{"id":6639,"date":"2019-10-24T16:37:32","date_gmt":"2019-10-24T13:37:32","guid":{"rendered":"https:\/\/softico.ua\/?page_id=6639"},"modified":"2019-10-24T17:10:12","modified_gmt":"2019-10-24T14:10:12","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/softico.ua\/ru\/cybersecurity\/","title":{"rendered":"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 1220px + 0px );margin-left: calc(-0px \/ 2 );margin-right: calc(-0px \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-spacing-right-small:0px;--awb-spacing-left-small:0px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>dsgsfhdhth<\/p>\n<\/div><div class=\"fusion-recent-posts fusion-recent-posts-1 avada-container layout-default layout-columns-1 fusion-recent-posts-infinite fusion-recent-posts-load-more\" data-pages=\"2\"><section class=\"fusion-columns columns fusion-columns-1 columns-1\"><article class=\"post fusion-column column col col-lg-12 col-md-12 col-sm-12\"><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/softico.ua\/ru\/author\/vpo-softico-ua\/\" title=\"Posts by vpo@softico.ua\" rel=\"author\">vpo@softico.ua<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-01-08T11:14:16+03:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/softico.ua\/ru\/cybersecurity\/kak-projti-audit-bezopasnosti-4-shaga-bitdefender-compliance-manager\/\">\u041a\u0430\u043a \u043f\u0440\u043e\u0439\u0442\u0438 \u0430\u0443\u0434\u0438\u0442 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 4 \u0448\u0430\u0433\u0430 Bitdefender Compliance Manager<\/a><\/h4><\/div><\/article><article class=\"post fusion-column column col col-lg-12 col-md-12 col-sm-12\"><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/softico.ua\/ru\/author\/opa-softico-ua\/\" title=\"Posts by \u041f\u0430\u043f\u0430 \u041e\u043b\u0435\u043a\u0441\u0430\u043d\u0434\u0440\" rel=\"author\">\u041f\u0430\u043f\u0430 \u041e\u043b\u0435\u043a\u0441\u0430\u043d\u0434\u0440<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2025-06-11T12:41:42+03:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/softico.ua\/ru\/cybersecurity\/kak-zashhitit-vip-person-proaktivnaya-kiberbezopasnost-brandefense-softico\/\">5 \u0441\u043f\u043e\u0441\u043e\u0431\u043e\u0432 \u0437\u0430\u0449\u0438\u0442\u044b VIP-\u043f\u0435\u0440\u0441\u043e\u043d: \u043a\u0430\u043a \u043e\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u0438\u0442\u044c \u0442\u043e\u043f-\u043c\u0435\u043d\u0435\u0434\u0436\u043c\u0435\u043d\u0442 \u043e\u0442 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a<\/a><\/h4><\/div><\/article><article class=\"post fusion-column column col col-lg-12 col-md-12 col-sm-12\"><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/softico.ua\/ru\/author\/vd\/\" title=\"Posts by \u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f\" rel=\"author\">\u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2024-05-13T17:23:11+03:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/softico.ua\/ru\/cybersecurity\/24-05-vebinar-tableau-pulse-rozkrijte-silu-danih-dlya-vashogo-biznesu\/\">24\/05 \u0412\u0435\u0431\u0456\u043d\u0430\u0440 &#8220;Tableau Pulse: \u0420\u043e\u0437\u043a\u0440\u0438\u0439\u0442\u0435 \u0441\u0438\u043b\u0443 \u0434\u0430\u043d\u0438\u0445 \u0434\u043b\u044f \u0432\u0430\u0448\u043e\u0433\u043e \u0431\u0456\u0437\u043d\u0435\u0441\u0443&#8221;<\/a><\/h4><\/div><\/article><article class=\"post fusion-column column col col-lg-12 col-md-12 col-sm-12\"><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/softico.ua\/ru\/author\/vd\/\" title=\"Posts by \u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f\" rel=\"author\">\u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2024-01-10T18:01:58+03:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/softico.ua\/ru\/cybersecurity\/osvojte-svobodnoe-proektirovanie-s-pomoshhyu-instrumentov-solidworks-v-ramkah-programmy-xshape-master-class\/\">\u041e\u0441\u0432\u043e\u0439\u0442\u0435 \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0435 \u043f\u0440\u043e\u0435\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 SOLIDWORKS \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b xShape Master Class<\/a><\/h4><\/div><\/article><article class=\"post fusion-column column col col-lg-12 col-md-12 col-sm-12\"><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/softico.ua\/ru\/author\/vd\/\" title=\"Posts by \u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f\" rel=\"author\">\u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2023-12-13T13:59:33+03:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/softico.ua\/ru\/cybersecurity\/sekonomte-20-pri-pokupke-avast-i-avg\/\">\u0421\u044d\u043a\u043e\u043d\u043e\u043c\u044c\u0442\u0435 20% \u043f\u0440\u0438 \u043f\u043e\u043a\u0443\u043f\u043a\u0435 Avast \u0438 AVG<\/a><\/h4><\/div><\/article><article class=\"post fusion-column column col col-lg-12 col-md-12 col-sm-12\"><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/softico.ua\/ru\/author\/vd\/\" title=\"Posts by \u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f\" rel=\"author\">\u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-01-27T16:30:56+03:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/softico.ua\/ru\/cybersecurity\/polnoe-rukovodstvo-po-analizu-kiberugroz\/\">\u041f\u043e\u043b\u043d\u043e\u0435 \u0440\u0443\u043a\u043e\u0432\u043e\u0434\u0441\u0442\u0432\u043e \u043f\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0443 \u043a\u0438\u0431\u0435\u0440\u0443\u0433\u0440\u043e\u0437<\/a><\/h4><\/div><\/article><article class=\"post fusion-column column col col-lg-12 col-md-12 col-sm-12\"><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/softico.ua\/ru\/author\/vd\/\" title=\"Posts by \u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f\" rel=\"author\">\u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2023-02-07T15:27:44+03:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/softico.ua\/ru\/cybersecurity\/teamviewer-optimiziruet-globalnuyu-it-podderzhku-v-kompanii-henkel\/\">TeamViewer \u043e\u043f\u0442\u0438\u043c\u0438\u0437\u0438\u0440\u0443\u0435\u0442 \u0433\u043b\u043e\u0431\u0430\u043b\u044c\u043d\u0443\u044e \u0418\u0422-\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0443 \u0432 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Henkel<\/a><\/h4><\/div><\/article><article class=\"post fusion-column column col col-lg-12 col-md-12 col-sm-12\"><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/softico.ua\/ru\/author\/vd\/\" title=\"Posts by \u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f\" rel=\"author\">\u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2022-11-10T15:13:11+03:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/softico.ua\/ru\/cybersecurity\/novaya-versiya-produktov-eset-eshhe-bolshe-vozmozhnostej-dlya-zashhity-vazhnyh-dannyh\/\">\u041d\u043e\u0432\u0430\u044f \u0432\u0435\u0440\u0441\u0438\u044f \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 ESET \u2013 \u0435\u0449\u0435 \u0431\u043e\u043b\u044c\u0448\u0435 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0435\u0439 \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u0432\u0430\u0436\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445<\/a><\/h4><\/div><\/article><article class=\"post fusion-column column col col-lg-12 col-md-12 col-sm-12\"><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/softico.ua\/ru\/author\/vd\/\" title=\"Posts by \u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f\" rel=\"author\">\u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2022-09-08T17:28:54+03:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/softico.ua\/ru\/cybersecurity\/vebinar-ot-acronis-acronis-cyber-protect-rezervnoe-kopirovanie-microsoft-365-za-paru-klikov\/\">\u0412\u0435\u0431\u0438\u043d\u0430\u0440 \u043e\u0442 Acronis &#8220;Acronis Cyber Protect &#8211; \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u043e\u0435 \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 Microsoft 365 \u0437\u0430 \u043f\u0430\u0440\u0443 \u043a\u043b\u0438\u043a\u043e\u0432&#8221;<\/a><\/h4><\/div><\/article><article class=\"post fusion-column column col col-lg-12 col-md-12 col-sm-12\"><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/softico.ua\/ru\/author\/vd\/\" title=\"Posts by \u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f\" rel=\"author\">\u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2022-08-19T18:27:27+03:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/softico.ua\/ru\/cybersecurity\/vebinar-ot-acronis-advanced-data-loss-prevention-unikalnoe-reshenie-zashhishhayushhee-ot-utechki-dannyh\/\">\u0412\u0435\u0431\u0438\u043d\u0430\u0440 \u043e\u0442 Acronis \u00abAdvanced Data Loss Prevention &#8211; \u0443\u043d\u0438\u043a\u0430\u043b\u044c\u043d\u043e\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u0435, \u0437\u0430\u0449\u0438\u0449\u0430\u044e\u0449\u0435\u0435 \u043e\u0442 \u0443\u0442\u0435\u0447\u043a\u0438 \u0434\u0430\u043d\u043d\u044b\u0445\u00bb<\/a><\/h4><\/div><\/article><article class=\"post fusion-column column col col-lg-12 col-md-12 col-sm-12\"><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/softico.ua\/ru\/author\/vd\/\" title=\"Posts by \u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f\" rel=\"author\">\u0412\u0438\u043a\u0442\u043e\u0440\u0438\u044f \u0414\u0443\u0431\u043d\u0438\u0446\u043a\u0430\u044f<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2021-06-08T12:19:27+03:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/softico.ua\/ru\/cybersecurity\/povyshenie-tsen-v-olp-kanale\/\">\u041f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u0446\u0435\u043d \u0432 OLP \u043a\u0430\u043d\u0430\u043b\u0435<\/a><\/h4><\/div><\/article><article class=\"post fusion-column column col col-lg-12 col-md-12 col-sm-12\"><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/softico.ua\/ru\/author\/sm\/\" title=\"Posts by \u0421\u0435\u0440\u0433\u0435\u0439 \u041c\u0443\u0434\u0440\u0435\u043d\u043a\u043e\" rel=\"author\">\u0421\u0435\u0440\u0433\u0435\u0439 \u041c\u0443\u0434\u0440\u0435\u043d\u043a\u043e<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2020-08-17T12:03:14+03:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/softico.ua\/ru\/cybersecurity\/spetsialnoe-predlozhenie-na-resheniya-solidworks-dlya-inzhenernogo-analiza\/\">\u0421\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0435 \u043f\u0440\u0435\u0434\u043b\u043e\u0436\u0435\u043d\u0438\u0435 \u043d\u0430 \u0440\u0435\u0448\u0435\u043d\u0438\u044f SOLIDWORKS \u0434\u043b\u044f \u0438\u043d\u0436\u0435\u043d\u0435\u0440\u043d\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0430<\/a><\/h4><\/div><\/article><\/section><div class=\"fusion-infinite-scroll-trigger\"><\/div><div class=\"pagination infinite-scroll clearfix\" style=\"display:none;\"><span class=\"current\">1<\/span><a href=\"https:\/\/softico.ua\/ru\/wp-json\/wp\/v2\/pages\/6639\/page\/2\/\" class=\"inactive\">2<\/a><a class=\"pagination-next\" rel=\"next\" href=\"https:\/\/softico.ua\/ru\/wp-json\/wp\/v2\/pages\/6639\/page\/2\/\"><span class=\"page-text\"> <\/span><span class=\"page-next\"><\/span><\/a><\/div><div class=\"fusion-clearfix\"><\/div><button class=\"fusion-load-more-button fusion-blog-button fusion-clearfix\">\u0411\u043e\u043b\u044c\u0448\u0435<\/button><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[],"tags":[],"class_list":["post-6639","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/softico.ua\/ru\/wp-json\/wp\/v2\/pages\/6639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/softico.ua\/ru\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/softico.ua\/ru\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/softico.ua\/ru\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/softico.ua\/ru\/wp-json\/wp\/v2\/comments?post=6639"}],"version-history":[{"count":0,"href":"https:\/\/softico.ua\/ru\/wp-json\/wp\/v2\/pages\/6639\/revisions"}],"wp:attachment":[{"href":"https:\/\/softico.ua\/ru\/wp-json\/wp\/v2\/media?parent=6639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/softico.ua\/ru\/wp-json\/wp\/v2\/categories?post=6639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/softico.ua\/ru\/wp-json\/wp\/v2\/tags?post=6639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}