{"id":5589,"date":"2023-12-07T14:46:28","date_gmt":"2023-12-07T13:46:28","guid":{"rendered":"https:\/\/bezpecnevofirme.eset.com\/sk\/?p=5589"},"modified":"2023-12-07T14:46:28","modified_gmt":"2023-12-07T13:46:28","slug":"novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\/","title":{"rendered":"Nov\u00fd ESET Threat Intelligence port\u00e1l pre inform\u00e1cie o hrozb\u00e1ch"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/12\/ESET-Threat-intelligence_SK_1200x628-1024x536.png\" alt=\"BVF ESET Threat Intelligence nahladovy obrazok\" class=\"wp-image-5591\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/12\/ESET-Threat-intelligence_SK_1200x628-1024x536.png 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/12\/ESET-Threat-intelligence_SK_1200x628-300x157.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/12\/ESET-Threat-intelligence_SK_1200x628-768x402.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/12\/ESET-Threat-intelligence_SK_1200x628-370x194.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/12\/ESET-Threat-intelligence_SK_1200x628-760x398.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/12\/ESET-Threat-intelligence_SK_1200x628.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Orient\u00e1cia v\u00a0dne\u0161nom zlo\u017eitom svete je komplexn\u00e1 \u00faloha, ktor\u00e1 si vy\u017eaduje presn\u00e9 a\u00a0v\u010dasn\u00e9 znalosti, ako aj kontextu\u00e1lne ch\u00e1panie geopolitick\u00e9ho prostredia. Obzvl\u00e1\u0161\u0165 d\u00f4le\u017eit\u00e9 je to v\u00a0pr\u00edpade digit\u00e1lnej bezpe\u010dnosti kritickej infra\u0161trukt\u00fary, konkr\u00e9tne podnikov p\u00f4sobiacich v\u00a0odvetviach energetiky, financi\u00ed, verejn\u00fdch slu\u017eieb \u010di petrochemick\u00e9ho priemyslu a\u00a0dokonca aj samotn\u00fdch vl\u00e1dnych in\u0161tit\u00faci\u00ed.<\/p>\n\n\n\n<p>ESET ka\u017ed\u00fd de\u0148 odhal\u00ed viac ako 300\u00a0000 potenci\u00e1lnych hrozieb a\u00a0poskytuje z\u00e1kazn\u00edkom jedine\u010dn\u00e9 poznatky vo forme <strong><a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/bezpecnostne-sluzby\/threat-intelligence\/\">ESET Threat Intelligence<\/a><\/strong>, ktor\u00e9 z\u00edskava v\u010faka podpore viac ako 110\u00a0mili\u00f3nov pou\u017e\u00edvate\u013eov po\u00a0celom svete. Zabezpe\u010duje tak glob\u00e1lne porozumenie hrozb\u00e1m, ktor\u00e9 je z\u00e1kladom toho, aby mohla ka\u017ed\u00e1 organiz\u00e1cia predv\u00edda\u0165 potenci\u00e1lne hrozby, \u010deli\u0165 im a\u00a0vn\u00edma\u0165 ich so\u00a0zrete\u013eom na\u00a0s\u00favislosti.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Intuit\u00edvnej\u0161ie rozhranie pre lep\u0161\u00ed pou\u017e\u00edvate\u013esk\u00fd z\u00e1\u017eitok<\/h2>\n\n\n\n<p>S\u00a0cie\u013eom poskytn\u00fa\u0165 e\u0161te komplexnej\u0161\u00ed pr\u00edstup k\u00a0v\u0161etk\u00fdm poznatkom, ktor\u00e9 poskytuje ESET Threat Intelligence, spolo\u010dnos\u0165 ESET sp\u00fa\u0161\u0165a nov\u00fd port\u00e1l, ktor\u00fd umo\u017e\u0148uje plne automatizovan\u00e9 vyu\u017e\u00edvanie platformy. Z\u00e1kazn\u00edci maj\u00fa od\u00a0za\u010diatku pr\u00edstup k\u00a0zmluvn\u00fdm podmienkam vr\u00e1tane dohody o\u00a0ml\u010danlivosti, k\u00a0spr\u00e1ve licenci\u00ed alebo aktivite pou\u017e\u00edvate\u013eov. Port\u00e1l pon\u00faka aj intuit\u00edvny preh\u013ead reportov o\u00a0APT spolo\u010dnosti ESET a\u00a0<strong><a href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/category\/expertne-publikacie\/eset-threat-report\/\">spr\u00e1v o\u00a0bezpe\u010dnostn\u00fdch hrozb\u00e1ch<\/a><\/strong>, \u010dl\u00e1nky a\u00a0podcasty o\u00a0najnov\u0161\u00edch v\u00fdskumoch a\u00a0relevantn\u00e9 infografiky. Pou\u017e\u00edvatelia s\u00a0predplatn\u00fdm si m\u00f4\u017eu na\u00a0po\u017eiadanie prezera\u0165 s\u00fakromn\u00e9 reporty zostaven\u00e9 v\u00fdskumn\u00fdmi t\u00edmami spolo\u010dnosti ESET. M\u00f4\u017eu si tie\u017e nastavi\u0165 periodicitu ozn\u00e1men\u00ed o\u00a0nov\u00fdch reportoch a\u00a0vybra\u0165 si, o\u00a0ktor\u00fdch reportoch chc\u00fa by\u0165 informovan\u00ed.<\/p>\n\n\n\n<p>Port\u00e1l takisto zdru\u017euje \u0161es\u0165 d\u00e1tov\u00fdch informa\u010dn\u00fdch kan\u00e1lov spolo\u010dnosti ESET o&nbsp;hrozb\u00e1ch, \u010do z\u00e1kazn\u00edkom umo\u017e\u0148uje vybra\u0165 si v&nbsp;r\u00e1mci jednej jedine\u010dnej licencie tie, ktor\u00e9 najlep\u0161ie vyhovuj\u00fa ich potreb\u00e1m. Akon\u00e1hle je dohoda akt\u00edvna, d\u00e1tov\u00e9 informa\u010dn\u00e9 kan\u00e1ly sa automaticky nakonfiguruj\u00fa jednoduch\u00fdm povolen\u00edm priamo z&nbsp;port\u00e1lu.<\/p>\n\n\n\n<p>Nov\u00fd port\u00e1l poskytuje aj <strong><a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/partnerstvo\/integracia\/\">rozhrania API pripraven\u00e9 pre\u00a0ESET Connect<\/a><\/strong>. So\u00a0v\u0161etk\u00fdmi funkciami sa mo\u017eno \u013eahko obozn\u00e1mi\u0165 v\u00a0novej sekcii Online pomocn\u00edk, kde s\u00fa podrobne pop\u00edsan\u00e9 jednotliv\u00e9 rozhrania API a\u00a0sp\u00f4sob ich integr\u00e1cie.<\/p>\n\n\n\n<p>Analytici SOC vyu\u017e\u00edvaj\u00faci ESET Threat Intelligence bud\u00fa m\u00f4c\u0165 vyu\u017e\u00edva\u0165 aj ESET MISP ako hlavn\u00fa integra\u010dn\u00fa platformu pre\u00a0reporty o\u00a0APT, ktor\u00e1 im umo\u017en\u00ed prezera\u0165 si zoznam udalost\u00ed, sp\u00fa\u0161\u0165a\u0165 retrospekt\u00edvne anal\u00fdzy a\u00a0dopyty, filtrova\u0165 v\u00fdsledky pod\u013ea \u0161t\u00edtkov, vyh\u013ead\u00e1va\u0165 v\u00fdskyty a\u00a0sk\u00fama\u0165 s\u00favislosti pomocou korela\u010dnej grafiky.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Glob\u00e1lne inform\u00e1cie o hrozb\u00e1ch v re\u00e1lnom \u010dase<\/h2>\n\n\n\n<p>ESET Threat Intelligence vyu\u017e\u00edva znalosti a&nbsp;sk\u00fasenosti v\u00fdskumn\u00edkov spolo\u010dnosti ESET, ktor\u00ed p\u00f4sobia v&nbsp;na\u0161ich trin\u00e1stich v\u00fdskumn\u00fdch centr\u00e1ch po&nbsp;celom svete. S\u00fa rozdelen\u00e9 do&nbsp;\u0161iestich r\u00f4znych a&nbsp;d\u00f4kladne prepracovan\u00fdch informa\u010dn\u00fdch kan\u00e1lov s&nbsp;jedine\u010dnou telemetriou, ku&nbsp;ktor\u00fdm je mo\u017en\u00e9 pristupova\u0165 v&nbsp;z\u00e1vislosti od&nbsp;\u0161pecifick\u00fdch potrieb a&nbsp;ve\u013ekosti organiz\u00e1cie.<\/p>\n\n\n\n<p>Jednoducho povedan\u00e9, informa\u010dn\u00e9 kan\u00e1ly s\u00fa zoznamy indik\u00e1torov naru\u0161enia bezpe\u010dnosti (IoC) a&nbsp;metad\u00e1t, ktor\u00e9 pokr\u00fdvaj\u00fa r\u00f4zne aspekty kybernetick\u00e9ho zabezpe\u010denia vr\u00e1tane sledovania \u0161kodliv\u00fdch s\u00faborov, botnetov a&nbsp;APT, identifik\u00e1cie potenci\u00e1lne \u0161kodliv\u00fdch dom\u00e9n alebo URL a&nbsp;IP&nbsp;adries pova\u017eovan\u00fdch za&nbsp;\u0161kodliv\u00e9 a&nbsp;sledovania s\u00favisiacich d\u00e1t.<\/p>\n\n\n\n<p>Na\u00a0zaistenie kompatibility a\u00a0jednoduchej integr\u00e1cie s\u00fa informa\u010dn\u00e9 kan\u00e1ly poskytovan\u00e9 v\u00a0be\u017ene pou\u017e\u00edvan\u00fdch form\u00e1toch, ako s\u00fa JSON a\u00a0STIX\u00a02.1. Ned\u00e1vno spolo\u010dnos\u0165 ESET ozn\u00e1mila aj integr\u00e1ciu svojich vlastn\u00fdch d\u00e1tov\u00fdch informa\u010dn\u00fdch kan\u00e1lov s\u00a0be\u017ene pou\u017e\u00edvanou platformou n\u00e1strojov SIEM a\u00a0SOAR Microsoft\u00a0Sentinel, pri\u010dom vyu\u017e\u00edva v\u00fdhody jej zabudovan\u00e9ho klienta TAXII. \u010eal\u0161ie u\u017e existuj\u00face integr\u00e1cie s\u00fa IBM QRadar, OpenCTI, Anomali a\u00a0ThreatQuotient.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Budovanie dlhodobej strat\u00e9gie<\/h2>\n\n\n\n<p>Kybernetick\u00e9 hrozby sa r\u00fdchlo vyv\u00edjaj\u00fa, aby si udr\u017eali n\u00e1skok pred nov\u00fdmi technol\u00f3giami. ESET Threat Intelligence je vyvrcholen\u00edm pr\u00e1ce spolo\u010dnosti ESET. Sp\u00e1ja v&nbsp;sebe jedine\u010dn\u00fd preh\u013ead a&nbsp;v\u00fdskum spolo\u010dnosti ESET nielen s&nbsp;cie\u013eom poskytn\u00fa\u0165 d\u00f4kladn\u00fa technick\u00fa anal\u00fdzu, ale aj \u0161ir\u0161ie poznatky prostredn\u00edctvom s\u00fakromn\u00fdch reportov o&nbsp;APT, ktor\u00e9 pon\u00fakaj\u00fa rozsiahly taktick\u00fd a&nbsp;strategick\u00fd kontext na&nbsp;zodpovedanie niektor\u00fdch z&nbsp;naj\u010dastej\u0161\u00edch ot\u00e1zok: pre\u010do sa to deje a&nbsp;kto za&nbsp;t\u00fdm stoj\u00ed?<\/p>\n\n\n\n<p>Okrem toho maj\u00fa z\u00e1kazn\u00edci vyu\u017e\u00edvaj\u00faci slu\u017ebu ESET Threat Intelligence mo\u017enos\u0165 priamo kontaktova\u0165 aj v\u00fdskumn\u00edkov spolo\u010dnosti ESET, ktor\u00ed s\u00fa pripraven\u00ed odpoveda\u0165 im na\u00a0v\u0161etky ot\u00e1zky vypl\u00fdvaj\u00face z\u00a0t\u00fdchto reportov vr\u00e1tane s\u00favisiacich technick\u00fdch ot\u00e1zok pre\u00a0lep\u0161ie pochopenie prostredia hrozieb.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p>\n\n\n\n<p>Viac inform\u00e1ci\u00ed o\u00a0rie\u0161en\u00ed ESET Threat Intelligence n\u00e1jdete na jeho\u00a0<a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/bezpecnostne-sluzby\/threat-intelligence\/\"><strong>produktovej str\u00e1nke<\/strong><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>S\u00a0cie\u013eom poskytn\u00fa\u0165 e\u0161te komplexnej\u0161\u00ed pr\u00edstup k\u00a0v\u0161etk\u00fdm poznatkom ESET Threat Intelligence,  ESET sp\u00fa\u0161\u0165a nov\u00fd port\u00e1l, ktor\u00fd umo\u017e\u0148uje plne automatizovan\u00e9 vyu\u017e\u00edvanie platformy.<\/p>\n","protected":false},"author":8,"featured_media":5590,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[143],"tags":[],"class_list":["post-5589","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eset-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Inform\u00e1cie z ESET Threat Intelligence e\u0161te preh\u013eadnej\u0161ie | ESET<\/title>\n<meta name=\"description\" content=\"S\u00a0cie\u013eom e\u0161te komplexnej\u0161ieho pr\u00edstupu k\u00a0ESET Threat Intelligence, sp\u00fa\u0161\u0165ame nov\u00fd port\u00e1l umo\u017e\u0148uj\u00faci automatizovan\u00e9 vyu\u017e\u00edvanie platformy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inform\u00e1cie z ESET Threat Intelligence e\u0161te preh\u013eadnej\u0161ie | ESET\" \/>\n<meta property=\"og:description\" content=\"S\u00a0cie\u013eom e\u0161te komplexnej\u0161ieho pr\u00edstupu k\u00a0ESET Threat Intelligence, sp\u00fa\u0161\u0165ame nov\u00fd port\u00e1l umo\u017e\u0148uj\u00faci automatizovan\u00e9 vyu\u017e\u00edvanie platformy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-07T13:46:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/12\/ESET-Threat-intelligence_16_9.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"608\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"igorkmit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"igorkmit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 min\u00faty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\\\/\"},\"author\":{\"name\":\"igorkmit\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\"},\"headline\":\"Nov\u00fd ESET Threat Intelligence port\u00e1l pre inform\u00e1cie o hrozb\u00e1ch\",\"datePublished\":\"2023-12-07T13:46:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\\\/\"},\"wordCount\":913,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/12\\\/ESET-Threat-intelligence_16_9.png\",\"articleSection\":[\"ESET Blog\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\\\/\",\"name\":\"Inform\u00e1cie z ESET Threat Intelligence e\u0161te preh\u013eadnej\u0161ie | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/12\\\/ESET-Threat-intelligence_16_9.png\",\"datePublished\":\"2023-12-07T13:46:28+00:00\",\"description\":\"S\u00a0cie\u013eom e\u0161te komplexnej\u0161ieho pr\u00edstupu k\u00a0ESET Threat Intelligence, sp\u00fa\u0161\u0165ame nov\u00fd port\u00e1l umo\u017e\u0148uj\u00faci automatizovan\u00e9 vyu\u017e\u00edvanie platformy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/12\\\/ESET-Threat-intelligence_16_9.png\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/12\\\/ESET-Threat-intelligence_16_9.png\",\"width\":1080,\"height\":608,\"caption\":\"BVF ESET Threat Intelligence ilustracny obrazok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nov\u00fd ESET Threat Intelligence port\u00e1l pre inform\u00e1cie o hrozb\u00e1ch\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\",\"name\":\"igorkmit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"caption\":\"igorkmit\"},\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/author\\\/igorkmit\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Inform\u00e1cie z ESET Threat Intelligence e\u0161te preh\u013eadnej\u0161ie | ESET","description":"S\u00a0cie\u013eom e\u0161te komplexnej\u0161ieho pr\u00edstupu k\u00a0ESET Threat Intelligence, sp\u00fa\u0161\u0165ame nov\u00fd port\u00e1l umo\u017e\u0148uj\u00faci automatizovan\u00e9 vyu\u017e\u00edvanie platformy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\/","og_locale":"sk_SK","og_type":"article","og_title":"Inform\u00e1cie z ESET Threat Intelligence e\u0161te preh\u013eadnej\u0161ie | ESET","og_description":"S\u00a0cie\u013eom e\u0161te komplexnej\u0161ieho pr\u00edstupu k\u00a0ESET Threat Intelligence, sp\u00fa\u0161\u0165ame nov\u00fd port\u00e1l umo\u017e\u0148uj\u00faci automatizovan\u00e9 vyu\u017e\u00edvanie platformy.","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2023-12-07T13:46:28+00:00","og_image":[{"width":1080,"height":608,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/12\/ESET-Threat-intelligence_16_9.png","type":"image\/png"}],"author":"igorkmit","twitter_card":"summary_large_image","twitter_misc":{"Autor":"igorkmit","Predpokladan\u00fd \u010das \u010d\u00edtania":"4 min\u00faty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\/"},"author":{"name":"igorkmit","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3"},"headline":"Nov\u00fd ESET Threat Intelligence port\u00e1l pre inform\u00e1cie o hrozb\u00e1ch","datePublished":"2023-12-07T13:46:28+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\/"},"wordCount":913,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/12\/ESET-Threat-intelligence_16_9.png","articleSection":["ESET Blog"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\/","name":"Inform\u00e1cie z ESET Threat Intelligence e\u0161te preh\u013eadnej\u0161ie | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/12\/ESET-Threat-intelligence_16_9.png","datePublished":"2023-12-07T13:46:28+00:00","description":"S\u00a0cie\u013eom e\u0161te komplexnej\u0161ieho pr\u00edstupu k\u00a0ESET Threat Intelligence, sp\u00fa\u0161\u0165ame nov\u00fd port\u00e1l umo\u017e\u0148uj\u00faci automatizovan\u00e9 vyu\u017e\u00edvanie platformy.","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/12\/ESET-Threat-intelligence_16_9.png","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2023\/12\/ESET-Threat-intelligence_16_9.png","width":1080,"height":608,"caption":"BVF ESET Threat Intelligence ilustracny obrazok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/novy-eset-threat-intelligence-portal-pre-informacie-o-hrozbach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Nov\u00fd ESET Threat Intelligence port\u00e1l pre inform\u00e1cie o hrozb\u00e1ch"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3","name":"igorkmit","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","caption":"igorkmit"},"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/5589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=5589"}],"version-history":[{"count":1,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/5589\/revisions"}],"predecessor-version":[{"id":5592,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/5589\/revisions\/5592"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/5590"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=5589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=5589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=5589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}