{"id":5665,"date":"2024-04-11T10:53:08","date_gmt":"2024-04-11T08:53:08","guid":{"rendered":"https:\/\/bezpecnevofirme.eset.com\/sk\/?p=5665"},"modified":"2024-04-11T10:53:09","modified_gmt":"2024-04-11T08:53:09","slug":"vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\/","title":{"rendered":"Vyu\u017e\u00edvanie AI pri odha\u013eovan\u00ed hrozieb v produktoch ESET"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/04\/ai-tdir-2_1200x628-no-text-1024x536.png\" alt=\"BVF ESET AI nahladovy obrazok\" class=\"wp-image-5666\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/04\/ai-tdir-2_1200x628-no-text-1024x536.png 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/04\/ai-tdir-2_1200x628-no-text-300x157.png 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/04\/ai-tdir-2_1200x628-no-text-768x402.png 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/04\/ai-tdir-2_1200x628-no-text-370x194.png 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/04\/ai-tdir-2_1200x628-no-text-760x398.png 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/04\/ai-tdir-2_1200x628-no-text.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Umel\u00e1 inteligencia sa stala nenahradite\u013enou s\u00fa\u010das\u0165ou neust\u00e1le sa vyv\u00edjaj\u00faceho prostredia kybernetickej bezpe\u010dnosti, a\u00a0to najm\u00e4 v\u00a0oblasti detekcie hrozieb, ich vy\u0161etrovania a\u00a0reakcie na\u00a0ne (TDIR). V\u00a0spolo\u010dnosti ESET vyu\u017e\u00edvame silu umelej inteligencie u\u017e viac ako tri desa\u0165ro\u010dia, v\u010faka \u010domu poskytujeme re\u00e1lne rie\u0161enia, ktor\u00e9 dok\u00e1\u017eu \u010deli\u0165 dynamick\u00fdm v\u00fdzvam v\u00a0oblasti kybernetickej bezpe\u010dnosti.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u010co je TDIR? <\/h2>\n\n\n\n<p>TDIR (detekcia hrozieb, ich vy\u0161etrovanie a\u00a0reakcia na\u00a0ne) je strat\u00e9gia zalo\u017een\u00e1 na\u00a0rizik\u00e1ch, ktor\u00e1 m\u00e1 za\u00a0cie\u013e \u00fa\u010dinne zmierni\u0165 kybernetick\u00e9 hrozby a\u00a0zlep\u0161i\u0165 ich detekciu. Od z\u00e1kladn\u00fdch schopnost\u00ed TDIR z\u00e1vis\u00ed, ako dok\u00e1\u017eu n\u00e1stroje pou\u017e\u00edvan\u00e9 v\u00a0r\u00e1mci bezpe\u010dnostn\u00e9ho opera\u010dn\u00e9ho centra (SOC) prispieva\u0165 k\u00a0celkov\u00e9mu poslaniu a\u00a0strat\u00e9gii SOC. Schopnosti TDIR umo\u017e\u0148uj\u00fa pracovn\u00edkom SOC \u0161ikovne navrhova\u0165, konfigurova\u0165 a\u00a0spravova\u0165 r\u00f4zne scen\u00e1re detekcie. Najv\u00fdznamnej\u0161ie pr\u00edpady vyu\u017eitia umelej inteligencie v\u00a0procese TDIR zd\u00f4raz\u0148uj\u00fa pretrv\u00e1vaj\u00facu po\u017eiadavku na\u00a0zapojenie \u010dloveka, \u010do posil\u0148uje symbiotick\u00fd vz\u0165ah medzi pokro\u010dilou technol\u00f3giou a\u00a0\u013eudsk\u00fdmi odborn\u00fdmi znalos\u0165ami.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">AI a TDIR<\/h2>\n\n\n\n<p>Spolo\u010dnos\u0165 Gartner\u00ae n\u00e1s oslovila v\u00a0r\u00e1mci pr\u00edpravy svojej najnov\u0161ej spr\u00e1vy za\u00a0rok 2023 s\u00a0n\u00e1zvom \u201eEmerging Tech: Top Use Cases for AI in Threat Detection, Investigation and Response\u201c (Nov\u00e9 technol\u00f3gie: najlep\u0161ie pr\u00edpady vyu\u017eitia umelej inteligencie pri\u00a0odha\u013eovan\u00ed hrozieb, ich vy\u0161etrovan\u00ed a\u00a0reakcii na\u00a0ne). Spr\u00e1va spolo\u010dnosti Gartner poskytuje cenn\u00e9 inform\u00e1cie o\u00a0pokroku pri\u00a0zlep\u0161ovan\u00ed slu\u017eieb a\u00a0produktov z\u00a0oblasti TDIR prostredn\u00edctvom integr\u00e1cie umelej inteligencie.<\/p>\n\n\n\n<p>Jedn\u00fdm z&nbsp;hlavn\u00fdch z\u00e1verov spr\u00e1vy spolo\u010dnosti Gartner je, \u017ee poskytovatelia bezpe\u010dnostn\u00fdch slu\u017eieb sa \u010doraz viac spoliehaj\u00fa na&nbsp;strojov\u00e9 u\u010denie s&nbsp;u\u010dite\u013eom: <em>\u201eDod\u00e1vatelia bezpe\u010dnostn\u00fdch rie\u0161en\u00ed u\u017e roky integruj\u00fa umel\u00fa inteligenciu do&nbsp;svojich produktov a&nbsp;procesov detekcie hrozieb, aby dok\u00e1zali identifikova\u0165 anom\u00e1lie a&nbsp;vzorce, ktor\u00fdch odhalenie presahuje \u013eudsk\u00e9 mo\u017enosti. V&nbsp;skuto\u010dnosti viac ako 50&nbsp;% op\u00fdtan\u00fdch poskytovate\u013eov bezpe\u010dnostn\u00fdch slu\u017eieb a&nbsp;technol\u00f3gi\u00ed tvrd\u00ed, \u017ee u\u017e pou\u017e\u00edvaj\u00fa umel\u00fa inteligenciu zalo\u017een\u00fa na&nbsp;strojovom u\u010den\u00ed s&nbsp;u\u010dite\u013eom v&nbsp;kombin\u00e1cii s&nbsp;tr\u00e9ningom pod doh\u013eadom na&nbsp;zlep\u0161enie svojich schopnost\u00ed detekcie hrozieb.<\/em>\u201c [Zdroj: Gartner, Emerging Tech: Top Use Cases for AI in Threat Detection, Investigation and Response (Nov\u00e9 technol\u00f3gie: najlep\u0161ie pr\u00edpady vyu\u017eitia umelej inteligencie pri&nbsp;odha\u013eovan\u00ed hrozieb, ich vy\u0161etrovan\u00ed a&nbsp;reakcii na&nbsp;ne). Travis Lee, Matt Milone, Elizabeth Kim, John Collins. 27.&nbsp;okt\u00f3ber&nbsp;2023. ID: G00790125. GARTNER je registrovan\u00e1 ochrann\u00e1 a&nbsp;servisn\u00e1 zn\u00e1mka spolo\u010dnosti Gartner, Inc., a\/alebo jej pridru\u017een\u00fdch spolo\u010dnost\u00ed v&nbsp;USA a&nbsp;in\u00fdch krajin\u00e1ch a&nbsp;na tejto str\u00e1nke sa pou\u017e\u00edva s&nbsp;jej s\u00fahlasom. V\u0161etky pr\u00e1va vyhraden\u00e9.]<\/p>\n\n\n\n<p>Spolo\u010dnos\u0165 ESET, ktorej hist\u00f3ria siaha a\u017e do&nbsp;roku 1990, je priekopn\u00edkom v&nbsp;integr\u00e1cii umelej inteligencie do&nbsp;svojich bezpe\u010dnostn\u00fdch rie\u0161en\u00ed. Ke\u010f\u017ee sme si uvedomovali, \u017ee kybernetick\u00e9 hrozby sa neust\u00e1le vyv\u00edjaj\u00fa, vyu\u017eili sme potenci\u00e1l umelej inteligencie u\u017e v&nbsp;samom po\u010diatku a&nbsp;zu\u017eitkovali sme jej schopnosti nielen na&nbsp;odha\u013eovanie, ale aj na&nbsp;blokovanie hrozieb v&nbsp;re\u00e1lnom \u010dase.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.eset.com\/sk\/o-nas\/technologie\/\">ESET LiveSense<\/a>, n\u00e1\u0161 univerz\u00e1lny s\u00fabor na\u0161ich vlastn\u00fdch viacvrstvov\u00fdch technol\u00f3gi\u00ed, prekon\u00e1va mo\u017enosti \u0161tandardn\u00fdch rie\u0161en\u00ed. Na&nbsp;boj proti nov\u00fdm hrozb\u00e1m pou\u017e\u00edvame strojov\u00e9 u\u010denie a&nbsp;v\u010faka v\u010dasn\u00e9mu zavedeniu cloudovej technol\u00f3gie, ktor\u00e1 poh\u00e1\u0148a n\u00e1\u0161 glob\u00e1lny syst\u00e9m reput\u00e1cie a&nbsp;reakcie na&nbsp;hrozby <a href=\"https:\/\/www.eset.com\/sk\/o-nas\/technologie\/\">ESET LiveGrid<\/a>, m\u00e1me k&nbsp;dispoz\u00edcii v\u017edy aktu\u00e1lne inform\u00e1cie o&nbsp;hrozb\u00e1ch.<\/p>\n\n\n\n<p>V&nbsp;produktoch ESET vyu\u017e\u00edvame dve r\u00f4zne formy pokro\u010dil\u00e9ho strojov\u00e9ho u\u010denia \u2013 vysokov\u00fdkonn\u00e9 detek\u010dn\u00e9 jadro v&nbsp;cloude a&nbsp;od\u013eah\u010den\u00fa verziu nasaden\u00fa na&nbsp;koncov\u00fdch zariadeniach. Obe formy vyu\u017e\u00edvaj\u00fa starostlivo vybran\u00fd s\u00fabor klasifika\u010dn\u00fdch algoritmov vr\u00e1tane h\u013abkov\u00e9ho u\u010denia a&nbsp;vylep\u0161en\u00fdch rozhodovac\u00edch stromov, \u010d\u00edm sa zabezpe\u010duje r\u00fdchla a&nbsp;presn\u00e1 anal\u00fdza, ktor\u00e1 je k\u013e\u00fa\u010dov\u00e1 na&nbsp;zastavenie nov\u00fdch hrozieb.<\/p>\n\n\n\n<p>Okrem toho najnov\u0161ia verzia n\u00e1\u0161ho rie\u0161enia <a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/xdr-rozsirena-detekcia-a-reakcia\/\">ESET Inspect<\/a> zah\u0155\u0148a <a href=\"https:\/\/www.youtube.com\/watch?v=Mi3r3_wC340\">detek\u010dn\u00e9 korela\u010dn\u00e9 jadro poh\u00e1\u0148an\u00e9 umelou inteligenciou<\/a>. T\u00e1to inovat\u00edvna funkcia automaticky generuje incidenty, \u010d\u00edm umo\u017e\u0148uje bezpe\u010dnostn\u00fdm technikom v\u00fdrazne minimalizova\u0165 \u010das, ktor\u00fd venuj\u00fa vy\u0161etrovaniu a&nbsp;spr\u00e1ve incidentov.<\/p>\n\n\n\n<p>Na&nbsp;z\u00e1ver mo\u017eno poveda\u0165, \u017ee n\u00e1\u0161 priekopn\u00edcky pr\u00edstup k&nbsp;vyu\u017e\u00edvaniu umelej inteligencie v&nbsp;r\u00e1mci TDIR prispel k&nbsp;zmene sp\u00f4sobu nazerania na kybernetick\u00fa bezpe\u010dnos\u0165.&nbsp; Dod\u00e1vatelia bezpe\u010dnostn\u00fdch rie\u0161en\u00ed sa sna\u017eia odl\u00ed\u0161i\u0165 od&nbsp;konkurencie zlep\u0161ovan\u00edm v\u00fdsledkov detekcie a&nbsp;zni\u017eovan\u00edm miery falo\u0161n\u00fdch poplachov\/negat\u00edvnych v\u00fdsledkov, pri\u010dom uplat\u0148uj\u00fa pr\u00edstup \u201er\u00fdchlo a&nbsp;bezpe\u010dne\u201c.<\/p>\n\n\n\n<p>Vyu\u017e\u00edvan\u00edm modern\u00fdch techn\u00edk zalo\u017een\u00fdch na\u00a0umelej inteligencii si nielen\u017ee udr\u017eujeme n\u00e1skok pred nov\u00fdmi hrozbami, ale tie\u017e stanovujeme nov\u00e9 \u0161tandardy, pokia\u013e ide o\u00a0\u00fa\u010dinnos\u0165 a\u00a0presnos\u0165 pri odha\u013eovan\u00ed hrozieb a\u00a0reakcii na\u00a0ne. Ako priekopn\u00edci v\u00a0oblasti kybernetickej bezpe\u010dnosti v\u00e1m chceme neust\u00e1le poskytova\u0165 cenn\u00e9 poznatky, inovat\u00edvne rie\u0161enia a\u00a0strategick\u00e9 odpor\u00fa\u010dania, ktor\u00e9 v\u00e1s pripravia na\u00a0dynamick\u00e9 v\u00fdzvy digit\u00e1lneho veku.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Vyhl\u00e1senie o objekt\u00edvnosti<\/h4>\n\n\n\n<p><em>Spolo\u010dnos\u0165 Gartner nepodporuje ani nepropaguje \u017eiadneho v\u00fdrobcu, produkt alebo slu\u017ebu, ktor\u00fa uv\u00e1dza vo\u00a0svojich v\u00fdskumn\u00fdch publik\u00e1ci\u00e1ch, a\u00a0ani pou\u017e\u00edvate\u013eom technol\u00f3gi\u00ed neodpor\u00fa\u010da, aby si vyberali v\u00fdrobcov s\u00a0najvy\u0161\u0161\u00edm hodnoten\u00edm \u010di in\u00fdm ozna\u010den\u00edm. Tieto v\u00fdskumn\u00e9 publik\u00e1cie pozost\u00e1vaj\u00fa z\u00a0n\u00e1zorov v\u00fdskumnej organiz\u00e1cie Gartner a\u00a0nemali by by\u0165 interpretovan\u00e9 ako tvrdenia faktu. Spolo\u010dnos\u0165 Gartner neposkytuje v\u00a0s\u00favislosti s\u00a0t\u00fdmto v\u00fdskumom \u017eiadne z\u00e1ruky, explicitn\u00e9 ani implicitn\u00e9, vr\u00e1tane z\u00e1ruky obchodovate\u013enosti \u010di vhodnosti na\u00a0konkr\u00e9tny \u00fa\u010del.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Umel\u00e1 inteligencia sa stala nenahradite\u013enou s\u00fa\u010das\u0165ou neust\u00e1le sa vyv\u00edjaj\u00faceho prostredia kybernetickej bezpe\u010dnosti, a\u00a0to najm\u00e4 v\u00a0oblasti detekcie hrozieb, ich vy\u0161etrovania a\u00a0reakcie na\u00a0ne (TDIR). <\/p>\n","protected":false},"author":8,"featured_media":5667,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[143],"tags":[],"class_list":["post-5665","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eset-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vyu\u017e\u00edvanie AI v produktoch ESET pri odha\u013eovan\u00ed hrozieb | ESET<\/title>\n<meta name=\"description\" content=\"AI sa st\u00e1va nenahradite\u013enou s\u00fa\u010das\u0165ou kybernetickej bezpe\u010dnosti, najm\u00e4 v\u00a0oblasti detekcie hrozieb, ich vy\u0161etrovania a\u00a0reakcie na\u00a0ne (TDIR).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vyu\u017e\u00edvanie AI v produktoch ESET pri odha\u013eovan\u00ed hrozieb | ESET\" \/>\n<meta property=\"og:description\" content=\"AI sa st\u00e1va nenahradite\u013enou s\u00fa\u010das\u0165ou kybernetickej bezpe\u010dnosti, najm\u00e4 v\u00a0oblasti detekcie hrozieb, ich vy\u0161etrovania a\u00a0reakcie na\u00a0ne (TDIR).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-11T08:53:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-11T08:53:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/04\/ai-tdir-2_1200x628-no-text-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"igorkmit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"igorkmit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\\\/\"},\"author\":{\"name\":\"igorkmit\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\"},\"headline\":\"Vyu\u017e\u00edvanie AI pri odha\u013eovan\u00ed hrozieb v produktoch ESET\",\"datePublished\":\"2024-04-11T08:53:08+00:00\",\"dateModified\":\"2024-04-11T08:53:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\\\/\"},\"wordCount\":1089,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/04\\\/ai-tdir-2_1200x628-no-text-1.png\",\"articleSection\":[\"ESET Blog\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\\\/\",\"name\":\"Vyu\u017e\u00edvanie AI v produktoch ESET pri odha\u013eovan\u00ed hrozieb | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/04\\\/ai-tdir-2_1200x628-no-text-1.png\",\"datePublished\":\"2024-04-11T08:53:08+00:00\",\"dateModified\":\"2024-04-11T08:53:09+00:00\",\"description\":\"AI sa st\u00e1va nenahradite\u013enou s\u00fa\u010das\u0165ou kybernetickej bezpe\u010dnosti, najm\u00e4 v\u00a0oblasti detekcie hrozieb, ich vy\u0161etrovania a\u00a0reakcie na\u00a0ne (TDIR).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/04\\\/ai-tdir-2_1200x628-no-text-1.png\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/04\\\/ai-tdir-2_1200x628-no-text-1.png\",\"width\":1200,\"height\":628,\"caption\":\"BVF ESET AI ilustracny obrazok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vyu\u017e\u00edvanie AI pri odha\u013eovan\u00ed hrozieb v produktoch ESET\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\",\"name\":\"igorkmit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"caption\":\"igorkmit\"},\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/author\\\/igorkmit\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vyu\u017e\u00edvanie AI v produktoch ESET pri odha\u013eovan\u00ed hrozieb | ESET","description":"AI sa st\u00e1va nenahradite\u013enou s\u00fa\u010das\u0165ou kybernetickej bezpe\u010dnosti, najm\u00e4 v\u00a0oblasti detekcie hrozieb, ich vy\u0161etrovania a\u00a0reakcie na\u00a0ne (TDIR).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\/","og_locale":"sk_SK","og_type":"article","og_title":"Vyu\u017e\u00edvanie AI v produktoch ESET pri odha\u013eovan\u00ed hrozieb | ESET","og_description":"AI sa st\u00e1va nenahradite\u013enou s\u00fa\u010das\u0165ou kybernetickej bezpe\u010dnosti, najm\u00e4 v\u00a0oblasti detekcie hrozieb, ich vy\u0161etrovania a\u00a0reakcie na\u00a0ne (TDIR).","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2024-04-11T08:53:08+00:00","article_modified_time":"2024-04-11T08:53:09+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/04\/ai-tdir-2_1200x628-no-text-1.png","type":"image\/png"}],"author":"igorkmit","twitter_card":"summary_large_image","twitter_misc":{"Autor":"igorkmit","Predpokladan\u00fd \u010das \u010d\u00edtania":"5 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\/"},"author":{"name":"igorkmit","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3"},"headline":"Vyu\u017e\u00edvanie AI pri odha\u013eovan\u00ed hrozieb v produktoch ESET","datePublished":"2024-04-11T08:53:08+00:00","dateModified":"2024-04-11T08:53:09+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\/"},"wordCount":1089,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/04\/ai-tdir-2_1200x628-no-text-1.png","articleSection":["ESET Blog"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\/","name":"Vyu\u017e\u00edvanie AI v produktoch ESET pri odha\u013eovan\u00ed hrozieb | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/04\/ai-tdir-2_1200x628-no-text-1.png","datePublished":"2024-04-11T08:53:08+00:00","dateModified":"2024-04-11T08:53:09+00:00","description":"AI sa st\u00e1va nenahradite\u013enou s\u00fa\u010das\u0165ou kybernetickej bezpe\u010dnosti, najm\u00e4 v\u00a0oblasti detekcie hrozieb, ich vy\u0161etrovania a\u00a0reakcie na\u00a0ne (TDIR).","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/04\/ai-tdir-2_1200x628-no-text-1.png","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2024\/04\/ai-tdir-2_1200x628-no-text-1.png","width":1200,"height":628,"caption":"BVF ESET AI ilustracny obrazok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/vyuzivanie-ai-pri-odhalovani-hrozieb-v-produktoch-eset\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Vyu\u017e\u00edvanie AI pri odha\u013eovan\u00ed hrozieb v produktoch ESET"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3","name":"igorkmit","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","caption":"igorkmit"},"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/5665","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=5665"}],"version-history":[{"count":1,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/5665\/revisions"}],"predecessor-version":[{"id":5668,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/5665\/revisions\/5668"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/5667"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=5665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=5665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=5665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}