{"id":86405,"date":"2022-04-27T13:25:23","date_gmt":"2022-04-27T11:25:23","guid":{"rendered":"https:\/\/mwtsolutions.eu\/?p=86405"},"modified":"2022-04-27T13:25:23","modified_gmt":"2022-04-27T11:25:23","slug":"the-one-stop-solution-for-keeping-your-it-environment-secure","status":"publish","type":"post","link":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/","title":{"rendered":"Komplexn\u00ed \u0159e\u0161en\u00ed pro zabezpe\u010den\u00ed Va\u0161eho IT prost\u0159ed\u00ed &#8211; Log360"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"86405\" class=\"elementor elementor-86405\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d1820a elementor-section-boxed elementor-section-height-default elementor-section-height-default force-full-width-no\" data-id=\"5d1820a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7a89800\" data-id=\"7a89800\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0815b25 elementor-widget elementor-widget-text-editor\" data-id=\"0815b25\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Kybernetick\u00e9 hrozby se neust\u00e1le vyv\u00edjej\u00ed a zp\u016fsobuj\u00ed ztr\u00e1ty v \u0159\u00e1du miliard dolar\u016f. Podle spole\u010dnosti <a href=\"https:\/\/www.stealthlabs.com\/blog\/cyber-security-threats-all-you-need-to-know\/\">StealthLabs dojde do roku 2024 k 76% n\u00e1r\u016fstu naru\u0161en\u00ed kybernetick\u00e9 bezpe\u010dnosti<\/a>. <a href=\"https:\/\/www.ibm.com\/downloads\/cas\/OJDVQGRY\">Zpr\u00e1va spole\u010dnosti IBM<\/a> uv\u00e1d\u00ed, \u017ee v roce 2021 trvalo v pr\u016fm\u011bru 287 dn\u00ed, ne\u017e se poda\u0159ilo identifikovat a omezit naru\u0161en\u00ed bezpe\u010dnosti dat. Podle zpr\u00e1vy spole\u010dnosti Verizon o vy\u0161et\u0159ov\u00e1n\u00ed naru\u0161en\u00ed dat v roce 2020 bylo 86 % naru\u0161en\u00ed kybernetick\u00e9 bezpe\u010dnosti motivov\u00e1no finan\u010dn\u011b a 10 % bylo motivov\u00e1no \u0161pion\u00e1\u017e\u00ed.<\/strong><\/p><p>\u00a0<\/p><p>A\u0165 u\u017e je motiv jak\u00fdkoli, kybernetick\u00e9 bezpe\u010dnostn\u00ed hrozby se staly v\u0161udyp\u0159\u00edtomn\u00fdmi a nad\u00e1le naru\u0161uj\u00ed v\u0161echny aspekty digit\u00e1ln\u00ed sf\u00e9ry. V\u017edy je lep\u0161\u00ed b\u00fdt v bezpe\u010d\u00ed ne\u017e litovat. A pr\u00e1v\u011b proto pot\u0159ebujete \u0159e\u0161en\u00ed SIEM, abyste sv\u00e9 IT prost\u0159ed\u00ed zabezpe\u010dili p\u0159ed kybernetick\u00fdmi hrozbami a naru\u0161en\u00edmi.<\/p><p>\u00a0<\/p><p><a href=\"https:\/\/i.mwtsolutions.eu\/cs\/produkty\/security-it\/log360\/\">Log360<\/a> je jednotn\u00e9 \u0159e\u0161en\u00ed SIEM s funkcemi cloud access security broker (CASB) a prevence ztr\u00e1ty dat (DLP), kter\u00e9 m\u016f\u017ee organizac\u00edm pomoci br\u00e1nit se proti kybernetick\u00fdm \u00fatok\u016fm. \u00dazce integruje n\u00e1stroje pro spr\u00e1vu log\u016f a anal\u00fdzu zabezpe\u010den\u00ed s\u00edt\u011b a bezprobl\u00e9mov\u011b zachycuje logy z cel\u00e9 s\u00ed\u0165ov\u00e9 a serverov\u00e9 infrastruktury.<\/p><p>\u00a0<\/p><p>Kl\u00ed\u010dov\u00e9 funkce <a href=\"https:\/\/i.mwtsolutions.eu\/cs\/produkty\/security-it\/log360\/\">Log360<\/a> jsou:<\/p><ul><li>Komplexn\u00ed monitorov\u00e1n\u00ed log\u016f<\/li><li>Audit zm\u011bn Active Directory v re\u00e1ln\u00e9m \u010dase<\/li><li>Robustn\u00ed anal\u00fdza chov\u00e1n\u00ed<\/li><li>Integrovan\u00e1 spr\u00e1va dodr\u017eov\u00e1n\u00ed p\u0159edpis\u016f IT<\/li><li>Ochrana dat<\/li><li>Zpravodajstv\u00ed a anal\u00fdza hrozeb<\/li><li>Komplexn\u00ed detekce, spr\u00e1va a reakce na incidenty<\/li><\/ul><p>\u00a0<\/p><p>Zde je p\u011bt d\u016fvod\u016f, pro\u010d byste si m\u011bli vybrat <a href=\"https:\/\/i.mwtsolutions.eu\/cs\/produkty\/security-it\/log360\/\">Log360<\/a>.<\/p><h3>1. Monitorov\u00e1n\u00ed zabezpe\u010den\u00ed v re\u00e1ln\u00e9m \u010dase<\/h3><p>\u00a0<\/p><p><a href=\"https:\/\/i.mwtsolutions.eu\/cs\/produkty\/security-it\/log360\/\">Log360<\/a> monitoruje v\u0161echny kl\u00ed\u010dov\u00e9 zdroje ve va\u0161\u00ed s\u00edti. P\u0159edpokl\u00e1dejme, \u017ee se \u00fato\u010dn\u00edk sna\u017e\u00ed nabourat do va\u0161\u00ed s\u00edt\u011b a n\u011bkolikr\u00e1t se pokou\u0161\u00ed p\u0159ihl\u00e1sit ke koncov\u00e9mu bodu. V takov\u00e9m sc\u00e9n\u00e1\u0159i dojde k n\u011bkolikan\u00e1sobn\u00e9mu selh\u00e1n\u00ed p\u0159ihl\u00e1\u0161en\u00ed. Log360 okam\u017eit\u011b spust\u00ed v\u00fdstrahy, abyste o situaci v\u011bd\u011bli.<\/p><p>\u00a0<\/p><p><strong>Anal\u00fdza log\u016f a dat:<\/strong><\/p><p><a href=\"https:\/\/i.mwtsolutions.eu\/cs\/produkty\/security-it\/log360\/\">Log360<\/a> m\u016f\u017ee shroma\u017e\u010fovat a analyzovat logy a\u017e ze 700 r\u016fzn\u00fdch zdroj\u016f dat. Bezprobl\u00e9mov\u011b shroma\u017e\u010fuje a analyzuje logy z r\u016fzn\u00fdch zdroj\u016f a vytv\u00e1\u0159\u00ed p\u0159ehledy ve form\u011b report\u016f. Spou\u0161t\u00ed v\u00fdstrahy, kdy\u017e dojde k n\u011b\u010demu anom\u00e1ln\u00edmu, nap\u0159\u00edklad k v\u00edcen\u00e1sobn\u00e9mu selh\u00e1n\u00ed p\u0159ihl\u00e1\u0161en\u00ed, co\u017e by mohlo b\u00fdt zn\u00e1mkou mo\u017en\u00e9ho naru\u0161en\u00ed, a pom\u00e1h\u00e1 tak okam\u017eit\u011b identifikovat bezpe\u010dnostn\u00ed hrozby.<\/p><p>\u00a0<\/p><p><strong>Monitorov\u00e1n\u00ed aktivity VPN:<\/strong><\/p><p>Prost\u0159ednictv\u00edm monitorov\u00e1n\u00ed relac\u00ed VPN poskytuje Log360 d\u016fle\u017eit\u00e9 informace, jako je po\u010det aktivn\u00edch relac\u00ed VPN, doba trv\u00e1n\u00ed ka\u017ed\u00e9 relace VPN a stav p\u0159ipojen\u00ed VPN ka\u017ed\u00e9ho jednotliv\u00e9ho u\u017eivatele. Pomoc\u00ed t\u011bchto informac\u00ed lze pomoc\u00ed okam\u017eit\u00fdch upozorn\u011bn\u00ed identifikovat jak\u00e9koli podez\u0159el\u00e9 aktivity, jako je nap\u0159\u00edklad n\u011bkolikan\u00e1sobn\u00e9 selh\u00e1n\u00ed p\u0159ihl\u00e1\u0161en\u00ed k s\u00edti VPN a n\u011bkolikan\u00e1sobn\u00e9 \u00fasp\u011b\u0161n\u00e9 p\u0159ipojen\u00ed k s\u00edti VPN stejn\u00fdm u\u017eivatelem z r\u016fzn\u00fdch m\u00edst v dan\u00e9m \u010dasov\u00e9m r\u00e1mci.<\/p><p>\u00a0<\/p><p><strong>\u00datok na Colonial Pipeline<\/strong> &#8211; hackersk\u00fd \u00fatok, kter\u00fd vy\u0159adil z provozu nejv\u011bt\u0161\u00ed palivov\u00fd ropovod v USA &#8211; byl v\u00fdsledkem kompromitace \u00fa\u010dtu VPN. P\u0159ihla\u0161ovac\u00ed \u00fadaje u\u017eivatele unikly na dark web a hacke\u0159i je pou\u017eili k pr\u016fniku do s\u00edt\u011b. Kdyby \u00fa\u010det pou\u017e\u00edval v\u00edcefaktorov\u00e9 ov\u011b\u0159ov\u00e1n\u00ed, hackersk\u00e9mu \u00fatoku by se dalo zabr\u00e1nit.<\/p><p>\u00a0<\/p><p><strong>Sledov\u00e1n\u00ed \u010dinnosti privilegovan\u00fdch u\u017eivatel\u016f:<\/strong><\/p><p>Privilegovan\u00ed u\u017eivatel\u00e9 maj\u00ed opr\u00e1vn\u011bn\u00ed prov\u00e1d\u011bt zm\u011bny konfigurace, kter\u00e9 by mohly ohrozit zabezpe\u010den\u00ed IT infrastruktury. Pomoc\u00ed aplikace <a href=\"https:\/\/i.mwtsolutions.eu\/cs\/produkty\/security-it\/log360\/\">Log360<\/a> se zaznamen\u00e1vaj\u00ed v\u0161echny \u010dinnosti privilegovan\u00fdch u\u017eivatel\u016f; to zahrnuje vytv\u00e1\u0159en\u00ed skupin zabezpe\u010den\u00ed, p\u0159id\u00e1v\u00e1n\u00ed \u010dlen\u016f do skupin zabezpe\u010den\u00ed, zm\u011bny p\u0159\u00edstupov\u00fdch opr\u00e1vn\u011bn\u00ed u\u017eivatel\u016f a \u00fapravy objekt\u016f z\u00e1sad skupiny.<\/p><p>Pomoc\u00ed <a href=\"https:\/\/i.mwtsolutions.eu\/cs\/produkty\/security-it\/log360\/\">Log360<\/a> mohou organizace nap\u0159\u00edklad vyhled\u00e1vat sc\u00e9n\u00e1\u0159e, kdy jsou nov\u00ed zam\u011bstnanci p\u0159id\u00e1v\u00e1ni do vysoce citliv\u00fdch skupin. V t\u011bchto p\u0159\u00edpadech m\u016f\u017ee b\u00fdt spu\u0161t\u011bno upozorn\u011bn\u00ed a bezpe\u010dnostn\u00ed analytik m\u016f\u017ee zjistit, zda bylo toto p\u0159id\u00e1n\u00ed opr\u00e1vn\u011bn\u00e9.<\/p><p>\u00a0<\/p><p><strong>Sledov\u00e1n\u00ed integrity soubor\u016f a sledov\u00e1n\u00ed aktivity soubor\u016f:<\/strong><\/p><p>Zat\u00edmco monitorov\u00e1n\u00ed integrity soubor\u016f slou\u017e\u00ed ke sledov\u00e1n\u00ed a zji\u0161\u0165ov\u00e1n\u00ed zm\u011bn soubor\u016f na \u00farovni syst\u00e9mu, monitorov\u00e1n\u00ed aktivity soubor\u016f sleduje v\u0161echny zm\u011bny proveden\u00e9 v souborech a slo\u017ek\u00e1ch, jako je \u010dten\u00ed, editace, kop\u00edrov\u00e1n\u00ed a vkl\u00e1d\u00e1n\u00ed a p\u0159ejmenov\u00e1n\u00ed souboru nebo slo\u017eky. Pokud je jak\u00e1koli \u010dinnost se soubory neopr\u00e1vn\u011bn\u00e1, okam\u017eit\u011b se spust\u00ed v\u00fdstrahy, proto\u017ee by to mohlo v\u00e9st k nedodr\u017een\u00ed p\u0159edpis\u016f a pr\u00e1vn\u00edm probl\u00e9m\u016fm pro firmu. Proveden\u00e9 zm\u011bny mohou tak\u00e9 ovlivnit fungov\u00e1n\u00ed server\u016f nebo aplikac\u00ed. Kyberneti\u010dt\u00ed \u00fato\u010dn\u00edci se nav\u00edc mohou pokusit manipulovat se soubory protokolu, aby p\u0159i prov\u00e1d\u011bn\u00ed \u00fatoku zahladili stopy.<\/p><p>\u00a0<\/p><h3>2. Zpravodajstv\u00ed o hrozb\u00e1ch<\/h3><p>\u00a0<\/p><p>P\u0159edpokl\u00e1dejte, \u017ee se v s\u00edti nach\u00e1z\u00ed \u00fato\u010dn\u00edk, o kter\u00e9m ji\u017e n\u011bkdo v\u00ed, \u017ee je \u0161kodliv\u00fd. Nebyla by jeho identifikace mnohem jednodu\u0161\u0161\u00ed a efektivn\u011bj\u0161\u00ed, kdybyste vyu\u017eili zpravodajsk\u00e9 informace t\u00e9to jin\u00e9 osoby? D\u00edky takov\u00e9mu p\u0159ehledu m\u016f\u017eete hackera identifikovat v okam\u017eiku, kdy vnikne do va\u0161\u00ed s\u00edt\u011b. Kdykoli naru\u0161itel vstoup\u00ed do va\u0161\u00ed s\u00edt\u011b z IP adresy, dom\u00e9ny nebo adresy URL uveden\u00e9 na seznamu blokovan\u00fdch adres, budete o tom v re\u00e1ln\u00e9m \u010dase informov\u00e1ni. <a href=\"https:\/\/i.mwtsolutions.eu\/cs\/produkty\/security-it\/log360\/\">Log360<\/a> zpracov\u00e1v\u00e1 nejnov\u011bj\u0161\u00ed informace o hrozb\u00e1ch z velmi v\u00fdznamn\u00fdch syst\u00e9m\u016f STIX a TAXII. Jedn\u00e1 se o glob\u00e1ln\u00ed standardy pou\u017e\u00edvan\u00e9 k reprezentaci a sd\u011blov\u00e1n\u00ed informac\u00ed o hrozb\u00e1ch. Obsahuj\u00ed nejaktu\u00e1ln\u011bj\u0161\u00ed a nejspolehliv\u011bj\u0161\u00ed informace. Proto\u017ee k nim m\u00e1 Log360 p\u0159\u00edstup, m\u016f\u017ee vyhled\u00e1vat naru\u0161itele z jak\u00e9hokoli koutu sv\u011bta.<\/p><p>\u00a0<\/p><h3>3. Anal\u00fdza entit a chov\u00e1n\u00ed u\u017eivatel\u016f<\/h3><p>\u00a0<\/p><p>Anal\u00fdza chov\u00e1n\u00ed u\u017eivatel\u016f a entit (UEBA) je technika kybernetick\u00e9 bezpe\u010dnosti, kter\u00e1 vyu\u017e\u00edv\u00e1 algoritmy strojov\u00e9ho u\u010den\u00ed k anal\u00fdze \u010dinnost\u00ed u\u017eivatel\u016f a odhalov\u00e1n\u00ed anom\u00e1li\u00ed, jako jsou p\u0159\u00edstupy k syst\u00e9mu v neobvyklou dobu, neobvykl\u00fd software spu\u0161t\u011bn\u00fd pro u\u017eivatele a neobvykl\u00e9 stahov\u00e1n\u00ed soubor\u016f.<\/p><p>\u00a0<\/p><p>UEBA v\u00e1m m\u016f\u017ee pomoci:<\/p><p>\u00a0<\/p><ul><li>Identifikovat anom\u00e1ln\u00ed chov\u00e1n\u00ed u\u017eivatele na z\u00e1klad\u011b \u010dasu, po\u010dtu a vzoru aktivit.<\/li><li>Odhalit hrozby vych\u00e1zej\u00edc\u00ed z \u00fatok\u016f zevnit\u0159, kompromitace \u00fa\u010dt\u016f a exfiltrace dat.<\/li><li>Z\u00edskejte v\u00edce bezpe\u010dnostn\u00edch souvislost\u00ed d\u00edky vz\u00e1jemn\u00e9mu propojen\u00ed r\u016fzn\u00fdch akc\u00ed u\u017e<\/li><\/ul><p>\u00a0<\/p><h3>4. Spr\u00e1va incident\u016f a reakce na n\u011b<\/h3><p>\u00a0<\/p><p>Spr\u00e1va incident\u016f je mostem mezi detekc\u00ed incident\u016f a reakc\u00ed na n\u011b. N\u00e1stroje pro spr\u00e1vu incident\u016f se hod\u00ed k zaji\u0161t\u011bn\u00ed hladk\u00e9ho toku informac\u00ed. <a href=\"https:\/\/i.mwtsolutions.eu\/cs\/produkty\/security-it\/log360\/\">Log360<\/a> m\u00e1 vestav\u011bnou konzoli pro spr\u00e1vu incident\u016f a umo\u017e\u0148uje p\u0159ed\u00e1vat bezpe\u010dnostn\u00ed incidenty extern\u00edmu softwaru, jako jsou ManageEngine ServiceDesk Plus a ServiceNow.<\/p><p>\u00a0<\/p><ul><li>Rychl\u00e9 zm\u00edrn\u011bn\u00ed n\u00e1sledk\u016f: To v\u00e1m umo\u017en\u00ed v\u00fdrazn\u011b zkr\u00e1tit dobu \u0159e\u0161en\u00ed incident\u016f d\u00edky rychl\u00e9mu a p\u0159esn\u00e9mu odhalen\u00ed, kategorizaci a anal\u00fdze incidentu.<\/li><li>Forenzn\u00ed anal\u00fdza: Anal\u00fdzou stop, kter\u00e9 po sob\u011b \u00fato\u010dn\u00edci zanechali, lze p\u0159edej\u00edt \u00fatoku, kter\u00fd by se mohl odehr\u00e1t v budoucnu.<\/li><\/ul><p>\u00a0<\/p><h3>5. Intuitivn\u00ed, p\u0159ehledn\u00e1 anal\u00fdza a p\u0159izp\u016fsoben\u00ed<\/h3><p>\u00a0<\/p><p>Integrovan\u00e1 anal\u00fdza shod se sm\u011brnicemi a zabezpe\u010den\u00ed je jednou z nejlep\u0161\u00edch funkc\u00ed tohoto produktu. Umo\u017e\u0148uje snadn\u00fd p\u0159ehled aktivit u\u017eivatel\u016f a entit. P\u0159ehledy v re\u00e1ln\u00e9m \u010dase v\u00e1m usnadn\u00ed rozhodov\u00e1n\u00ed.<\/p><p>\u00a0<\/p><p>Ka\u017ed\u00e1 firma m\u00e1 sv\u00e9 vlastn\u00ed jedine\u010dn\u00e9 charakteristiky, a proto se hrozby pro ka\u017edou organizaci li\u0161\u00ed. P\u0159\u00edpady pou\u017eit\u00ed pro ka\u017ed\u00fd aspekt <a href=\"https:\/\/i.mwtsolutions.eu\/cs\/produkty\/security-it\/log360\/\">Log360<\/a> si m\u016f\u017eete p\u0159izp\u016fsobit podle sv\u00fdch po\u017eadavk\u016f. To pom\u00e1h\u00e1 identifikovat hrozby, ke kter\u00fdm je va\u0161e spole\u010dnost n\u00e1chyln\u011bj\u0161\u00ed. Nap\u0159\u00edklad pravidla korelace a upozor\u0148ov\u00e1n\u00ed lze nakonfigurovat podle va\u0161ich p\u0159\u00edpad\u016f pou\u017eit\u00ed. M\u016f\u017eete si tak\u00e9 p\u0159izp\u016fsobit zp\u016fsob bodov\u00e1n\u00ed rizik a zp\u016fsob, jak\u00fdm \u0159e\u0161en\u00ed ch\u00e1pe anom\u00e1lie relevantn\u00ed pro va\u0161i firmu.<\/p><p>\u00a0<\/p><p><strong><a href=\"https:\/\/i.mwtsolutions.eu\/cs\/produkty\/security-it\/log360\/\">Log360<\/a> se ji\u017e p\u011bt let po sob\u011b um\u00edstil v Gartner Gartner Magic Quadrant pro SIEM<\/strong>. Zaji\u0161t\u011bn\u00ed bezpe\u010dnosti a zabezpe\u010den\u00ed va\u0161eho IT prost\u0159ed\u00ed je nejd\u016fle\u017eit\u011bj\u0161\u00ed sou\u010d\u00e1st\u00ed va\u0161eho podnik\u00e1n\u00ed, proto\u017ee jak\u00fdkoli kybernetick\u00fd \u00fatok nebo \u00fanik dat m\u016f\u017ee v\u00e9st ke ztr\u00e1t\u011b d\u016fv\u011bry, obchodu a hodnoty zna\u010dky. Aby se organizace vyhnuly kybernetick\u00fdm \u00fatok\u016fm, m\u011bly by b\u00fdt v\u017edy o krok nap\u0159ed p\u0159ed \u00fato\u010dn\u00edky. To znamen\u00e1 zn\u00e1t v\u0161echny zranitelnosti a mezery ve sv\u00e9 IT infrastruktu\u0159e, abyste je mohli opravit d\u0159\u00edve, ne\u017e je \u00fato\u010dn\u00edci vyu\u017eij\u00ed.<\/p><p>\u00a0<\/p><p>Aplikace <a href=\"https:\/\/i.mwtsolutions.eu\/cs\/produkty\/security-it\/log360\/\">Log360<\/a> v\u00e1m pom\u016f\u017ee b\u00fdt si pln\u011b v\u011bdomi toho, co se d\u011bje ve va\u0161\u00ed IT infrastruktu\u0159e, a upozorn\u00ed v\u00e1s na v\u0161echny potenci\u00e1ln\u00ed hrozby. M\u00edt p\u0159ehled o ka\u017ed\u00e9m centimetru va\u0161\u00ed IT infrastruktury a spravovat ka\u017edou jednotlivou sou\u010d\u00e1st pomoc\u00ed r\u016fzn\u00e9ho softwaru m\u016f\u017ee b\u00fdt n\u00e1ro\u010dn\u00e9 a nep\u0159ehledn\u00e9. Pr\u00e1v\u011b proto v\u00e1m <a href=\"https:\/\/i.mwtsolutions.eu\/cs\/produkty\/security-it\/log360\/\">Log360<\/a> usnadn\u00ed pr\u00e1ci, proto\u017ee p\u0159edstavuje komplexn\u00ed \u0159e\u0161en\u00ed pro sledov\u00e1n\u00ed cel\u00e9 va\u0161\u00ed IT infrastruktury v jedin\u00e9 konzoli.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Kybernetick\u00e9 hrozby se neust\u00e1le vyv\u00edjej\u00ed a zp\u016fsobuj\u00ed ztr\u00e1ty v \u0159\u00e1du miliard dolar\u016f. Podle spole\u010dnosti StealthLabs dojde do roku 2024 k 76% n\u00e1r\u016fstu naru\u0161en\u00ed kybernetick\u00e9 bezpe\u010dnosti. Zpr\u00e1va spole\u010dnosti IBM uv\u00e1d\u00ed, \u017ee v roce 2021 trvalo v pr\u016fm\u011bru 287 dn\u00ed, ne\u017e se poda\u0159ilo identifikovat a omezit naru\u0161en\u00ed bezpe\u010dnosti dat. Podle zpr\u00e1vy spole\u010dnosti Verizon o vy\u0161et\u0159ov\u00e1n\u00ed naru\u0161en\u00ed dat [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":86408,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_links_to":"","_links_to_target":""},"categories":[274,289],"tags":[438,337,595],"acf":[],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Komplexn\u00ed \u0159e\u0161en\u00ed pro zabezpe\u010den\u00ed Va\u0161eho IT prost\u0159ed\u00ed - Log360 - MWT Solutions<\/title>\n<meta name=\"description\" content=\"Log360 je \u0159e\u0161en\u00ed SIEM s funkcemi cloud access security broker a prevence ztr\u00e1ty dat, kter\u00e9 m\u016f\u017ee firm\u00e1m v obran\u011b proti kybernetick\u00fdm \u00fatok\u016fm.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Komplexn\u00ed \u0159e\u0161en\u00ed pro zabezpe\u010den\u00ed Va\u0161eho IT prost\u0159ed\u00ed - Log360 - MWT Solutions\" \/>\n<meta property=\"og:description\" content=\"Log360 je \u0159e\u0161en\u00ed SIEM s funkcemi cloud access security broker a prevence ztr\u00e1ty dat, kter\u00e9 m\u016f\u017ee firm\u00e1m v obran\u011b proti kybernetick\u00fdm \u00fatok\u016fm.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"MWT Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-27T11:25:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2022\/04\/The-one-stop-solution-for-keeping-your-IT-secure.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2403\" \/>\n\t<meta property=\"og:image:height\" content=\"1259\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"marketing@mwtsolutions.eu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napsal(a)\" \/>\n\t<meta name=\"twitter:data1\" content=\"marketing@mwtsolutions.eu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Odhadovan\u00e1 doba \u010dten\u00ed\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/\"},\"author\":{\"name\":\"marketing@mwtsolutions.eu\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe\"},\"headline\":\"Komplexn\u00ed \u0159e\u0161en\u00ed pro zabezpe\u010den\u00ed Va\u0161eho IT prost\u0159ed\u00ed &#8211; Log360\",\"datePublished\":\"2022-04-27T11:25:23+00:00\",\"dateModified\":\"2022-04-27T11:25:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/\"},\"wordCount\":1640,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\"},\"keywords\":[\"kybernetick\u00e9 \u00fatoky\",\"LOG360\",\"SIEM \u0159e\u0161en\u00ed\"],\"articleSection\":[\"\u010cl\u00e1nky\",\"Novinky\"],\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/\",\"url\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/\",\"name\":\"Komplexn\u00ed \u0159e\u0161en\u00ed pro zabezpe\u010den\u00ed Va\u0161eho IT prost\u0159ed\u00ed - Log360 - MWT Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#website\"},\"datePublished\":\"2022-04-27T11:25:23+00:00\",\"dateModified\":\"2022-04-27T11:25:23+00:00\",\"description\":\"Log360 je \u0159e\u0161en\u00ed SIEM s funkcemi cloud access security broker a prevence ztr\u00e1ty dat, kter\u00e9 m\u016f\u017ee firm\u00e1m v obran\u011b proti kybernetick\u00fdm \u00fatok\u016fm.\",\"breadcrumb\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/#breadcrumb\"},\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/i.mwtsolutions.eu\/cs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Komplexn\u00ed \u0159e\u0161en\u00ed pro zabezpe\u010den\u00ed Va\u0161eho IT prost\u0159ed\u00ed &#8211; Log360\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#website\",\"url\":\"https:\/\/i.mwtsolutions.eu\/\",\"name\":\"MWT Solutions\",\"description\":\"Kolejna witryna oparta na WordPressie\",\"publisher\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/i.mwtsolutions.eu\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"cs\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#organization\",\"name\":\"MWT Solutions\",\"url\":\"https:\/\/i.mwtsolutions.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png\",\"contentUrl\":\"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png\",\"width\":2825,\"height\":850,\"caption\":\"MWT Solutions\"},\"image\":{\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/pl.linkedin.com\/company\/mwt-solutions\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe\",\"name\":\"marketing@mwtsolutions.eu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g\",\"caption\":\"marketing@mwtsolutions.eu\"},\"url\":\"https:\/\/i.mwtsolutions.eu\/cs\/author\/marketingmwtsolutions-eu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Komplexn\u00ed \u0159e\u0161en\u00ed pro zabezpe\u010den\u00ed Va\u0161eho IT prost\u0159ed\u00ed - Log360 - MWT Solutions","description":"Log360 je \u0159e\u0161en\u00ed SIEM s funkcemi cloud access security broker a prevence ztr\u00e1ty dat, kter\u00e9 m\u016f\u017ee firm\u00e1m v obran\u011b proti kybernetick\u00fdm \u00fatok\u016fm.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/","og_locale":"cs_CZ","og_type":"article","og_title":"Komplexn\u00ed \u0159e\u0161en\u00ed pro zabezpe\u010den\u00ed Va\u0161eho IT prost\u0159ed\u00ed - Log360 - MWT Solutions","og_description":"Log360 je \u0159e\u0161en\u00ed SIEM s funkcemi cloud access security broker a prevence ztr\u00e1ty dat, kter\u00e9 m\u016f\u017ee firm\u00e1m v obran\u011b proti kybernetick\u00fdm \u00fatok\u016fm.","og_url":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/","og_site_name":"MWT Solutions","article_published_time":"2022-04-27T11:25:23+00:00","og_image":[{"width":2403,"height":1259,"url":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2022\/04\/The-one-stop-solution-for-keeping-your-IT-secure.png","type":"image\/png"}],"author":"marketing@mwtsolutions.eu","twitter_card":"summary_large_image","twitter_misc":{"Napsal(a)":"marketing@mwtsolutions.eu","Odhadovan\u00e1 doba \u010dten\u00ed":"7 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/#article","isPartOf":{"@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/"},"author":{"name":"marketing@mwtsolutions.eu","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe"},"headline":"Komplexn\u00ed \u0159e\u0161en\u00ed pro zabezpe\u010den\u00ed Va\u0161eho IT prost\u0159ed\u00ed &#8211; Log360","datePublished":"2022-04-27T11:25:23+00:00","dateModified":"2022-04-27T11:25:23+00:00","mainEntityOfPage":{"@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/"},"wordCount":1640,"commentCount":0,"publisher":{"@id":"https:\/\/i.mwtsolutions.eu\/#organization"},"keywords":["kybernetick\u00e9 \u00fatoky","LOG360","SIEM \u0159e\u0161en\u00ed"],"articleSection":["\u010cl\u00e1nky","Novinky"],"inLanguage":"cs","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/","url":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/","name":"Komplexn\u00ed \u0159e\u0161en\u00ed pro zabezpe\u010den\u00ed Va\u0161eho IT prost\u0159ed\u00ed - Log360 - MWT Solutions","isPartOf":{"@id":"https:\/\/i.mwtsolutions.eu\/#website"},"datePublished":"2022-04-27T11:25:23+00:00","dateModified":"2022-04-27T11:25:23+00:00","description":"Log360 je \u0159e\u0161en\u00ed SIEM s funkcemi cloud access security broker a prevence ztr\u00e1ty dat, kter\u00e9 m\u016f\u017ee firm\u00e1m v obran\u011b proti kybernetick\u00fdm \u00fatok\u016fm.","breadcrumb":{"@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/#breadcrumb"},"inLanguage":"cs","potentialAction":[{"@type":"ReadAction","target":["https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/i.mwtsolutions.eu\/cs\/clanky\/the-one-stop-solution-for-keeping-your-it-environment-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/i.mwtsolutions.eu\/cs\/"},{"@type":"ListItem","position":2,"name":"Komplexn\u00ed \u0159e\u0161en\u00ed pro zabezpe\u010den\u00ed Va\u0161eho IT prost\u0159ed\u00ed &#8211; Log360"}]},{"@type":"WebSite","@id":"https:\/\/i.mwtsolutions.eu\/#website","url":"https:\/\/i.mwtsolutions.eu\/","name":"MWT Solutions","description":"Kolejna witryna oparta na WordPressie","publisher":{"@id":"https:\/\/i.mwtsolutions.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/i.mwtsolutions.eu\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"cs"},{"@type":"Organization","@id":"https:\/\/i.mwtsolutions.eu\/#organization","name":"MWT Solutions","url":"https:\/\/i.mwtsolutions.eu\/","logo":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/","url":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png","contentUrl":"https:\/\/i.mwtsolutions.eu\/wp-content\/uploads\/2025\/05\/logo_MWT_rgb-color-1.png","width":2825,"height":850,"caption":"MWT Solutions"},"image":{"@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/pl.linkedin.com\/company\/mwt-solutions"]},{"@type":"Person","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/cbfc28d620b65bedafb3d7e21aa8e7fe","name":"marketing@mwtsolutions.eu","image":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/i.mwtsolutions.eu\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/883c83f70b3a7f2ceb29cff70d8f76c4?s=96&d=mm&r=g","caption":"marketing@mwtsolutions.eu"},"url":"https:\/\/i.mwtsolutions.eu\/cs\/author\/marketingmwtsolutions-eu\/"}]}},"_links":{"self":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts\/86405"}],"collection":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/comments?post=86405"}],"version-history":[{"count":10,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts\/86405\/revisions"}],"predecessor-version":[{"id":86419,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/posts\/86405\/revisions\/86419"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/media\/86408"}],"wp:attachment":[{"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/media?parent=86405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/categories?post=86405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/i.mwtsolutions.eu\/cs\/wp-json\/wp\/v2\/tags?post=86405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}