{"id":21,"date":"2023-06-18T23:15:36","date_gmt":"2023-06-18T21:15:36","guid":{"rendered":"https:\/\/www.asseco-ce.cloud\/?post_type=service&#038;p=21"},"modified":"2026-01-19T14:38:22","modified_gmt":"2026-01-19T13:38:22","slug":"kyberneticka-bezpecnost","status":"publish","type":"service","link":"https:\/\/asseco-ce.cloud\/cs\/sluzby\/zajisteny-nonstop-provoz\/","title":{"rendered":"Kybernetick\u00e1 bezpe\u010dnos\u0165"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Nami poskytovan\u00e9 slu\u017eby v&nbsp;oblasti <\/strong><br><strong>kybernetickej bezpe\u010dnosti:<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-columns is-style-media-content is-layout-flex wp-container-core-columns-is-layout-602f8b02 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-decorative-left is-vertical is-layout-flex wp-container-core-group-is-layout-37c386f8 wp-block-group-is-layout-flex\" style=\"padding-left:var(--wp--preset--spacing--xl)\">\n<p><strong>Sie\u0165ov\u00e1 bezpe\u010dnos\u0165<\/strong> \u2013 Pokro\u010dil\u00e9 sie\u0165ov\u00e9 ochrany vr\u00e1tane firewallov, VPN a segment\u00e1cie, doplnen\u00e9 o nepretr\u017eit\u00fd monitoring na v\u010dasn\u00e9 odhalenie hrozieb.<\/p>\n\n\n\n<p><strong>Penetra\u010dn\u00e9 testy<\/strong> \u2013 Simul\u00e1cia \u00fatokov s&nbsp;cie\u013eom identifik\u00e1cie slab\u00fdch miest vo va\u0161ich syst\u00e9moch odkryje zranite\u013enosti a&nbsp;\u00farove\u0148 kybernetickej bezpe\u010dnosti vo firme.<\/p>\n\n\n\n<p><strong>Testy zranite\u013enosti<\/strong> \u2013 Automatizovan\u00fd proces, ktor\u00fd sl\u00fa\u017ei na odhalenie slab\u00fdch miest v syst\u00e9moch, aplik\u00e1ci\u00e1ch alebo sie\u0165ach, aby sa predi\u0161lo bezpe\u010dnostn\u00fdm rizik\u00e1m.<\/p>\n\n\n\n<p><strong>Business Impact Analysis<\/strong> \u2013 Anal\u00fdza dopadov preru\u0161enia k\u013e\u00fa\u010dov\u00fdch obchodn\u00fdch procesov identifikuje kritick\u00e9 procesy a&nbsp;navrhuje kroky na r\u00fdchlu obnovu a&nbsp;zn\u00ed\u017eenie riz\u00edk.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-style-masked-right\"><img decoding=\"async\" width=\"1024\" height=\"683\" data-image-position=\"1\" src=\"https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2023\/06\/bezpecnost-vasich-rieseni-a-infrastrukturny-audit-1024x683.jpg\" alt=\"Bezpe\u010dnos\u0165 va\u0161ich rie\u0161en\u00ed a infra\u0161trukt\u00farny audit\" class=\"wp-image-104 f-content__image\" srcset=\"https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2023\/06\/bezpecnost-vasich-rieseni-a-infrastrukturny-audit-1024x683.jpg 1024w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2023\/06\/bezpecnost-vasich-rieseni-a-infrastrukturny-audit-300x200.jpg 300w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2023\/06\/bezpecnost-vasich-rieseni-a-infrastrukturny-audit-768x512.jpg 768w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2023\/06\/bezpecnost-vasich-rieseni-a-infrastrukturny-audit-1536x1024.jpg 1536w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2023\/06\/bezpecnost-vasich-rieseni-a-infrastrukturny-audit-480x320.jpg 480w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2023\/06\/bezpecnost-vasich-rieseni-a-infrastrukturny-audit.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" fetchpriority=\"high\"><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-style-media-content is-layout-flex wp-container-core-columns-is-layout-602f8b02 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-style-masked-left\"><img decoding=\"async\" width=\"1024\" height=\"683\" src=\"data:image\/svg+xml,%3Csvg%20width%3D%221024%22%20height%3D%22683%22%20xmlns%3D%22http:\/\/www.w3.org\/2000\/svg%22%20viewBox%3D%220%200%201024%20683%22%3E%3C\/svg%3E\" alt=\"Sie\u0165ov\u00e9 slu\u017eby a ochrana perimetra\" class=\"wp-image-96 f-content__image f-lazy js-lazy\" data-src=\"https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2023\/06\/sietove-sluzby-a-ochrana-perimetra-1024x683.jpg\" data-srcset=\"https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2023\/06\/sietove-sluzby-a-ochrana-perimetra-1024x683.jpg 1024w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2023\/06\/sietove-sluzby-a-ochrana-perimetra-300x200.jpg 300w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2023\/06\/sietove-sluzby-a-ochrana-perimetra-768x512.jpg 768w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2023\/06\/sietove-sluzby-a-ochrana-perimetra-1536x1024.jpg 1536w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2023\/06\/sietove-sluzby-a-ochrana-perimetra-480x320.jpg 480w, https:\/\/asseco-ce.cloud\/wp-content\/uploads\/2023\/06\/sietove-sluzby-a-ochrana-perimetra.jpg 1920w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" fetchpriority=\"low\"><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group is-style-decorative-left is-vertical is-layout-flex wp-container-core-group-is-layout-37c386f8 wp-block-group-is-layout-flex\" style=\"padding-left:var(--wp--preset--spacing--xl)\">\n<p><strong>SIEM (QRadar) <\/strong>\u2013 Centr\u00e1lny doh\u013ead a&nbsp;anal\u00fdza bezpe\u010dnostn\u00fdch udalost\u00ed v&nbsp;re\u00e1lnom \u010dase a&nbsp;r\u00fdchle odhalenie bezpe\u010dnostn\u00fdch riz\u00edk.<\/p>\n\n\n\n<p><strong>Business Continuity<\/strong> \u2013 Strategick\u00e9 pl\u00e1novanie pre zaistenie kontinuity k\u013e\u00fa\u010dov\u00fdch obchodn\u00fdch procesov v&nbsp;pr\u00edpade kr\u00edzov\u00fdch situ\u00e1ci\u00ed, ako technick\u00e9 probl\u00e9my alebo kybernetick\u00e9 \u00fatoky.<\/p>\n\n\n\n<p><strong>Prevencia \u00faniku d\u00e1t<\/strong> \u2013 Ochrana citliv\u00fdch d\u00e1t pred neopr\u00e1vnen\u00fdm pr\u00edstupom, \u00fanikom alebo stratou pomocou monitoringu a&nbsp;kontroly prenosu d\u00e1t, zabezpe\u010denia koncov\u00fdch zariaden\u00ed a cloudov\u00fdch \u00falo\u017e\u00edsk.<\/p>\n\n\n\n<p><strong>Log management<\/strong> \u2013 Centralizovan\u00fd zber a&nbsp;anal\u00fdza logov, za \u00fa\u010delom r\u00fdchleho vyh\u013ead\u00e1vania ch\u00fdb, s\u00favislost\u00ed medzi udalos\u0165ami a&nbsp;optimaliz\u00e1cie v\u00fdkonu syst\u00e9mov.<\/p>\n\n\n\n<p><strong>EXIT strategy<\/strong> \u2013 Pl\u00e1n ukon\u010denia IT slu\u017eieb alebo obchodn\u00fdch vz\u0165ahov so zameran\u00edm na ochranu d\u00e1t, bezpe\u010dnos\u0165 a kontinuitu prev\u00e1dzky.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading has-accent-color has-text-color has-link-color wp-elements-76bc717f34a3b123b9e8460046a72a96\">Konzulta\u010dn\u00e9 slu\u017eby <\/h2>\n\n\n\n<p>Priprav\u00edme a\u00a0zrealizujeme komplexn\u00fa anal\u00fdzu, ktor\u00e1 over\u00ed va\u0161u pripravenos\u0165 na plnenie najaktu\u00e1lnej\u0161\u00edch legislat\u00edvnych a\u00a0bezpe\u010dnostn\u00fdch po\u017eiadaviek. Pom\u00f4\u017eeme v\u00e1m systematicky vyhodnoti\u0165 rizik\u00e1 a\u00a0ich potenci\u00e1lne dopady a\u00a0vytvor\u00edme strategick\u00fd pl\u00e1n odpor\u00fa\u010dan\u00ed na ich odstr\u00e1nenie.<\/p>\n\n\n\n<div class=\"wp-block-group is-style-decorative-left is-vertical is-layout-flex wp-container-core-group-is-layout-37c386f8 wp-block-group-is-layout-flex\" style=\"padding-left:var(--wp--preset--spacing--xl)\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-ccbee36c wp-block-group-is-layout-flex\">\n<h5 class=\"wp-block-heading has-primary-color has-text-color has-link-color wp-elements-5bd0e5f9461f3752ae6d42e700130938\"><strong><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Anal\u00fdza pripravenosti NIS2<\/mark><\/strong><\/strong><\/h5>\n<\/div>\n\n\n\n<ul class=\"wp-block-list is-style-caret\">\n<li>Zhodnot\u00edme aktu\u00e1lnu \u00farove\u0148 kybernetickej bezpe\u010dnosti.<\/li>\n\n\n\n<li>Identifikujeme nedostatky, vypracujeme strat\u00e9gie a n\u00e1vrh vhodn\u00fdch opatren\u00ed.<\/li>\n\n\n\n<li>Implementujeme navrhnut\u00e9 rie\u0161enia a za\u0161kol\u00edme zamestnancov s cie\u013eom zv\u00fd\u0161i\u0165 celkov\u00fa kybernetick\u00fa odolnos\u0165 firmy.<\/li>\n\n\n\n<li>Zabezpe\u010d\u00edme priebe\u017en\u00fd monitoring s\u00faladu s po\u017eiadavkami smernice NIS2.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-decorative-left is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-7e27f23d wp-block-group-is-layout-flex\" style=\"padding-left:var(--wp--preset--spacing--xl)\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-ccbee36c wp-block-group-is-layout-flex\">\n<h5 class=\"wp-block-heading has-primary-color has-text-color has-link-color wp-elements-cf21363c8e571409799a31023fe90d17\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Anal\u00fdza pripravenosti DORA<\/mark><\/strong><\/h5>\n<\/div>\n\n\n\n<ul class=\"wp-block-list is-style-caret\">\n<li>Komplexne pos\u00fadime odolnos\u0165 digit\u00e1lnej infra\u0161trukt\u00fary a&nbsp;procesov.<\/li>\n\n\n\n<li>Identifikujeme rizik\u00e1 spojen\u00e9 s IT infra\u0161trukt\u00farou a&nbsp;tret\u00edmi stranami.<\/li>\n\n\n\n<li>Navrhneme opatrenia a implement\u00e1ciu navrhnut\u00fdch rie\u0161en\u00ed.<\/li>\n\n\n\n<li>Testujeme a priebe\u017ene kontrolujeme s&nbsp;cie\u013eom dlhodobej efekt\u00edvnosti prijat\u00fdch bezpe\u010dnostn\u00fdch opatren\u00ed.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-style-decorative-left is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-7e27f23d wp-block-group-is-layout-flex\" style=\"padding-left:var(--wp--preset--spacing--xl)\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-ccbee36c wp-block-group-is-layout-flex\">\n<h5 class=\"wp-block-heading has-accent-color has-text-color has-link-color wp-elements-8228639ea22bb2af4a45e9829729b7cd\"><strong><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-primary-color\">Anal\u00fdza riz\u00edk<\/mark><\/strong><\/strong><\/h5>\n<\/div>\n\n\n\n<ul class=\"wp-block-list is-style-caret\">\n<li>Identifikujeme k\u013e\u00fa\u010dov\u00e9 aktivity a&nbsp;vyhodnot\u00edme mo\u017en\u00e9 dopady.<\/li>\n\n\n\n<li>Navrhneme vhodn\u00e9 bezpe\u010dnostn\u00e9 opatrenia.<\/li>\n\n\n\n<li>Implementujeme bezpe\u010dnostn\u00e9 rie\u0161enia a za\u0161kol\u00edme zamestnancov.<\/li>\n\n\n\n<li>Nastav\u00edme kontinu\u00e1lny monitoring pre trval\u00fa ochranu a r\u00fdchlu reakciu na hrozby.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-style-media-content is-layout-flex wp-container-core-columns-is-layout-602f8b02 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"menu_order":50,"template":"","class_list":["post-21","service","type-service","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/asseco-ce.cloud\/cs\/wp-json\/wp\/v2\/service\/21","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asseco-ce.cloud\/cs\/wp-json\/wp\/v2\/service"}],"about":[{"href":"https:\/\/asseco-ce.cloud\/cs\/wp-json\/wp\/v2\/types\/service"}],"wp:attachment":[{"href":"https:\/\/asseco-ce.cloud\/cs\/wp-json\/wp\/v2\/media?parent=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}