u0119 przest\u0119pcy. Nasza Platforma jest wi\u0119c dostosowana do zagro\u017ce\u0144 wyst\u0119puj\u0105cych na polskim rynku. System na bie\u017c\u0105co monitoruje sytuacj\u0119 w sieci i dostosowuje swoje mo\u017cliwo\u015bci do zmieniaj\u0105cych si\u0119 trend\u00f3w.[\/vc_column_text][\/vc_column_inner][vc_column_inner column_width_use_pixel=&#8221;yes&#8221; gutter_size=&#8221;3&#8243; expand_height=&#8221;yes&#8221; back_image=&#8221;425&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; column_width_pixel=&#8221;1200&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;2&#8243; bottom_padding=&#8221;5&#8243; back_color=&#8221;color-133804&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;4&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;4&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_use_pixel=&#8221;yes&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;2&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; column_width_pixel=&#8221;1000&#8243;][vc_custom_heading text_size=&#8221;fontsize-485774&#8243;]Symulowany atak hakerski[\/vc_custom_heading][vc_column_text text_lead=&#8221;yes&#8221;]Ludzie najszybciej ucz\u0105 si\u0119 przez do\u015bwiadczenie, dlatego to w\u0142a\u015bnie symulowanie ataku hakerskiego jest jedn\u0105 z najskuteczniejszych metod ochrony przed cyberprzest\u0119pcami. Symulowanie dzia\u0142a\u0144 haker\u00f3w w bezpiecznym, treningowym otoczeniu, a nast\u0119pnie pr\u00f3by opanowania takiego ataku pozwalaj\u0105 uwra\u017cliwi\u0107 organizacj\u0119 na potencjalne \u017ar\u00f3d\u0142a i sposoby atak\u00f3w, wyci\u0105gn\u0105\u0107 w\u0142a\u015bciwe wnioski oraz dostosowa\u0107 systemy i procedury bezpiecze\u0144stwa. Takie realne szkolenie ma znacznie wi\u0119ksz\u0105 moc ni\u017c kolejny, odklepany e-learning w systemie szkole\u0144 pracownik\u00f3w.[\/vc_column_text][vc_empty_space empty_h=&#8221;2&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]W jaki spos\u00f3b cyberprzest\u0119pcy mog\u0105 zagrozi\u0107 Twojej firmie? Poznaj ich metody:[\/vc_custom_heading][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;4&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;3&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_icon position=&#8221;left&#8221; icon_image=&#8221;497&#8243; icon_color=&#8221;color-183424&#8243; text_size=&#8221;h4&#8243; title=&#8221;Phishing&#8221;]Obejmuje r\u00f3\u017cne metody socjotechniczne, kt\u00f3re umo\u017cliwiaj\u0105 hakerom dost\u0119p do wra\u017cliwych danych. Najcz\u0119\u015bciej s\u0105 to zwodnicze linki w korespondencji e-mail\u00a0lub fa\u0142szywe witryny internetowe[\/vc_icon][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;3&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_icon position=&#8221;left&#8221; icon=&#8221;fa fa-mobile2&#8243; icon_image=&#8221;495&#8243; icon_color=&#8221;color-183424&#8243; text_size=&#8221;h4&#8243; title=&#8221;Smishing&#8221;]Wyrafinowana forma phishingu. Wykorzystuje wiadomo\u015bci SMS, kt\u00f3re maj\u0105 nak\u0142oni\u0107 ofiar\u0119 do podania poufnych danych. Ostatnio bardzo popularna by\u0142a metoda na dop\u0142at\u0119 do przesy\u0142ki kurierskiej[\/vc_icon][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;3&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_icon position=&#8221;left&#8221; icon=&#8221;fa fa-profile-male&#8221; icon_image=&#8221;493&#8243; icon_color=&#8221;color-183424&#8243; text_size=&#8221;h4&#8243; title=&#8221;USB dropping&#8221;]Niekt\u00f3rzy przest\u0119pcy wykorzystuj\u0105 sprz\u0119t elektroniczny, kt\u00f3ry podrzucaj\u0105 na teren firmy, a niczego nie\u015bwiadomi pracownicy otwieraj\u0105c znajduj\u0105cy si\u0119 na urz\u0105dzeniu plik, daj\u0105 im dost\u0119p do cennych informacji[\/vc_icon][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;4&#8243; bottom_padding=&#8221;3&#8243; back_color=&#8221;color-177066&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_use_pixel=&#8221;yes&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; column_width_pixel=&#8221;900&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h1&#8243;]&#8221;W trakcie trwania pandemii i pracy zdalnej platforma APT Defend pomog\u0142a nam w okre\u015bleniu poziomu \u015bwiadomo\u015bci cyberzagro\u017ce\u0144 w\u015br\u00f3d naszych pracownik\u00f3w w wielu krajach w kt\u00f3rych operujemy. Dane te pozwoli\u0142y nam lepiej dopasowa\u0107 materia\u0142y edukacyjne i podwy\u017cszy\u0107 skuteczno\u015b\u0107 realizowanej kampanii u\u015bwiadamiaj\u0105cej.&#8221;[\/vc_custom_heading][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image media=&#8221;352&#8243; media_width_percent=&#8221;70&#8243;][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; position_vertical=&#8221;bottom&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;3\/4&#8243;][vc_column_text text_lead=&#8221;yes&#8221;]\u2014 Andrzej Piotr Kle\u015bnicki, Global Information Security Director [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;3&#8243; top_padding=&#8221;4&#8243; bottom_padding=&#8221;2&#8243; back_color=&#8221;color-xsdn&#8221; overlay_color=&#8221;color-xsdn&#8221; overlay_alpha=&#8221;90&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; row_custom_slug_check=&#8221;yes&#8221; row_name=&#8221;rozwiazanie&#8221; row_custom_slug=&#8221;rozwiazanie&#8221;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading text_size=&#8221;fontsize-485774&#8243;]Poznaj rozwi\u0105zanie APT Defend[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row unlock_row_content=&#8221;yes&#8221; row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;5&#8243; top_padding=&#8221;0&#8243; bottom_padding=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; equal_height=&#8221;yes&#8221; gutter_size=&#8221;0&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; mobile_height=&#8221;340&#8243;][vc_single_image media=&#8221;536&#8243; media_width_percent=&#8221;100&#8243; alignment=&#8221;right&#8221;][\/vc_column][vc_column column_width_use_pixel=&#8221;yes&#8221; gutter_size=&#8221;3&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;5&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; column_width_pixel=&#8221;528&#8243;][vc_custom_heading text_size=&#8221;h1&#8243;]Konsola APT Defend[\/vc_custom_heading][vc_column_text text_lead=&#8221;yes&#8221;]S\u0142u\u017cy do zarz\u0105dzania symulowanymi atakami hakerskimi i stanowi centralne miejsce naszego systemu. To w\u0142a\u015bnie tutaj rozpoczyna si\u0119 kreowanie symulowanego ataku hakerskiego. Oczywi\u015bcie na potrzeby edukacyjne jest on nierzeczywisty, chocia\u017c mocno zbli\u017cony do realnego.<\/p>\n<p>Istotn\u0105 cech\u0105 konsoli APT Defend jest \u0142atwo\u015b\u0107 tworzenia symulacji. W systemie znajduje si\u0119 baza scenariuszy ataku, kt\u00f3re okre\u015blaj\u0105 spos\u00f3b prowadzenia kampanii phishingowych. Mo\u017cemy te\u017c stworzy\u0107 dla Ciebie indywidualne scenariusze. Po wybraniu scenariusza mo\u017cesz w bardzo szybki i intuicyjny spos\u00f3b zaimportowa\u0107 list\u0119 os\u00f3b, kt\u00f3re maj\u0105 zosta\u0107 przeszkolone. Stworzenie pierwszej kampanii trwa mniej ni\u017c 15 minut!<\/p>\n<p>Nast\u0119pnie po przeprowadzeniu symulacji konsola umo\u017cliwia szerok\u0105 analiz\u0119 skuteczno\u015bci ataku oraz zwr\u00f3cenie u\u017cytkownikom uwagi na to, kt\u00f3re elementy okaza\u0142y si\u0119 krytyczne i tym samym wymagaj\u0105 dodatkowych szkole\u0144. Po wyci\u0105gni\u0119ciu wniosk\u00f3w mo\u017cliwe jest realizowanie kolejnych symulacji w oparciu o inny scenariusz.[\/vc_column_text][\/vc_column][\/vc_row][vc_row unlock_row_content=&#8221;yes&#8221; row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;5&#8243; top_padding=&#8221;0&#8243; bottom_padding=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; equal_height=&#8221;yes&#8221; gutter_size=&#8221;0&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; bottom_divider=&#8221;step_3_4&#8243; el_class=&#8221;inverted-device-order&#8221;][vc_column column_width_use_pixel=&#8221;yes&#8221; gutter_size=&#8221;3&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;5&#8243; overlay_alpha=&#8221;50&#8243; border_color=&#8221;transparent&#8221; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; column_width_pixel=&#8221;528&#8243; css=&#8221;.vc_custom_1620996041610{border-left-width: 100px !important;}&#8221;][vc_custom_heading text_size=&#8221;h1&#8243;]Scenariusze Two-Factor Authentication (2FA)[\/vc_custom_heading][vc_column_text text_lead=&#8221;yes&#8221;]Mog\u0142oby si\u0119 wydawa\u0107, \u017ce dwustopniowa weryfikacja (np. logowanie i potwierdzenie to\u017csamo\u015bci poprzez SMS) zapewnia bezpiecze\u0144stwo i eliminuje zagro\u017cenia zwi\u0105zane z phishingiem. W rzeczywisto\u015bci nie jest to jednak takie \u0142atwe. APT Defend dostarcza unikatowe scenariusze pozwalaj\u0105ce na przeprowadzenie pe\u0142nej symulacji ataku hakerskiego, nawet przy stosowaniu dwusk\u0142adnikowego uwierzytelniania. Odbywa si\u0119 to dzi\u0119ki integracji z systemem Modlishka, kt\u00f3ry w uproszczeniu dzia\u0142a na zasadzie odwrotnego proxy. Tym samym stanowi element po\u015bredni pomi\u0119dzy aplikacj\u0105 Klienta a serwerem i m\u00f3g\u0142by zosta\u0107 wykorzystany do pr\u00f3b przechwycenia danych nawet przy dwustopniowym uwierzytelnianiu.[\/vc_column_text][\/vc_column][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;bottom&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243; mobile_height=&#8221;340&#8243;][vc_single_image media=&#8221;504&#8243; media_width_percent=&#8221;100&#8243;][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;4&#8243; bottom_padding=&#8221;3&#8243; back_color=&#8221;color-177066&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_use_pixel=&#8221;yes&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; column_width_pixel=&#8221;900&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h1&#8243;]&#8221;Wykorzystujemy APT Defend w procesie budowania \u015bwiadomo\u015bci cyberzagro\u017ce\u0144 ju\u017c od prawie dw\u00f3ch lat. Regularne szkolenia i symulacje atak\u00f3w realizowane za pomoc\u0105 platformy przyczyni\u0142y si\u0119 do minimalizacji ilo\u015bci incydent\u00f3w zwi\u0105zanych z phishingiem.&#8221;[\/vc_custom_heading][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_single_image media=&#8221;549&#8243; media_width_percent=&#8221;70&#8243;][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; position_vertical=&#8221;bottom&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;3\/4&#8243;][vc_column_text text_lead=&#8221;yes&#8221;]\u2014 Krzysztof Szczepa\u0144ski, CSO[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;4&#8243; bottom_padding=&#8221;3&#8243; back_color=&#8221;color-xsdn&#8221; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;100&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; row_custom_slug_check=&#8221;yes&#8221; style=&#8221;inherited&#8221; row_name=&#8221;funkcjonalnosci&#8221; row_custom_slug=&#8221;funkcjonalnosci&#8221;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;4&#8243; overlay_alpha=&#8221;100&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_row_inner][vc_column_inner column_width_use_pixel=&#8221;yes&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243; column_width_pixel=&#8221;600&#8243;][vc_custom_heading text_size=&#8221;fontsize-485774&#8243; text_color=&#8221;color-133804&#8243;]Odkryj nowe mo\u017cliwo\u015bci[\/vc_custom_heading][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;100&#8243; gutter_size=&#8221;4&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;100&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;3&#8243; mobile_width=&#8221;7&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/4&#8243;][vc_icon icon=&#8221;fa fa-video3&#8243; icon_image=&#8221;357&#8243; media_size=&#8221;89&#8243; text_size=&#8221;h4&#8243; linked_title=&#8221;yes&#8221; text_reduced=&#8221;yes&#8221; align=&#8221;left&#8221;]Szablony scenariuszy, w tym scenariusze dedykowane dla klient\u00f3w z mo\u017cliwo\u015bci\u0105 samodzielnej konfiguracji[\/vc_icon][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;100&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;3&#8243; mobile_width=&#8221;7&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/4&#8243;][vc_icon icon=&#8221;fa fa-mobile2&#8243; icon_image=&#8221;361&#8243; media_size=&#8221;89&#8243; text_size=&#8221;h4&#8243; text_reduced=&#8221;yes&#8221; align=&#8221;left&#8221;]Wsparcie kampanii dla PC, laptop\u00f3w, telefon\u00f3w<br \/>\ni tablet\u00f3w[\/vc_icon][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;100&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;3&#8243; mobile_width=&#8221;7&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/4&#8243;][vc_icon icon=&#8221;fa fa-tools&#8221; icon_image=&#8221;363&#8243; media_size=&#8221;89&#8243; text_size=&#8221;h4&#8243; linked_title=&#8221;yes&#8221; text_reduced=&#8221;yes&#8221; align=&#8221;left&#8221;]Materia\u0142y e-learningowe z interaktywnymi tre\u015bciami[\/vc_icon][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_visibility=&#8221;yes&#8221; medium_width=&#8221;3&#8243; mobile_width=&#8221;7&#8243; width=&#8221;1\/4&#8243;][vc_icon icon=&#8221;fa fa-layers2&#8243; icon_image=&#8221;365&#8243; media_size=&#8221;89&#8243; text_size=&#8221;h4&#8243; text_reduced=&#8221;yes&#8221; align=&#8221;left&#8221;]Mo\u017cliwo\u015b\u0107 tworzenia w\u0142asnych materia\u0142\u00f3w edukacyjnych[\/vc_icon][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;100&#8243; gutter_size=&#8221;4&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;100&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;3&#8243; mobile_width=&#8221;7&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/4&#8243;][vc_icon icon=&#8221;fa fa-video3&#8243; icon_image=&#8221;369&#8243; media_size=&#8221;89&#8243; text_size=&#8221;h4&#8243; linked_title=&#8221;yes&#8221; text_reduced=&#8221;yes&#8221; align=&#8221;left&#8221;]Testy edukacyjne z mo\u017cliwo\u015bci\u0105 ich konfigurowania[\/vc_icon][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;100&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;3&#8243; mobile_width=&#8221;7&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/4&#8243;][vc_icon icon=&#8221;fa fa-mobile2&#8243; icon_image=&#8221;371&#8243; media_size=&#8221;89&#8243; text_size=&#8221;h4&#8243; text_reduced=&#8221;yes&#8221; align=&#8221;left&#8221;]Wsparcie wielu j\u0119zyk\u00f3w[\/vc_icon][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;100&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;3&#8243; mobile_width=&#8221;7&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/4&#8243;][vc_icon icon=&#8221;fa fa-tools&#8221; icon_image=&#8221;373&#8243; media_size=&#8221;178&#8243; text_size=&#8221;h4&#8243; linked_title=&#8221;yes&#8221; text_reduced=&#8221;yes&#8221; align=&#8221;left&#8221;]Adresowanie wymaga\u0144 prawnych typu GDPR, KNF[\/vc_icon][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_visibility=&#8221;yes&#8221; medium_width=&#8221;3&#8243; mobile_width=&#8221;7&#8243; width=&#8221;1\/4&#8243;][vc_icon icon=&#8221;fa fa-layers2&#8243; icon_image=&#8221;375&#8243; media_size=&#8221;89&#8243; text_size=&#8221;h4&#8243; text_reduced=&#8221;yes&#8221; align=&#8221;left&#8221;]Dedykowane domeny phishingowe[\/vc_icon][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;100&#8243; gutter_size=&#8221;4&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;100&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;3&#8243; mobile_width=&#8221;7&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/4&#8243;][vc_icon icon=&#8221;fa fa-video3&#8243; icon_image=&#8221;379&#8243; media_size=&#8221;89&#8243; text_size=&#8221;h4&#8243; linked_title=&#8221;yes&#8221; text_reduced=&#8221;yes&#8221; align=&#8221;left&#8221;]Mo\u017cliwo\u015b\u0107 personalizacji brandingowej scenariuszy (np. dodania logo firmy)[\/vc_icon][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;100&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;3&#8243; mobile_width=&#8221;7&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/4&#8243;][vc_icon icon=&#8221;fa fa-mobile2&#8243; icon_image=&#8221;383&#8243; media_size=&#8221;89&#8243; text_size=&#8221;h4&#8243; text_reduced=&#8221;yes&#8221; align=&#8221;left&#8221;]Og\u00f3lny raport podsumowuj\u0105cy wyniki kampanii[\/vc_icon][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;100&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;3&#8243; mobile_width=&#8221;7&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/4&#8243;][vc_icon icon=&#8221;fa fa-tools&#8221; icon_image=&#8221;385&#8243; media_size=&#8221;89&#8243; text_size=&#8221;h4&#8243; linked_title=&#8221;yes&#8221; text_reduced=&#8221;yes&#8221; align=&#8221;left&#8221;]Eksport raport\u00f3w do PDF czy Excela[\/vc_icon][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_visibility=&#8221;yes&#8221; medium_width=&#8221;3&#8243; mobile_width=&#8221;7&#8243; width=&#8221;1\/4&#8243;][vc_icon icon=&#8221;fa fa-layers2&#8243; icon_image=&#8221;387&#8243; media_size=&#8221;89&#8243; text_size=&#8221;h4&#8243; text_reduced=&#8221;yes&#8221; align=&#8221;left&#8221;]\u201eOrganisational recilency\u201d \u2013 raport odporno\u015bci organizacji na ataki[\/vc_icon][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;100&#8243; gutter_size=&#8221;4&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;100&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;3&#8243; mobile_width=&#8221;7&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_icon icon=&#8221;fa fa-video3&#8243; icon_image=&#8221;389&#8243; media_size=&#8221;89&#8243; text_size=&#8221;h4&#8243; linked_title=&#8221;yes&#8221; text_reduced=&#8221;yes&#8221; align=&#8221;left&#8221;]Metryki poziomu zagro\u017ce\u0144[\/vc_icon][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;100&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;3&#8243; mobile_width=&#8221;7&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_icon icon=&#8221;fa fa-mobile2&#8243; icon_image=&#8221;391&#8243; media_size=&#8221;89&#8243; text_size=&#8221;h4&#8243; text_reduced=&#8221;yes&#8221; align=&#8221;left&#8221;]Funkcja raportowania ataku przez pracownika[\/vc_icon][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; overlay_alpha=&#8221;100&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;3&#8243; mobile_width=&#8221;7&#8243; zoom_width=&#8221;0&#8243; zoom_height=&#8221;0&#8243; width=&#8221;1\/3&#8243;][vc_icon icon=&#8221;fa fa-tools&#8221; icon_image=&#8221;381&#8243; media_size=&#8221;89&#8243; text_size=&#8221;h4&#8243; linked_title=&#8221;yes&#8221; text_reduced=&#8221;yes&#8221; align=&#8221;left&#8221;]Us\u0142uga wsparcia klienta[\/vc_icon][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;3&#8243; top_padding=&#8221;4&#8243; bottom_padding=&#8221;3&#8243; back_color=&#8221;color-133804&#8243; overlay_alpha=&#8221;100&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; row_custom_slug_check=&#8221;yes&#8221; row_name=&#8221;o-nas&#8221; row_custom_slug=&#8221;o-nas&#8221;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading text_size=&#8221;fontsize-485774&#8243; text_color=&#8221;color-xsdn&#8221;]Kim jeste\u015bmy?[\/vc_custom_heading][vc_empty_space empty_h=&#8221;2&#8243;][vc_column_text text_lead=&#8221;yes&#8221;]APT Defend to platforma \u0142\u0105cz\u0105ca w sobie wysok\u0105 skuteczno\u015b\u0107 dzia\u0142ania oraz intuicyjno\u015b\u0107 u\u017cytkowania. Nie by\u0142oby to mo\u017cliwe bez profesjonalizmu, pasji, bezkompromisowo\u015bci oraz skupieniu na jako\u015bci, kt\u00f3re cechuj\u0105 tw\u00f3rc\u00f3w APT Defend. Za naszym rozwi\u0105zaniem stoi zesp\u00f3\u0142 sk\u0142adaj\u0105cy si\u0119 z pasjonat\u00f3w cyberbezpiecze\u0144stwa, kt\u00f3rzy po\u015bwi\u0119cili wi\u0119kszo\u015b\u0107 swojego zawodowego \u017cycia na doskonalenie si\u0119 w tej tematyce. Nasz\u0105 mocna stron\u0105 jest zgromadzenie w zespole os\u00f3b o r\u00f3\u017cnym do\u015bwiadczeniu i pomys\u0142ach przy jednoczesnym d\u0105\u017ceniu do sp\u00f3jnego celu. To idealny przepis na tworzenie uniwersalnych i skutecznych system\u00f3w informatycznych.[\/vc_column_text][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;5&#8243; bottom_padding=&#8221;5&#8243; back_color=&#8221;color-133804&#8243; overlay_alpha=&#8221;100&#8243; gutter_size=&#8221;2&#8243; column_width_percent=&#8221;100&#8243; border_color=&#8221;color-gyho&#8221; border_style=&#8221;solid&#8221; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; desktop_visibility=&#8221;yes&#8221; medium_visibility=&#8221;yes&#8221; mobile_visibility=&#8221;yes&#8221; style=&#8221;inherited&#8221; css=&#8221;.vc_custom_1757493355205{border-bottom-width: 1px !important;}&#8221; shape_dividers=&#8221;&#8221;][vc_column column_width_percent=&#8221;100&#8243; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_gallery el_id=&#8221;gallery-318462&#8243; type=&#8221;carousel&#8221; medias=&#8221;552,528&#8243; carousel_lg=&#8221;3&#8243; carousel_md=&#8221;3&#8243; carousel_sm=&#8221;1&#8243; gutter_size=&#8221;2&#8243; media_items=&#8221;media|nolink|original,icon,title,caption&#8221; carousel_interval=&#8221;3000&#8243; carousel_navspeed=&#8221;400&#8243; stage_padding=&#8221;0&#8243; single_text=&#8221;under&#8221; single_style=&#8221;dark&#8221; single_overlay_opacity=&#8221;50&#8243; single_image_anim=&#8221;no&#8221; single_h_align=&#8221;center&#8221; single_padding=&#8221;1&#8243; single_title_dimension=&#8221;h6&#8243; single_icon=&#8221;fa fa-plus2&#8243; single_border=&#8221;yes&#8221; lbox_title=&#8221;yes&#8221; lbox_caption=&#8221;yes&#8221; carousel_rtl=&#8221;&#8221; single_half_padding=&#8221;yes&#8221; single_title_serif=&#8221;&#8221; single_no_background=&#8221;yes&#8221; items=&#8221;eyIxMzc2M19pIjp7InNpbmdsZV9saW5rIjoidXJsOmh0dHAlM0ElMkYlMkZ3d3cudW5kc2duLmNvbXx8dGFyZ2V0OiUyMF9ibGFuayJ9LCIxMzc2OV9pIjp7InNpbmdsZV9saW5rIjoidXJsOmh0dHAlM0ElMkYlMkZ3d3cudW5kc2duLmNvbXx8dGFyZ2V0OiUyMF9ibGFuayJ9LCIxMzc3MF9pIjp7InNpbmdsZV9saW5rIjoidXJsOmh0dHAlM0ElMkYlMkZ3d3cudW5kc2duLmNvbXx8dGFyZ2V0OiUyMF9ibGFuayJ9LCIxMzc2Nl9pIjp7InNpbmdsZV9saW5rIjoidXJsOmh0dHAlM0ElMkYlMkZ3d3cudW5kc2duLmNvbXx8dGFyZ2V0OiUyMF9ibGFuayJ9fQ==&#8221;][vc_column_text text_lead=&#8221;yes&#8221;]Ka\u017cdy cz\u0142onek naszego zespo\u0142u jest ekspertem w dziedzinie cyberbezpiecze\u0144stwa oraz do\u0142o\u017cy\u0142 unikalne umiej\u0119tno\u015bci, kt\u00f3re pozwoli\u0142y prze\u0142o\u017cy\u0107 system na rozwi\u0105zanie biznesowe. Teraz mo\u017cemy wszechstronnie pom\u00f3c Tobie i Twojej firmie w poznaniu tajnik\u00f3w obrony przed cyberprzest\u0119pcami. Bezpiecze\u0144stwo IT jest z\u0142o\u017conym tematem, kt\u00f3rego zrozumienie wymaga wielu lat praktyki. Nasz system pozwala przekierowa\u0107 wiedz\u0119 i umiej\u0119tno\u015bci ekspert\u00f3w w miejsca, kt\u00f3re powinny by\u0107 starannie zabezpieczone.[\/vc_column_text][\/vc_column][\/vc_row][vc_row unlock_row_content=&#8221;yes&#8221; row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;2&#8243; top_padding=&#8221;4&#8243; bottom_padding=&#8221;3&#8243; back_color=&#8221;color-177066&#8243; overlay_alpha=&#8221;80&#8243; equal_height=&#8221;yes&#8221; gutter_size=&#8221;4&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; align_horizontal=&#8221;align_center&#8221; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading text_size=&#8221;fontsize-485774&#8243; text_color=&#8221;color-133804&#8243;]Wypr\u00f3buj APT Defend za darmo[\/vc_custom_heading][vc_button size=&#8221;btn-xl&#8221; border_width=&#8221;0&#8243; link=&#8221;url:https%3A%2F%2Faptdefend.com%2Fwyprobuj-za-darmo%2F|title:Wypr%C3%B3buj%20za%20darmo|target:_blank&#8221;]Sprawd\u017a[\/vc_button][\/vc_column][\/vc_row][vc_row unlock_row=&#8221;&#8221; row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;1&#8243; top_padding=&#8221;4&#8243; bottom_padding=&#8221;4&#8243; back_color=&#8221;color-xsdn&#8221; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; row_custom_slug_check=&#8221;yes&#8221; row_name=&#8221;kontakt&#8221; row_custom_slug=&#8221;kontakt&#8221;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;4&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; equal_height=&#8221;yes&#8221; gutter_size=&#8221;3&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;3&#8243; style=&#8221;dark&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; align_mobile=&#8221;align_center_mobile&#8221; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243;][vc_custom_heading heading_semantic=&#8221;h5&#8243; text_size=&#8221;h3&#8243; text_color=&#8221;color-133804&#8243;]Zapisz si\u0119 na newsletter i otrzymuj informacje na bie\u017c\u0105co[\/vc_custom_heading][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; position_vertical=&#8221;middle&#8221; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/2&#8243;]<div role=\"form\" class=\"wpcf7\" id=\"wpcf7-f564-o1\" lang=\"pl-PL\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/pl\/wp-json\/wp\/v2\/pages\/440#wpcf7-f564-o1\" method=\"post\" class=\"wpcf7-form init\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"564\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.4\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"pl_PL\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f564-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/div>\n<div class=\"wpcf7-inline-wrapper wpcf7-input-group\">\n<p class=\"wpcf7-inline-field wpcf7-inline-field-text\"><span class=\"wpcf7-form-control-wrap your-email\"><input type=\"email\" name=\"your-email\" value=\"\" size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Podaj e-mail\" \/><\/span><\/p>\n<p class=\"wpcf7-inline-field wpcf7-inline-field-btn\"><input type=\"submit\" value=\"Zapisz\" class=\"wpcf7-form-control wpcf7-submit btn btn-default btn-flat\" \/><\/p>\n<\/div>\n<p><span class=\"wpcf7-form-control-wrap acceptance-newsletter\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><input type=\"checkbox\" name=\"acceptance-newsletter\" value=\"1\" aria-invalid=\"false\" \/><\/span><\/span><\/span>Wyra\u017cam zgod\u0119 na przetwarzanie moich danych osobowych (adresu e-mail) zawartych w zg\u0142oszeniu... <a class=\"newsletter-modal\"> Czytaj wi\u0119cej<\/a><\/p>\n<input type='hidden' class='wpcf7-pum' value='{\"closepopup\":false,\"closedelay\":0,\"openpopup\":false,\"openpopup_id\":0}' \/><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div><\/form><\/div>[\/vc_column_inner][\/vc_row_inner][vc_separator sep_color=&#8221;color-183424&#8243;][vc_row_inner row_inner_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;3&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/4&#8243;][vc_custom_heading heading_semantic=&#8221;h5&#8243; text_size=&#8221;h5&#8243; text_weight=&#8221;900&#8243; text_color=&#8221;color-133804&#8243;]Kontakt[\/vc_custom_heading][vc_column_text]<a href=\"mailto:office@aptdefend.com\">office@aptdefend.com<\/a><br \/>\n+48 22 122 85 97[\/vc_column_text][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/4&#8243;][vc_custom_heading heading_semantic=&#8221;h5&#8243; text_size=&#8221;h5&#8243; text_weight=&#8221;900&#8243; text_color=&#8221;color-133804&#8243;]Biuro[\/vc_custom_heading][vc_column_text]Pu\u0142awska 12\/3<br \/>\n02-566 Warszawa[\/vc_column_text][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/4&#8243;][vc_custom_heading heading_semantic=&#8221;h5&#8243; text_size=&#8221;h5&#8243; text_weight=&#8221;900&#8243; text_color=&#8221;color-133804&#8243;]Informacje[\/vc_custom_heading][uncode_list icon=&#8221;fa fa-arrow-right3&#8243;]<\/p>\n<ul>\n<li><a href=\"https:\/\/aptdefend.com\/polityka-prywatnosci\/\">Polityka prywatno\u015bci<\/a><\/li>\n<li><a href=\"https:\/\/aptdefend.com\/polityka-cookies\/\">Polityka cookies<\/a><\/li>\n<li><a href=\"https:\/\/aptdefend.com\/polityka-bezpieczenstwa\/\">Polityka bezpiecze\u0144stwa<\/a><\/li>\n<\/ul>\n<p>[\/uncode_list][\/vc_column_inner][vc_column_inner column_width_percent=&#8221;100&#8243; gutter_size=&#8221;3&#8243; style=&#8221;light&#8221; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/4&#8243;][vc_custom_heading heading_semantic=&#8221;h5&#8243; text_size=&#8221;h5&#8243; text_weight=&#8221;900&#8243; text_color=&#8221;color-133804&#8243;]Obserwuj nas[\/vc_custom_heading][uncode_socials][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row unlock_row_content=&#8221;yes&#8221; row_height_percent=&#8221;0&#8243; override_padding=&#8221;yes&#8221; h_padding=&#8221;0&#8243; top_padding=&#8221;0&#8243; bottom_padding=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; equal_height=&#8221;yes&#8221; gutter_size=&#8221;0&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243; enable_bottom_divider=&#8221;default&#8221; bottom_divider=&#8221;step_3_4&#8243; shape_bottom_h_use_pixel=&#8221;&#8221; shape_bottom_height=&#8221;1&#8243; shape_bottom_color=&#8221;color-133804&#8243; shape_bottom_opacity=&#8221;33&#8243; shape_bottom_index=&#8221;0&#8243; [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/aptdefend.com\/pl\/wp-json\/wp\/v2\/pages\/440"}],"collection":[{"href":"https:\/\/aptdefend.com\/pl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/aptdefend.com\/pl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/aptdefend.com\/pl\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/aptdefend.com\/pl\/wp-json\/wp\/v2\/comments?post=440"}],"version-history":[{"count":94,"href":"https:\/\/aptdefend.com\/pl\/wp-json\/wp\/v2\/pages\/440\/revisions"}],"predecessor-version":[{"id":2559,"href":"https:\/\/aptdefend.com\/pl\/wp-json\/wp\/v2\/pages\/440\/revisions\/2559"}],"wp:attachment":[{"href":"https:\/\/aptdefend.com\/pl\/wp-json\/wp\/v2\/media?parent=440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}