{"id":6520,"date":"2026-03-23T11:57:01","date_gmt":"2026-03-23T10:57:01","guid":{"rendered":"https:\/\/bezpecnevofirme.eset.com\/sk\/?p=6520"},"modified":"2026-03-23T13:24:16","modified_gmt":"2026-03-23T12:24:16","slug":"cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\/","title":{"rendered":"Virtu\u00e1lne po\u010d\u00edta\u010de v\u00a0h\u013ead\u00e1\u010diku \u00fato\u010dn\u00edkov: ako ich zabezpe\u010di\u0165"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/cloud_workload_protection_blog-1024x576.jpg\" alt=\"BVF cloud workload protection nahladovy obrazok\" class=\"wp-image-6521\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/cloud_workload_protection_blog-1024x576.jpg 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/cloud_workload_protection_blog-300x169.jpg 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/cloud_workload_protection_blog-768x432.jpg 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/cloud_workload_protection_blog-1536x864.jpg 1536w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/cloud_workload_protection_blog-370x208.jpg 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/cloud_workload_protection_blog-1170x658.jpg 1170w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/cloud_workload_protection_blog-972x546.jpg 972w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/cloud_workload_protection_blog-760x428.jpg 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/cloud_workload_protection_blog-270x152.jpg 270w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/cloud_workload_protection_blog.jpg 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em>S&nbsp;nariadeniami, ako je DORA, nadob\u00fada problematika extern\u00fdch riz\u00edk, medzi ktor\u00e9 patria aj cloudov\u00e9 po\u010d\u00edta\u010de, nov\u00fd rozmer.<\/em><\/p>\n\n\n\n<p>Predpisy, v&nbsp;ktor\u00fdch s\u00fa riadenie extern\u00fdch riz\u00edk a&nbsp;prev\u00e1dzkov\u00e1 odolnos\u0165 rozhoduj\u00face pre zachovanie bezpe\u010dnosti (a&nbsp;vyhnutie sa pokut\u00e1m), m\u00f4\u017eu by\u0165 pre bezpe\u010dnostn\u00e9 t\u00edmy poslednou kvapkou \u2013 najm\u00e4 ak IT&nbsp;mana\u017e\u00e9ri nie s\u00fa pripraven\u00ed naplno sa zaviaza\u0165 k&nbsp;dodr\u017eiavaniu potrebn\u00fdch opatren\u00ed.<\/p>\n\n\n\n<p>Treba doda\u0165, \u017ee pripraven\u00ed pravdepodobne neboli ani predt\u00fdm. Aj preto dnes legislat\u00edva, ako napr\u00edklad akt E\u00da o&nbsp;digit\u00e1lnej prev\u00e1dzkovej odolnosti (DORA), predstavuje pre mnoh\u00e9 organiz\u00e1cie zna\u010dn\u00fa z\u00e1\u0165a\u017e. Ke\u010f\u017ee nariadenie kladie ve\u013ek\u00fd d\u00f4raz na&nbsp;prev\u00e1dzkov\u00fa odolnos\u0165 vr\u00e1tane riadenia extern\u00fdch riz\u00edk (napr\u00edklad v&nbsp;pr\u00edpade poskytovate\u013eov cloudov\u00fdch slu\u017eieb), banky, pois\u0165ovne, investi\u010dn\u00e9 spolo\u010dnosti a&nbsp;\u010fal\u0161ie in\u0161tit\u00facie sa dnes ocitli v&nbsp;\u00fazkych a&nbsp;prirodzene si klad\u00fa ot\u00e1zku: Sme na to pripraven\u00ed?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">K\u013e\u00fa\u010dov\u00e9 body \u010dl\u00e1nku<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dosahovanie nov\u00fdch \u00farovn\u00ed produktivity v\u010faka cloudov\u00fdm rie\u0161eniam neznamen\u00e1, \u017ee s&nbsp;nimi nie s\u00fa spojen\u00e9 aj merate\u013en\u00e9 rizik\u00e1.<\/li>\n\n\n\n<li>Rie\u0161enia postaven\u00e9 na&nbsp;verejnom cloude, napr\u00edklad virtu\u00e1lne po\u010d\u00edta\u010de, nie s\u00fa nezranite\u013en\u00e9. Rovnak\u00e9 rizik\u00e1 predstavuj\u00fa aj s\u00favisiace vrstvy, ako s\u00fa cloudov\u00e9 slu\u017eby spr\u00e1vy ident\u00edt.<\/li>\n\n\n\n<li>Regula\u010dn\u00e9 org\u00e1ny si tieto aj&nbsp;\u010fal\u0161ie extern\u00e9 rizik\u00e1 uvedomuj\u00fa, preto proti nim tvrdo zasahuj\u00fa a&nbsp;vyd\u00e1vaj\u00fa nariadenia, ako je DORA, ktor\u00e9 stanovuj\u00fa z\u00e1kladn\u00fd \u0161tandard odolnosti a&nbsp;zodpovednosti pre finan\u010dn\u00e9 in\u0161tit\u00facie a&nbsp;niektor\u00fdch ich poskytovate\u013eov.<\/li>\n\n\n\n<li>Firmy sa tak ocitaj\u00fa medzi dvoma mlynsk\u00fdmi kame\u0148mi: na&nbsp;jednej strane \u010delia \u010doraz rafinovanej\u0161\u00edm \u00fato\u010dn\u00edkom, na&nbsp;druhej pr\u00edsnym regula\u010dn\u00fdm org\u00e1nom, ktor\u00e9 trestaj\u00fa ka\u017ed\u00e9 zlyhanie pri reakcii na&nbsp;incident. Najm\u00e4 stredne ve\u013ek\u00e9 firmy maj\u00fa \u010do strati\u0165.<\/li>\n\n\n\n<li>Rie\u0161enie? Zjednodu\u0161i\u0165, zefekt\u00edvni\u0165 a&nbsp;spr\u00edstupni\u0165 ochranu cloudov\u00fdch prostriedkov a&nbsp;slu\u017eieb roz\u0161\u00edren\u00edm z\u00e1kladn\u00e9ho zabezpe\u010denia so&nbsp;v\u0161etk\u00fdmi jeho v\u00fdhodami (optimalizovan\u00e9 zobrazenie, bezprobl\u00e9mov\u00e1 spr\u00e1va) aj do&nbsp;cloudov\u00e9ho prostredia.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/cloud-workload-protection\/\">ESET Cloud Workload Protection<\/a><\/strong> (ECWP) predstavuje prirodzen\u00e9 roz\u0161\u00edrenie zabezpe\u010denia koncov\u00fdch zariaden\u00ed, pri\u010dom chr\u00e1ni virtu\u00e1lne po\u010d\u00edta\u010de vo&nbsp;verejn\u00fdch cloudov\u00fdch prostrediach a integruje ich \u00fadaje do&nbsp;konzoly ESET PROTECT.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Obla\u010dno s&nbsp;mo\u017enos\u0165ou \u00faniku \u00fadajov<\/h2>\n\n\n\n<p>Akt o digit\u00e1lnej prev\u00e1dzkovej odolnosti DORA je&nbsp;skuto\u010dne jedine\u010dn\u00fd legislat\u00edvny r\u00e1mec, ktor\u00fd m\u00e1 nasmerova\u0165 finan\u010dn\u00e9 in\u0161tit\u00facie k&nbsp;lep\u0161iemu z\u00e1kladn\u00e9mu zabezpe\u010deniu. Z\u00e1rove\u0148 zd\u00f4raz\u0148uje aj zodpovednos\u0165 \u2013 v&nbsp;pr\u00edpade nedodr\u017eania predpisov toti\u017e nemus\u00ed nies\u0165 n\u00e1sledky len firma, ale aj jej vedenie.<\/p>\n\n\n\n<p>Znie to celkom dobre, v\u0161ak? No nie je to tak\u00e9 jednoduch\u00e9, ako sa zd\u00e1. Po\u017eiadavky s\u00fa pomerne pr\u00edsne, najm\u00e4 pokia\u013e ide o&nbsp;riadenie extern\u00fdch riz\u00edk. Nariadenie toti\u017e stanovuje, \u017ee inici\u00e1tor zmluvn\u00e9ho vz\u0165ahu nesie zodpovednos\u0165 za&nbsp;pos\u00fadenie a&nbsp;monitorovanie odolnosti svojich dod\u00e1vate\u013eov.<\/p>\n\n\n\n<p>In\u00fdmi slovami, ak prev\u00e1dzkujete virtu\u00e1lne po\u010d\u00edta\u010de vo&nbsp;verejnom cloudovom prostred\u00ed a&nbsp;va\u0161a slu\u017eba je zneu\u017eit\u00e1, zodpovednos\u0165 za&nbsp;pr\u00edpadn\u00e9 zverejnenie citliv\u00fdch \u00fadajov, ktor\u00e9 sa na&nbsp;t\u00fdchto kompromitovan\u00fdch virtu\u00e1lnych po\u010d\u00edta\u010doch nach\u00e1dzaj\u00fa, nesiete vy.<\/p>\n\n\n\n<p>Mo\u017eno si mysl\u00edte, \u017ee tak\u00fdto scen\u00e1r je m\u00e1lo pravdepodobn\u00fd. \u017dia\u013e, v&nbsp;minulosti sa vyskytli pr\u00edpady, ke\u010f ransomv\u00e9rov\u00ed \u00fato\u010dn\u00edci <a href=\"https:\/\/thehackernews.com\/2026\/01\/chinese-linked-hackers-exploit-vmware.html\">zneu\u017eili kritick\u00e9 zranite\u013enosti vo&nbsp;virtualiza\u010dn\u00fdch technol\u00f3gi\u00e1ch<\/a>. Napr\u00edklad ve\u013ek\u00fd bezpe\u010dnostn\u00fd incident z&nbsp;roku 2025, ktor\u00fd zasiahol syst\u00e9my SSO a&nbsp;LDAP slu\u017eby Oracle Cloud, viedol k&nbsp;<a href=\"https:\/\/therecord.media\/cisa-warns-of-potential-data-breaches-tied-to-oracle-issue\">\u00faniku 6&nbsp;mili\u00f3nov z\u00e1znamov<\/a> z&nbsp;viac ako 140&nbsp;000&nbsp;n\u00e1jomn\u00edkov. Hoci tento incident priamo nezasiahol virtu\u00e1lne po\u010d\u00edta\u010de, i\u0161lo o&nbsp;kompromit\u00e1ciu vrstvy identity, ktor\u00fa pou\u017e\u00edvali ich n\u00e1jomn\u00edci, \u010do vystavilo riziku aj \u010fal\u0161\u00edch z\u00e1kazn\u00edkov v re\u0165azci.<\/p>\n\n\n\n<p>A&nbsp;to m\u00f4\u017ee by\u0165 len \u0161pi\u010dka \u013eadovca.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Glob\u00e1lne vyu\u017e\u00edvanie cloudu prudko rastie<\/h2>\n\n\n\n<p>\u013dudia u\u017e nepracuj\u00fa len na&nbsp;koncov\u00fdch zariadeniach \u2013 a&nbsp;bezpe\u010dnos\u0165 mus\u00ed tento trend nasledova\u0165. Spolo\u010dnosti, najm\u00e4 v&nbsp;segmente stredne ve\u013ek\u00fdch firiem (predstavte si napr\u00edklad men\u0161iu investi\u010dn\u00fa banku, ktor\u00e1 poskytuje slu\u017eby stredne ve\u013ek\u00fdm firm\u00e1m), ako aj poskytovatelia spravovan\u00fdch slu\u017eieb (MSP) \u010doraz viac vyu\u017e\u00edvaj\u00fa cloudov\u00e9 slu\u017eby, napr\u00edklad virtu\u00e1lne po\u010d\u00edta\u010de, aby zv\u00fd\u0161ili svoju produktivitu. Pod\u013ea dostupn\u00fdch \u00fadajov vyu\u017e\u00edvalo v&nbsp;roku 2025 pribli\u017ene 69&nbsp;% podnikov nejak\u00fd druh verejnej cloudovej infra\u0161trukt\u00fary ako svoje prim\u00e1rne prostredie, pri\u010dom <a href=\"https:\/\/sqmagazine.co.uk\/cloud-adoption-statistics\">pribli\u017ene 63&nbsp;% celosvetov\u00e9ho trhu verejn\u00e9ho cloudu<\/a> tvorili platformy AWS (30&nbsp;%), Azure (20&nbsp;%) a&nbsp;GCP (13&nbsp;%).<\/p>\n\n\n\n<p>Tieto \u010d\u00edsla s\u00fa p\u00f4sobiv\u00e9 a&nbsp;mo\u017eno predpoklada\u0165, \u017ee bud\u00fa e\u0161te r\u00e1s\u0165. Rovnako v\u0161ak bud\u00fa prib\u00fada\u0165 aj pokusy o&nbsp;zneu\u017eitie cloudov\u00fdch prostred\u00ed. A\u017e <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/cloud-breaches-half-organizations\/\">44&nbsp;% organiz\u00e1ci\u00ed u\u017e za\u017eilo \u00fanik \u00fadajov z&nbsp;cloudu<\/a>, pri\u010dom priemern\u00e9 n\u00e1klady na&nbsp;jeden incident dosahuj\u00fa <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">neuverite\u013en\u00fdch 5,17&nbsp;mili\u00f3na dol\u00e1rov<\/a> \u2013 \u010do je najviac spomedzi v\u0161etk\u00fdch typov IT&nbsp;prostred\u00ed. Rovnak\u00fd zdroj uv\u00e1dza, \u017ee pribli\u017ene 32&nbsp;% bezpe\u010dnostn\u00fdch incidentov viedlo k&nbsp;finan\u010dn\u00fdm pokut\u00e1m.<\/p>\n\n\n\n<p>Pre\u010do s\u00fa tieto \u010d\u00edsla tak\u00e9 vysok\u00e9? Realita je tak\u00e1, \u017ee cloudov\u00e9 prostriedky a&nbsp;slu\u017eby (workloady) s\u00fa dynamick\u00e9, distribuovan\u00e9 a&nbsp;\u010dasto nevidite\u013en\u00e9 pre tradi\u010dn\u00e9 bezpe\u010dnostn\u00e9 n\u00e1stroje. \u00dato\u010dn\u00edci sa preto na&nbsp;ne \u010doraz viac zameriavaj\u00fa a&nbsp;robia to s&nbsp;rast\u00facou rafinovanos\u0165ou. Sta\u010d\u00ed jedna nespr\u00e1vne nakonfigurovan\u00e1 cloudov\u00e1 slu\u017eba, ktor\u00e1 spr\u00edstupn\u00ed citliv\u00e9 \u00fadaje z\u00e1kazn\u00edkov, a&nbsp;n\u00e1sledky m\u00f4\u017eu by\u0165 r\u00fdchle a&nbsp;ve\u013emi n\u00e1kladn\u00e9.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Ach, t\u00e1 DORA!<\/h3>\n\n\n\n<p>Zastavme sa na&nbsp;chv\u00ed\u013eu pri spom\u00ednan\u00fdch n\u00e1kladoch. Pam\u00e4t\u00e1te si, ako sme p\u00edsali, \u017ee riadenie extern\u00fdch riz\u00edk je jedn\u00fdm z&nbsp;k\u013e\u00fa\u010dov\u00fdch pilierov nariadenia DORA? Toto nariadenie sa vz\u0165ahuje na&nbsp;v\u0161etky finan\u010dn\u00e9 subjekty p\u00f4sobiace v&nbsp;E\u00da. Nedodr\u017eanie predpisov m\u00f4\u017ee vies\u0165 k&nbsp;pokute a\u017e do&nbsp;v\u00fd\u0161ky <a href=\"https:\/\/therecord.media\/jailing-management-boards-dora-europe\" target=\"_blank\" rel=\"noreferrer noopener\">2&nbsp;% celkov\u00e9ho ro\u010dn\u00e9ho glob\u00e1lneho obratu firmy alebo 10&nbsp;mili\u00f3nov&nbsp;eur<\/a> \u2013 pod\u013ea toho, ktor\u00e1 suma je vy\u0161\u0161ia. V&nbsp;pr\u00edpade jednotlivca (napr\u00edklad \u010dlena vedenia podniku) m\u00f4\u017ee sankcia dosiahnu\u0165 a\u017e <a href=\"https:\/\/www.cnbc.com\/2024\/08\/08\/what-is-the-eus-digital-operational-resilience-act-dora-explained.html\" target=\"_blank\" rel=\"noreferrer noopener\">1&nbsp;mili\u00f3n&nbsp;eur<\/a>.<\/p>\n\n\n\n<p>Na&nbsp;z\u00e1klade t\u00fdchto pravidiel mus\u00ed nariadenie dodr\u017eiava\u0165 aj banka zo&nbsp;Spojen\u00e9ho kr\u00e1\u013eovstva \u010di z&nbsp;USA, ktor\u00e1 m\u00e1 pobo\u010dku v&nbsp;niektorej krajine E\u00da. Bez v\u00fdnimiek.<\/p>\n\n\n\n<p>Na&nbsp;predpisy v\u0161ak musia myslie\u0165 aj extern\u00ed poskytovatelia IT&nbsp;slu\u017eieb \u2013 t\u00ed, ktor\u00fdch <a href=\"https:\/\/www.bankingsupervision.europa.eu\/about\/esfs\/html\/index.sk.html\" target=\"_blank\" rel=\"noreferrer noopener\">eur\u00f3pske org\u00e1ny doh\u013eadu<\/a> pova\u017euj\u00fa za&nbsp;kritick\u00fdch dod\u00e1vate\u013eov, m\u00f4\u017eu \u010deli\u0165 pokut\u00e1m a\u017e <a href=\"https:\/\/www.infosecurityeurope.com\/en-gb.html\" target=\"_blank\" rel=\"noreferrer noopener\">5&nbsp;mili\u00f3nov&nbsp;eur<\/a> (alebo do&nbsp;v\u00fd\u0161ky 1&nbsp;% ich ro\u010dn\u00e9ho glob\u00e1lneho obratu) alebo 500&nbsp;000&nbsp;eur v&nbsp;pr\u00edpade jednotlivca.<\/p>\n\n\n\n<p>Ak teda cloudov\u00e1 slu\u017eba va\u0161ej investi\u010dnej spolo\u010dnosti zlyh\u00e1, zodpovednos\u0165 nemus\u00ed nies\u0165 len samotn\u00e1 spolo\u010dnos\u0165.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Virtu\u00e1lne po\u010d\u00edta\u010de a hrozby<\/h2>\n\n\n\n<p>Ako teda rie\u0161i\u0165 probl\u00e9my s&nbsp;cloudom v&nbsp;kontexte nariadenia DORA? Ke\u010f\u017ee firmy \u010dasto spravuj\u00fa prostriedky a&nbsp;slu\u017eby s\u00fa\u010dasne v&nbsp;lok\u00e1lnom aj cloudovom prostred\u00ed (napr\u00edklad na&nbsp;platform\u00e1ch Amazon Web Services, Azure alebo Google Cloud Platform), \u013eahko pri tom vznikaj\u00fa bezpe\u010dnostn\u00e9 medzery. Navy\u0161e len pribli\u017ene 23&nbsp;% organiz\u00e1ci\u00ed <a href=\"https:\/\/cloudsecurityalliance.org\/press-releases\/2024\/02\/14\/cloud-security-alliance-survey-finds-77-of-respondents-feel-unprepared-to-deal-with-security-threats\">uv\u00e1dza, \u017ee m\u00e1 \u00fapln\u00fd preh\u013ead<\/a> o&nbsp;svojich cloudov\u00fdch prostrediach, \u010do je prinajmen\u0161om znepokojuj\u00face, najm\u00e4 ke\u010f predpisy vy\u017eaduj\u00fa transparentnos\u0165.<\/p>\n\n\n\n<p>Sta\u010d\u00ed jedin\u00fd kompromitovan\u00fd virtu\u00e1lny po\u010d\u00edta\u010d \u2013 \u010di u\u017e v&nbsp;d\u00f4sledku ukradnut\u00fdch prihlasovac\u00edch \u00fadajov, nespr\u00e1vnej konfigur\u00e1cie alebo neaktualizovan\u00fdch slu\u017eieb \u2013 a&nbsp;incident sa m\u00f4\u017ee r\u00fdchlo roz\u0161\u00edri\u0165 naprie\u010d cel\u00fdm prostred\u00edm. Za&nbsp;zmienku stoja tzv. escape \u00fatoky na&nbsp;virtu\u00e1lne po\u010d\u00edta\u010de, pri ktor\u00fdch \u00fato\u010dn\u00edci prin\u00fatia programy \u201eunikn\u00fa\u0165\u201c z&nbsp;virtu\u00e1lnych po\u010d\u00edta\u010dov a&nbsp;komunikova\u0165 s&nbsp;hostite\u013esk\u00fdm opera\u010dn\u00fdm syst\u00e9mom. Svedkami tak\u00fdchto situ\u00e1ci\u00ed sme boli <a href=\"https:\/\/thehackernews.com\/2026\/01\/chinese-linked-hackers-exploit-vmware.html\">ned\u00e1vno<\/a> pri niektor\u00fdch zero\u2011day zranite\u013enostiach v&nbsp;slu\u017ebe VMware ESXi.<\/p>\n\n\n\n<p>Je zrejm\u00e9, \u017ee je potrebn\u00e9 prehodnoti\u0165 pr\u00edstup k&nbsp;riadeniu riz\u00edk. Organiz\u00e1cie potrebuj\u00fa ochranu v&nbsp;re\u00e1lnom \u010dase, ktor\u00e1 dok\u00e1\u017ee podobn\u00e9 exploity blokova\u0165, automaticky izolova\u0165 problematick\u00e9 virtu\u00e1lne po\u010d\u00edta\u010de a&nbsp;z\u00e1rove\u0148 zdie\u013ea\u0165 telemetriu na&nbsp;r\u00fdchle zabr\u00e1nenie \u0161\u00edreniu hrozby. A&nbsp;to v\u0161etko bez nutnosti rozsiahlych invest\u00edci\u00ed do&nbsp;vlastn\u00fdch bezpe\u010dnostn\u00fdch rie\u0161en\u00ed.<\/p>\n\n\n\n<p>Preto je k\u013e\u00fa\u010dov\u00e9 \u0161k\u00e1lovanie. Jedna politika naprie\u010d cel\u00fdm prostred\u00edm, bez zvy\u0161ovania komplexnosti, ktor\u00e1 z\u00e1rove\u0148 prin\u00e1\u0161a preh\u013ead o&nbsp;\u010dasto nevidite\u013en\u00fdch cloudov\u00fdch prostriedkoch a&nbsp;slu\u017eb\u00e1ch. Presne o&nbsp;tom to je.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Priv\u00edtajte ESET Cloud Workload Protection<\/h2>\n\n\n\n<p>Spolo\u010dnosti s&nbsp;obmedzen\u00fdmi znalos\u0165ami v&nbsp;oblasti IT&nbsp;bezpe\u010dnosti, men\u0161\u00edmi bezpe\u010dnostn\u00fdmi t\u00edmami alebo tie, ktor\u00e9 uprednost\u0148uj\u00fa rie\u0161enia, ktor\u00e9 sta\u010d\u00ed len nastavi\u0165 a&nbsp;o&nbsp;viac sa nestara\u0165, sa nemusia ob\u00e1va\u0165, \u017ee nov\u00e9 n\u00e1stroje naru\u0161ia ich existuj\u00facu bezpe\u010dnostn\u00fa architekt\u00faru. Komplexn\u00e1 odolnos\u0165 toti\u017e <a href=\"https:\/\/www.eset.com\/blog\/en\/business-topics\/prevention-and-awareness\/cybersecurity-complexity\/\">nemus\u00ed by\u0165 komplikovan\u00e1<\/a>.<\/p>\n\n\n\n<p>Spolo\u010dnos\u0165 ESET je zn\u00e1ma t\u00fdm, \u017ee prin\u00e1\u0161a nen\u00e1ro\u010dn\u00e9 rie\u0161enia, ktor\u00e9 v\u010faka kombin\u00e1cii viacer\u00fdch bezpe\u010dnostn\u00fdch vrstiev funguj\u00fa ako celok a&nbsp;dok\u00e1\u017eu flexibilne reagova\u0165 na&nbsp;r\u00f4zne bezpe\u010dnostn\u00e9 hrozby \u2013 od&nbsp;z\u00e1kladn\u00fdch malv\u00e9rov\u00fdch infekci\u00ed a\u017e po&nbsp;pokro\u010dil\u00e9 ransomv\u00e9rov\u00e9 \u00fatoky. Tento pr\u00edstup stoj\u00ed na&nbsp;kombin\u00e1cii inteligentn\u00e9ho programovania, automatiz\u00e1cie a&nbsp;rozsiahlej pr\u00e1ce na&nbsp;pozad\u00ed, ktorej cie\u013eom je zisti\u0165, ako \u010do najlep\u0161ie chr\u00e1ni\u0165 z\u00e1kazn\u00edkov pred najnov\u0161\u00edmi hrozbami.<\/p>\n\n\n\n<p>Ke\u010f zoh\u013eadn\u00edme v\u0161etky uveden\u00e9 v\u00fdzvy \u2013 od&nbsp;nepr\u00edjemn\u00fdch cloudov\u00fdch hrozieb a\u017e po&nbsp;predpisy vy\u017eaduj\u00face d\u00f4sledn\u00e9 riadenie prev\u00e1dzkovej odolnosti \u2013, je jasn\u00e9, \u017ee spolieha\u0165 sa len na&nbsp;existuj\u00face pr\u00edstupy u\u017e nesta\u010d\u00ed.<\/p>\n\n\n\n<p>Preto ESET roz\u0161iruje ochranu za&nbsp;hranice koncov\u00fdch zariaden\u00ed prostredn\u00edctvom nov\u00e9ho modulu <strong><a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/cloud-workload-protection\/\">ESET Cloud Workload Protection<\/a><\/strong> (ECWP), ktor\u00fd chr\u00e1ni virtu\u00e1lne po\u010d\u00edta\u010de vo&nbsp;verejn\u00fdch cloudov\u00fdch prostrediach, integruje ich \u00fadaje do&nbsp;konzoly ESET PROTECT s&nbsp;mo\u017enos\u0165ami XDR, v\u00fdrazne obohacuje telemetriu na&nbsp;\u00fa\u010dely detekcie a&nbsp;reakcie na&nbsp;incidenty a&nbsp;z\u00e1rove\u0148 zjednocuje spr\u00e1vu zabezpe\u010denia naprie\u010d koncov\u00fdmi a&nbsp;cloudov\u00fdmi prostrediami v&nbsp;jednom preh\u013eadnom rozhran\u00ed.<\/p>\n\n\n\n<p>Hlavnou v\u00fdhodou je ochrana pred \u010fal\u0161\u00edm v\u00fdznamn\u00fdm vektorom \u00fatokov a&nbsp;z\u00e1rove\u0148 mo\u017enos\u0165 pravidelne overova\u0165 kontroln\u00e9 mechanizmy \u010di generova\u0165 d\u00f4kazy o&nbsp;audite v&nbsp;s\u00falade s&nbsp;regula\u010dn\u00fdmi r\u00e1mcami, ako s\u00fa NIST, CIS, HIPAA alebo PCI DSS \u2013 teda nielen v&nbsp;s\u00falade s&nbsp;nariaden\u00edm DORA.<\/p>\n\n\n\n<p><strong>Nie je to len \u010fal\u0161ia polo\u017eka na&nbsp;\u00fa\u010dtenke za&nbsp;zabezpe\u010denie<\/strong><\/p>\n\n\n\n<p>Na&nbsp;rozdiel od&nbsp;konkurencie, ktor\u00e1 zvy\u010dajne pon\u00faka ochranu cloudov\u00fdch prostriedkov a&nbsp;slu\u017eieb ako samostatn\u00fd produkt, ESET prin\u00e1\u0161a ochranu virtu\u00e1lnych po\u010d\u00edta\u010dov v&nbsp;r\u00e1mci be\u017en\u00fdch \u00farovn\u00ed predplatn\u00e9ho, po\u010dn\u00fac \u00farov\u0148ou <strong>ESET PROTECT Advanced<\/strong>, aby bola dostupn\u00e1 aj pre tie najmen\u0161ie firmy. Lep\u0161ia ochrana za&nbsp;rovnak\u00fa cenu.<\/p>\n\n\n\n<p>ECWP roz\u0161iruje portf\u00f3lio cloudov\u00fdch bezpe\u010dnostn\u00fdch rie\u0161en\u00ed ESET, ktor\u00e9 v&nbsp;s\u00fa\u010dasnosti zah\u0155\u0148a ochranu pracovn\u00fdch aplik\u00e1ci\u00ed (<a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia\/cloudova-ochrana\/\">ESET Cloud Office Security<\/a>), pri\u010dom pl\u00e1nujeme \u010doskoro prinies\u0165 aj \u010fal\u0161ie rie\u0161enia na&nbsp;ochranu cloudov\u00fdch prostred\u00ed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Jasn\u00e1 obloha<\/h2>\n\n\n\n<p>Cloud sa nezvratne stal jedn\u00fdm z&nbsp;faktorov, ktor\u00e9 zvy\u0161uj\u00fa mieru vystavenia hrozb\u00e1m. Jeho rizik\u00e1 sa \u010dasto podce\u0148uj\u00fa, no ned\u00e1vne udalosti nazna\u010duj\u00fa, \u017ee sa to \u010doskoro zmen\u00ed. Vedenie spolo\u010dnosti m\u00f4\u017ee nadobudn\u00fa\u0165 pocit, \u017ee ich z\u00e1kladn\u00e1 bezpe\u010dnos\u0165 je tak \u010di tak ohrozen\u00e1 a&nbsp;\u017ee prev\u00e1dzkov\u00e1 odolnos\u0165 je len il\u00faziou, ke\u010f sa na&nbsp;obzore neust\u00e1le objavuj\u00fa nov\u00e9 hrozby.<\/p>\n\n\n\n<p>Realita je v\u0161ak in\u00e1. Ak budete na&nbsp;nov\u00e9 hrozby reagova\u0165 d\u00f4sledn\u00fdm zav\u00e1dzan\u00edm prevent\u00edvnych opatren\u00ed a&nbsp;spoj\u00edte sily so&nbsp;sk\u00fasen\u00fdmi a&nbsp;osved\u010den\u00fdmi poskytovate\u013emi bezpe\u010dnostn\u00fdch rie\u0161en\u00ed, m\u00f4\u017ee to by\u0165 presne to, \u010do rozhodne o&nbsp;va\u0161ej odolnosti.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>S&nbsp;nariadeniami, ako je DORA, nadob\u00fada problematika extern\u00fdch riz\u00edk, medzi ktor\u00e9 patria aj cloudov\u00e9 po\u010d\u00edta\u010de, nov\u00fd rozmer. Predpisy, v&nbsp;ktor\u00fdch s\u00fa riadenie extern\u00fdch riz\u00edk a&nbsp;prev\u00e1dzkov\u00e1 odolnos\u0165 rozhoduj\u00face pre zachovanie bezpe\u010dnosti (a&nbsp;vyhnutie sa pokut\u00e1m), m\u00f4\u017eu by\u0165 pre bezpe\u010dnostn\u00e9 t\u00edmy poslednou kvapkou \u2013 najm\u00e4 ak IT&nbsp;mana\u017e\u00e9ri nie s\u00fa pripraven\u00ed naplno sa zaviaza\u0165 k&nbsp;dodr\u017eiavaniu potrebn\u00fdch opatren\u00ed. Treba doda\u0165, \u017ee pripraven\u00ed pravdepodobne neboli ani predt\u00fdm. Aj preto dnes&hellip;<\/p>\n","protected":false},"author":8,"featured_media":6522,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[143],"tags":[],"class_list":["post-6520","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eset-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Virtu\u00e1lne po\u010d\u00edta\u010de v\u00a0h\u013ead\u00e1\u010diku \u00fatokov: ako ich zabezpe\u010di\u0165 | ESET<\/title>\n<meta name=\"description\" content=\"S\u00a0nariadeniami, ako je DORA, nadob\u00fada problematika extern\u00fdch riz\u00edk, medzi ktor\u00e9 patria aj virtu\u00e1lne po\u010d\u00edta\u010de, nov\u00fd rozmer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Virtu\u00e1lne po\u010d\u00edta\u010de v\u00a0h\u013ead\u00e1\u010diku \u00fatokov: ako ich zabezpe\u010di\u0165 | ESET\" \/>\n<meta property=\"og:description\" content=\"S\u00a0nariadeniami, ako je DORA, nadob\u00fada problematika extern\u00fdch riz\u00edk, medzi ktor\u00e9 patria aj virtu\u00e1lne po\u010d\u00edta\u010de, nov\u00fd rozmer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-23T10:57:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-23T12:24:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/cloud_workload_protection_blog-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"igorkmit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"igorkmit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\\\/\"},\"author\":{\"name\":\"igorkmit\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\"},\"headline\":\"Virtu\u00e1lne po\u010d\u00edta\u010de v\u00a0h\u013ead\u00e1\u010diku \u00fato\u010dn\u00edkov: ako ich zabezpe\u010di\u0165\",\"datePublished\":\"2026-03-23T10:57:01+00:00\",\"dateModified\":\"2026-03-23T12:24:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\\\/\"},\"wordCount\":2211,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/03\\\/cloud_workload_protection_blog-1.jpg\",\"articleSection\":[\"ESET Blog\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\\\/\",\"name\":\"Virtu\u00e1lne po\u010d\u00edta\u010de v\u00a0h\u013ead\u00e1\u010diku \u00fatokov: ako ich zabezpe\u010di\u0165 | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/03\\\/cloud_workload_protection_blog-1.jpg\",\"datePublished\":\"2026-03-23T10:57:01+00:00\",\"dateModified\":\"2026-03-23T12:24:16+00:00\",\"description\":\"S\u00a0nariadeniami, ako je DORA, nadob\u00fada problematika extern\u00fdch riz\u00edk, medzi ktor\u00e9 patria aj virtu\u00e1lne po\u010d\u00edta\u010de, nov\u00fd rozmer.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/03\\\/cloud_workload_protection_blog-1.jpg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/03\\\/cloud_workload_protection_blog-1.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"BVF cloud workload protection ilustracny obrazok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Virtu\u00e1lne po\u010d\u00edta\u010de v\u00a0h\u013ead\u00e1\u010diku \u00fato\u010dn\u00edkov: ako ich zabezpe\u010di\u0165\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\",\"name\":\"igorkmit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"caption\":\"igorkmit\"},\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/author\\\/igorkmit\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Virtu\u00e1lne po\u010d\u00edta\u010de v\u00a0h\u013ead\u00e1\u010diku \u00fatokov: ako ich zabezpe\u010di\u0165 | ESET","description":"S\u00a0nariadeniami, ako je DORA, nadob\u00fada problematika extern\u00fdch riz\u00edk, medzi ktor\u00e9 patria aj virtu\u00e1lne po\u010d\u00edta\u010de, nov\u00fd rozmer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\/","og_locale":"sk_SK","og_type":"article","og_title":"Virtu\u00e1lne po\u010d\u00edta\u010de v\u00a0h\u013ead\u00e1\u010diku \u00fatokov: ako ich zabezpe\u010di\u0165 | ESET","og_description":"S\u00a0nariadeniami, ako je DORA, nadob\u00fada problematika extern\u00fdch riz\u00edk, medzi ktor\u00e9 patria aj virtu\u00e1lne po\u010d\u00edta\u010de, nov\u00fd rozmer.","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2026-03-23T10:57:01+00:00","article_modified_time":"2026-03-23T12:24:16+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/cloud_workload_protection_blog-1.jpg","type":"image\/jpeg"}],"author":"igorkmit","twitter_card":"summary_large_image","twitter_misc":{"Autor":"igorkmit","Predpokladan\u00fd \u010das \u010d\u00edtania":"9 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\/"},"author":{"name":"igorkmit","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3"},"headline":"Virtu\u00e1lne po\u010d\u00edta\u010de v\u00a0h\u013ead\u00e1\u010diku \u00fato\u010dn\u00edkov: ako ich zabezpe\u010di\u0165","datePublished":"2026-03-23T10:57:01+00:00","dateModified":"2026-03-23T12:24:16+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\/"},"wordCount":2211,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/cloud_workload_protection_blog-1.jpg","articleSection":["ESET Blog"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\/","name":"Virtu\u00e1lne po\u010d\u00edta\u010de v\u00a0h\u013ead\u00e1\u010diku \u00fatokov: ako ich zabezpe\u010di\u0165 | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/cloud_workload_protection_blog-1.jpg","datePublished":"2026-03-23T10:57:01+00:00","dateModified":"2026-03-23T12:24:16+00:00","description":"S\u00a0nariadeniami, ako je DORA, nadob\u00fada problematika extern\u00fdch riz\u00edk, medzi ktor\u00e9 patria aj virtu\u00e1lne po\u010d\u00edta\u010de, nov\u00fd rozmer.","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/cloud_workload_protection_blog-1.jpg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/03\/cloud_workload_protection_blog-1.jpg","width":1920,"height":1080,"caption":"BVF cloud workload protection ilustracny obrazok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/cloudove-pocitace-v-hladaciku-utocnikov-ako-ich-zabezpecit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Virtu\u00e1lne po\u010d\u00edta\u010de v\u00a0h\u013ead\u00e1\u010diku \u00fato\u010dn\u00edkov: ako ich zabezpe\u010di\u0165"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3","name":"igorkmit","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","caption":"igorkmit"},"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=6520"}],"version-history":[{"count":2,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6520\/revisions"}],"predecessor-version":[{"id":6527,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6520\/revisions\/6527"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/6522"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=6520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=6520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=6520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}