[{"data":1,"prerenderedAt":321},["ShallowReactive",2],{"ZicLfdVpp4":3,"TSeYXlbeuo":29,"l7fVObG3af":43,"KioMKVoX2M":59,"EleC3IvLu6":76,"F7Ds4WIH4D":93,"o6FuOdvMJk":110,"wIrRzokSLg":121,"nSiE9rcN53":135,"NyNI4vpVSu":149,"47DEQpj8HB":166,"u8bcfudrW4":172,"JTWUReB4dU":204,"s2fq5rpocC":221,"Tcyxpy5JMn":240,"uLIKSnOpgA":264,"IqK1V7MzFl":280,"qzXJk8y7Tw":297},{"data":4,"body":7,"excerpt":-1,"toc":26},{"title":5,"description":6},"","Omniac: Cyber Intelligence dla Twojej firmy",{"type":8,"children":9},"root",[10],{"type":11,"tag":12,"props":13,"children":14},"element","p",{},[15,18,24],{"type":16,"value":17},"text","Omniac: ",{"type":11,"tag":19,"props":20,"children":21},"strong",{},[22],{"type":16,"value":23},"Cyber Intelligence",{"type":16,"value":25}," dla Twojej firmy",{"title":5,"searchDepth":27,"depth":27,"links":28},2,[],{"data":30,"body":32,"excerpt":-1,"toc":41},{"title":5,"description":31},"Rozpoznawaj kradzież tożsamości i danych na wczesnym etapie. Wykrywaj globalne powierzchnie ataków, zanim cyberprzestępcy zdołają uderzyć.",{"type":8,"children":33},[34],{"type":11,"tag":12,"props":35,"children":36},{},[37],{"type":11,"tag":19,"props":38,"children":39},{},[40],{"type":16,"value":31},{"title":5,"searchDepth":27,"depth":27,"links":42},[],{"data":44,"body":46,"excerpt":-1,"toc":57},{"title":5,"description":45},"Omniac przez całą dobę monitoruje dane dostępowe w Internecie i Darknecie oraz w sposób nieinwazyjny zewnętrzne powierzchnie ataków. Natychmiast informujemy o skradzionych tożsamościach, Shadow IT i lukach w zabezpieczeniach.",{"type":8,"children":47},[48,52],{"type":11,"tag":12,"props":49,"children":50},{},[51],{"type":16,"value":45},{"type":11,"tag":12,"props":53,"children":54},{},[55],{"type":16,"value":56},"W ten sposób zapobiegasz przejęciom kont (Account Take Over) i wzmacniasz swoją obronę.",{"title":5,"searchDepth":27,"depth":27,"links":58},[],{"data":60,"body":62,"excerpt":-1,"toc":74},{"title":5,"description":61},"Wszystkie branże. Na całym świecie.",{"type":8,"children":63},[64],{"type":11,"tag":12,"props":65,"children":66},{},[67,69],{"type":16,"value":68},"Wszystkie branże. ",{"type":11,"tag":19,"props":70,"children":71},{},[72],{"type":16,"value":73},"Na całym świecie.",{"title":5,"searchDepth":27,"depth":27,"links":75},[],{"data":77,"body":79,"excerpt":-1,"toc":91},{"title":5,"description":78},"Twoje korzyści",{"type":8,"children":80},[81],{"type":11,"tag":12,"props":82,"children":83},{},[84,86],{"type":16,"value":85},"Twoje ",{"type":11,"tag":19,"props":87,"children":88},{},[89],{"type":16,"value":90},"korzyści",{"title":5,"searchDepth":27,"depth":27,"links":92},[],{"data":94,"body":96,"excerpt":-1,"toc":108},{"title":5,"description":95},"360° Cyber Threat Intelligence i ochrona tożsamości",{"type":8,"children":97},[98],{"type":11,"tag":12,"props":99,"children":100},{},[101,106],{"type":11,"tag":19,"props":102,"children":103},{},[104],{"type":16,"value":105},"360° Cyber Threat Intelligence",{"type":16,"value":107}," i ochrona tożsamości",{"title":5,"searchDepth":27,"depth":27,"links":109},[],{"data":111,"body":113,"excerpt":-1,"toc":119},{"title":5,"description":112},"Zarządzanie zewnętrzną powierzchnią ataku (EASM)",{"type":8,"children":114},[115],{"type":11,"tag":12,"props":116,"children":117},{},[118],{"type":16,"value":112},{"title":5,"searchDepth":27,"depth":27,"links":120},[],{"data":122,"body":124,"excerpt":-1,"toc":133},{"title":5,"description":123},"Credential Intelligence i zapobieganie Account Take Over (ATO)",{"type":8,"children":125},[126],{"type":11,"tag":12,"props":127,"children":128},{},[129],{"type":11,"tag":19,"props":130,"children":131},{},[132],{"type":16,"value":123},{"title":5,"searchDepth":27,"depth":27,"links":134},[],{"data":136,"body":138,"excerpt":-1,"toc":147},{"title":5,"description":137},"Ochrona przed zagrożeniami cyfrowymi (DRP)",{"type":8,"children":139},[140],{"type":11,"tag":12,"props":141,"children":142},{},[143],{"type":11,"tag":19,"props":144,"children":145},{},[146],{"type":16,"value":137},{"title":5,"searchDepth":27,"depth":27,"links":148},[],{"data":150,"body":152,"excerpt":-1,"toc":164},{"title":5,"description":151},"Monitorowanie danych poprzez panel webowy i API",{"type":8,"children":153},[154],{"type":11,"tag":12,"props":155,"children":156},{},[157,159],{"type":16,"value":158},"Monitorowanie danych poprzez ",{"type":11,"tag":19,"props":160,"children":161},{},[162],{"type":16,"value":163},"panel webowy i API",{"title":5,"searchDepth":27,"depth":27,"links":165},[],{"data":167,"body":168,"excerpt":-1,"toc":170},{"title":5,"description":5},{"type":8,"children":169},[],{"title":5,"searchDepth":27,"depth":27,"links":171},[],{"data":173,"body":175,"excerpt":-1,"toc":202},{"title":5,"description":174},"Panel webowy",{"type":8,"children":176},[177,184,189,197],{"type":11,"tag":12,"props":178,"children":179},{},[180],{"type":11,"tag":19,"props":181,"children":182},{},[183],{"type":16,"value":174},{"type":11,"tag":12,"props":185,"children":186},{},[187],{"type":16,"value":188},"Za pomocą unseres panelu definiujesz dane i obszary do monitorowania. Wyniki nieinwazyjnych skanów, wykonywanych kilka razy dziennie, są wyświetlane w przejrzystych panelach; dodatkowo możesz ustawić automatyczne ostrzeżenia i analizować surowe dane. Monitoruj status zagrożeń w dowolnym momencie i bez wysiłku związanego z integracją.",{"type":11,"tag":12,"props":190,"children":191},{},[192],{"type":11,"tag":19,"props":193,"children":194},{},[195],{"type":16,"value":196},"Indywidualne połączenie (API)",{"type":11,"tag":12,"props":198,"children":199},{},[200],{"type":16,"value":201},"Zautomatyzuj za pomocą naszego API ciągłe monitorowanie danych osobowych Twoich pracowników i klientów w Darknecie, Deep Webie i Internecie. W celu indywidualnej integracji z istniejącym środowiskiem systemowym udostępniamy szczegółowo udokumentowane API i wspieramy Cię we wdrożeniu.",{"title":5,"searchDepth":27,"depth":27,"links":203},[],{"data":205,"body":207,"excerpt":-1,"toc":219},{"title":5,"description":206},"Omniac monitoruje wszystkie domeny Twojej firmy i partnerów.",{"type":8,"children":208},[209],{"type":11,"tag":12,"props":210,"children":211},{},[212,214],{"type":16,"value":213},"Omniac monitoruje ",{"type":11,"tag":19,"props":215,"children":216},{},[217],{"type":16,"value":218},"wszystkie domeny Twojej firmy i partnerów.",{"title":5,"searchDepth":27,"depth":27,"links":220},[],{"data":222,"body":224,"excerpt":-1,"toc":238},{"title":5,"description":223},"Za pomocą panelu webowego możesz w każdej chwili monitorować status zagrożeń.",{"type":8,"children":225},[226],{"type":11,"tag":12,"props":227,"children":228},{},[229,231,236],{"type":16,"value":230},"Za pomocą ",{"type":11,"tag":19,"props":232,"children":233},{},[234],{"type":16,"value":235},"panelu webowego",{"type":16,"value":237}," możesz w każdej chwili monitorować status zagrożeń.",{"title":5,"searchDepth":27,"depth":27,"links":239},[],{"data":241,"body":243,"excerpt":-1,"toc":262},{"title":5,"description":242},"Państwa dane. Nasza odpowiedzialność.",{"type":8,"children":244},[245],{"type":11,"tag":12,"props":246,"children":247},{},[248,253,255,260],{"type":11,"tag":19,"props":249,"children":250},{},[251],{"type":16,"value":252},"Państwa",{"type":16,"value":254}," dane. ",{"type":11,"tag":19,"props":256,"children":257},{},[258],{"type":16,"value":259},"Nasza",{"type":16,"value":261}," odpowiedzialność.",{"title":5,"searchDepth":27,"depth":27,"links":263},[],{"data":265,"body":267,"excerpt":-1,"toc":278},{"title":5,"description":266},"W pełni spełniamy wymogi europejskiego Ogólnego Rozporządzenia o Ochronie Danych (RODO) i nie mamy żadnego dostępu do wprowadzanych lub przesyłanych przez Państwa danych.",{"type":8,"children":268},[269,273],{"type":11,"tag":12,"props":270,"children":271},{},[272],{"type":16,"value":266},{"type":11,"tag":12,"props":274,"children":275},{},[276],{"type":16,"value":277},"W aplikacji omniac haszujemy, maskujemy i szyfrujemy Państwa dane, zarówno podczas transmisji, jak i przechowywania. Tworzymy oprogramowanie i hostujemy je w bezpiecznej chmurze STACKIT Cloud w Niemczech.",{"title":5,"searchDepth":27,"depth":27,"links":279},[],{"data":281,"body":283,"excerpt":-1,"toc":295},{"title":5,"description":282},"Gotowy na omniac Cyber Intelligence?",{"type":8,"children":284},[285],{"type":11,"tag":12,"props":286,"children":287},{},[288,290],{"type":16,"value":289},"Gotowy na ",{"type":11,"tag":19,"props":291,"children":292},{},[293],{"type":16,"value":294},"omniac Cyber Intelligence?",{"title":5,"searchDepth":27,"depth":27,"links":296},[],{"data":298,"body":300,"excerpt":-1,"toc":319},{"title":5,"description":299},"Wykrywaj kradzieże danych. Zapobiegaj oszustwom. Wzmacniaj zaufanie.",{"type":8,"children":301},[302,309,314],{"type":11,"tag":12,"props":303,"children":304},{},[305],{"type":11,"tag":19,"props":306,"children":307},{},[308],{"type":16,"value":299},{"type":11,"tag":12,"props":310,"children":311},{},[312],{"type":16,"value":313},"Skontaktuj se z nami, aby uzyskać szczegółowe informacje na temat zakresu usług, możliwości integracji i cen. Czekamy na kontakt z Państwem.",{"type":11,"tag":12,"props":315,"children":316},{},[317],{"type":16,"value":318},"Wyślij do nas wiadomość e-mail na adres:",{"title":5,"searchDepth":27,"depth":27,"links":320},[],1773847324478]