{"id":6615,"date":"2026-05-21T15:23:02","date_gmt":"2026-05-21T13:23:02","guid":{"rendered":"https:\/\/bezpecnevofirme.eset.com\/sk\/?p=6615"},"modified":"2026-05-21T15:28:29","modified_gmt":"2026-05-21T13:28:29","slug":"ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\/","title":{"rendered":"Ako sa vyrovna\u0165 s\u00a0n\u00e1strahami star\u0161\u00edch OT technol\u00f3gi\u00ed vo v\u00fdrobnom sektore"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset-private-ot-lifecycle-solutions-1024x576.jpg\" alt=\"BVF OT nahladovy obrazok\" class=\"wp-image-6616\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset-private-ot-lifecycle-solutions-1024x576.jpg 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset-private-ot-lifecycle-solutions-300x169.jpg 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset-private-ot-lifecycle-solutions-768x432.jpg 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset-private-ot-lifecycle-solutions-370x208.jpg 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset-private-ot-lifecycle-solutions-1170x658.jpg 1170w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset-private-ot-lifecycle-solutions-972x546.jpg 972w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset-private-ot-lifecycle-solutions-760x428.jpg 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset-private-ot-lifecycle-solutions-270x152.jpg 270w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset-private-ot-lifecycle-solutions.jpg 1244w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em>Viete, ako preklen\u00fa\u0165 priepas\u0165 medzi rizikami star\u0161\u00edch OT syst\u00e9mov a modern\u00fdmi bezpe\u010dnostn\u00fdmi po\u017eiadavkami?<\/em><\/p>\n\n\n\n<p>Je dobr\u00e9 ma\u0165 spo\u013eahliv\u00fa technol\u00f3giu, ktor\u00e1 funguje cel\u00e9 roky. Najm\u00e4 v prostrediach prev\u00e1dzkovej technol\u00f3gie (OT) s\u00fa zariadenia navrhnut\u00e9 tak, aby vydr\u017eali.<\/p>\n\n\n\n<p>To, \u010do bolo nain\u0161talovan\u00e9 pred 30 rokmi, v\u0161ak nemus\u00ed sta\u010di\u0165 na v\u00fdzvy s\u00fa\u010dasnosti. V roku 1996 bol internet e\u0161te v plienkach a umel\u00e1 inteligencia bola v\u00e4\u010d\u0161inou len sci-fi. Teraz, u\u017e viac ako desa\u0165ro\u010die, internet umo\u017e\u0148uje vy\u0161\u0161iu efekt\u00edvnos\u0165 t\u00fdm, \u017ee otv\u00e1ra kedysi dokonale izolovan\u00e9 prostredie OT. To plat\u00ed najm\u00e4 tam, kde star\u0161ie syst\u00e9my \u010delia finan\u010dn\u00fdm tlakom a kde sa za\u010d\u00edna formova\u0165 bud\u00facnos\u0165 sp\u00e1jaj\u00faca OT a IT.<\/p>\n\n\n\n<p>U\u017e nejde len o v\u00fdrobu; ide o lep\u0161iu vidite\u013enos\u0165, dia\u013ekov\u00fd pr\u00edstup a predov\u0161etk\u00fdm o d\u00e1ta. Ale kdeko\u013evek s\u00fa syst\u00e9my prepojen\u00e9, nasleduje ich vystavenie rizik\u00e1m. Jednoducho povedan\u00e9, zabezpe\u010denie prostredia si vy\u017eaduje zna\u010dn\u00e9 \u00fasilie, pri\u010dom sta\u010d\u00ed jedin\u00fd slab\u00fd \u010dl\u00e1nok, aby bolo ohrozen\u00e9.<\/p>\n\n\n\n<p>K\u013e\u00fa\u010dov\u00e9 body tohto \u010dl\u00e1nku:<\/p>\n\n\n\n<ul class=\"wp-block-list is-style-checkbox\">\n<li>Va\u0161a tov\u00e1re\u0148 s\u00edce funguje ako hodinky, ale zastaran\u00e9 opera\u010dn\u00e9 technol\u00f3gie (OT), ktor\u00e9 za \u0148ou stoja, v tichosti hromadia rizik\u00e1, ktor\u00e9 s\u00fa\u010dasn\u00e9 hrozby m\u00f4\u017eu \u013eahko zneu\u017ei\u0165.<\/li>\n\n\n\n<li>Syst\u00e9my, ktor\u00e9 kedysi boli izolovan\u00e9 a \u0161peci\u00e1lne navrhnut\u00e9 pre priemyseln\u00e9 \u00fa\u010dely, sa dnes v z\u00e1ujme efekt\u00edvnosti prep\u00e1jaj\u00fa \u2013 a t\u00fdm nevedomky otv\u00e1raj\u00fa dvere, ktor\u00fdmi m\u00f4\u017eu kyberzlo\u010dinci bez probl\u00e9mov prejs\u0165.<\/li>\n\n\n\n<li>Jednoduch\u00e1 aktualiz\u00e1cia, ktorej cie\u013eom je umo\u017eni\u0165 vzdialen\u00fa spr\u00e1vu, m\u00f4\u017ee namiesto toho sl\u00fa\u017ei\u0165 ako most pre \u00fato\u010dn\u00edkov a premeni\u0165 kedysi bezpe\u010dn\u00fa v\u00fdrobn\u00fa halu na zranite\u013en\u00fa digit\u00e1lnu plochu.<\/li>\n\n\n\n<li>V\u00fdmena OT syst\u00e9mov je pre v\u00e4\u010d\u0161inu tov\u00e1rn\u00ed nere\u00e1lna kv\u00f4li s\u00favisiacim n\u00e1kladom na kapit\u00e1l a \u010das. V\u00fdpadky sp\u00f4soben\u00e9 incidentom s\u00favisiacim s OT v\u0161ak nielen naru\u0161uj\u00fa v\u00fdrobu, ale ohrozuj\u00fa aj zmluvy, ved\u00fa k pokut\u00e1m a m\u00f4\u017eu v\u00e1\u017ene po\u0161kodi\u0165 d\u00f4veru v zna\u010dku.<\/li>\n\n\n\n<li>Ke\u010f\u017ee IT sa r\u00fdchlo vyv\u00edja a OT sa pohybuje pomal\u00fdm tempom, skuto\u010dnou v\u00fdzvou nie je inov\u00e1cia, ale zabezpe\u010denie dvoch svetov, ktor\u00e9 p\u00f4vodne neboli navrhnut\u00e9 tak, aby sa stretli.<\/li>\n\n\n\n<li><strong>ESET PRIVATE<\/strong> zasahuje tam, kde tradi\u010dn\u00e1 bezpe\u010dnos\u0165 kon\u010d\u00ed, a pon\u00faka dlhodob\u00fa ochranu zameran\u00fa na OT, navrhnut\u00fa tak, aby chr\u00e1nila star\u0161ie syst\u00e9my bez nutnosti ru\u0161iv\u00fdch aktualiz\u00e1ci\u00ed.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Pre\u010do star\u0161ie syst\u00e9my OT predstavuj\u00fa v priemysle riziko pre kyberbezpe\u010dnos\u0165<\/h2>\n\n\n\n<p>Zv\u00fd\u0161enie produktivity predstavuje riziko pre kyberbezpe\u010dnos\u0165.<\/p>\n\n\n\n<p>Predstavme si, \u017ee m\u00e1te v\u00fdrobcu automobilov\u00fdch dielov, ktor\u00fd pou\u017e\u00edva star\u0161ie OT (hlavne stroje riaden\u00e9 PLC), ktor\u00e9 boli in\u0161talovan\u00e9 pred 20 a\u017e 30 rokmi. Hoci tieto stroje st\u00e1le spo\u013eahlivo funguj\u00fa, ich riadiace syst\u00e9my s\u00fa v\u0161etko, len nie modern\u00e9. V priebehu \u010dasu m\u00f4\u017ee vedenie spolo\u010dnosti v z\u00e1ujme efekt\u00edvnosti po\u017eiada\u0165 o zlep\u0161enie monitorovania prev\u00e1dzky, tak\u017ee projektov\u00ed mana\u017e\u00e9ri postupne pripoja v\u00fdrobn\u00fa halu k firemnej IT sieti \u2013 a pr\u00e1ve tu za\u010d\u00ednaj\u00fa probl\u00e9my.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color wp-elements-10b5f38209a8f220172db34f2da654c9\">Historicky boli OT siete \u0161peci\u00e1lne navrhnut\u00e9 pre priemyseln\u00e9 prostredie a ich bezpe\u010dnos\u0165 vych\u00e1dzala najm\u00e4 z ich uzavretosti a n\u00edzkej zn\u00e1mosti (\u201esecurity through obscurity\u201c), doplnenej o fyzick\u00e9 oddelenie od firemnej IT infra\u0161trukt\u00fary. In\u00fdmi slovami, v\u00fdrobn\u00e1 hala aj administrat\u00edvne kancel\u00e1rie boli samostatn\u00fdmi jednotkami s mo\u017enos\u0165ou fyzick\u00e9ho monitorovania.<\/p>\n\n\n\n<p>Jedn\u00e9ho d\u0148a spolo\u010dnos\u0165 zavedie modern\u00e9 rie\u0161enie protokolu vzdialen\u00e9ho pripojenia RDP, aby umo\u017enila vzdialen\u00fa spr\u00e1vu. In\u00fdmi slovami, spr\u00e1vca u\u017e nemus\u00ed cestova\u0165, aby pozoroval v\u00fdrobn\u00fa halu; m\u00f4\u017ee to robi\u0165 digit\u00e1lne z pohodlia svojej kancel\u00e1rskej stoli\u010dky. Navy\u0161e m\u00f4\u017ee chcie\u0165, aby pr\u00edstup mali nielen intern\u00ed spr\u00e1vcovia, ale aby sa mohli pripoji\u0165 aj subdod\u00e1vatelia zo zahrani\u010dia.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color wp-elements-2f07ee4495462b1f61814b410f3b91e2\">Hoci v\u0161ak m\u00f4\u017eu vyu\u017e\u00edva\u0165 protokol RDP prostredn\u00edctvom modern\u00fdch zariaden\u00ed, technol\u00f3gie v prev\u00e1dzke, ktor\u00e9 spo\u013eahlivo funguj\u00fa u\u017e viac ako 15 rokov (teda PLC, HMI, syst\u00e9my SCADA), z\u010faleka nie s\u00fa pripraven\u00e9 na vzdialen\u00fd pr\u00edstup.<\/p>\n\n\n\n<p>IT \u0161pecialisti samozrejme plnia svoje \u00falohy svedomito. Zabezpe\u010duj\u00fa zariadenia, aby nedo\u0161lo k ich kompromit\u00e1cii. Kompromit\u00e1cia je v\u0161ak len ot\u00e1zkou \u010dasu, nie toho, \u010di k nej v\u00f4bec d\u00f4jde. RDP je jedn\u00fdm z najbe\u017enej\u0161\u00edch vektorov hrozieb pre potenci\u00e1lne \u00fatoky kv\u00f4li svojim mnoh\u00fdm zranite\u013enostiam, alebo konkr\u00e9tnej\u0161ie, ch\u00fdbaj\u00facim bezpe\u010dnostn\u00fdm kontrol\u00e1m.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color wp-elements-2edacad1cd8ebdf634ee091cbb3a33ef\">Napr\u00edklad SMBv1, doplnkov\u00fd protokol k RDP, ktor\u00fd mu umo\u017e\u0148uje pr\u00edstup k s\u00faborom, tla\u010diar\u0148am a in\u00fdm sie\u0165ov\u00fdm zdrojom (poch\u00e1dzaj\u00faci z 90. rokov), bol \u0161iroko vystaven\u00fd exploitom EternalBlue, \u010do umo\u017enilo <a href=\"https:\/\/www.welivesecurity.com\/2017\/05\/13\/wanna-cryptor-ransomware-outbreak\/\">glob\u00e1lne \u00fatoky ransomv\u00e9ru WannaCryptor<\/a>.<\/p>\n\n\n\n<p>Hoci sa obavy m\u00f4\u017eu t\u00fdka\u0165 v\u00fdrobnej haly, naru\u0161enie bezpe\u010dnosti a n\u00e1sledn\u00e9 preru\u0161enie prev\u00e1dzky m\u00f4\u017eu nasledova\u0165 cestou najmen\u0161ieho odporu. Sta\u010d\u00ed jeden spearphishingov\u00fd e-mail alebo jeden \u0161kodliv\u00fd odkaz \u010di PDF s\u00fabor, a cel\u00e1 va\u0161a prev\u00e1dzka je zasiahnut\u00e1 <a href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/firemna-bezpecnost\/ticho-pred-ransomverom-preco-pokoj-neznamena-bezpecie\/\">ransomv\u00e9rom<\/a> alebo wiperom (programom na vymazanie d\u00e1t). V\u00fdsledkom m\u00f4\u017ee by\u0165 s ve\u013ekou pravdepodobnos\u0165ou zastavenie v\u00fdroby.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color wp-elements-973816abfbd5fc246c06e2a52e36e93e\">Schopnos\u0165 \u00fato\u010dn\u00edkov prenikn\u00fa\u0165 do siet\u00ed OT sa zjednodu\u0161ila v\u010faka vyu\u017e\u00edvaniu sie\u0165ov\u00fdch protokolov postaven\u00fdch na verejne zdokumentovan\u00fdch internetov\u00fdch protokoloch, zranite\u013en\u00fdm rozhraniam medzi zamestnancami a strojmi a \u010fal\u0161\u00edm v\u00fdpo\u010dtov\u00fdm zariadeniam s opera\u010dn\u00fdmi syst\u00e9mami. T\u00fato situ\u00e1ciu e\u0161te zhor\u0161uje prenikanie priemyseln\u00fdch zariaden\u00ed IoT do v\u00fdrobn\u00fdch z\u00e1vodov.<\/p>\n\n\n\n<p>\u201eNo, IT to m\u00f4\u017ee zastavi\u0165.\u201c Alebo naozaj m\u00f4\u017ee? V pr\u00edpade OT musia in\u017einieri fyzicky nav\u0161t\u00edvi\u0165 stroje, \u010do si vy\u017eaduje \u010das a zru\u010dnosti. Medzit\u00fdm je v\u00fdroba zastaven\u00e1, \u010do nar\u00fa\u0161a dod\u00e1vky. \u010co je hor\u0161ie, v pr\u00edsne kontrolovan\u00fdch odvetviach by zn\u00e1me zranite\u013enosti mohli tak\u00e9to \u00fatoky \u013eahko umo\u017eni\u0165 len preto, \u017ee ka\u017ed\u00e1 jednotliv\u00e1 aktualiz\u00e1cia vy\u017eaduje nov\u00fd s\u00fabor certifik\u00e1ci\u00ed na pokra\u010dovanie prev\u00e1dzky.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color wp-elements-aca1626b530875098851d2cf6e9b704d\">A pr\u00e1ve v tom spo\u010d\u00edva dilema: OT a priemyseln\u00e9 riadiace syst\u00e9my (ICS) sa \u0165a\u017eko nahr\u00e1dzaj\u00fa a e\u0161te \u0165a\u017e\u0161ie aktualizuj\u00fa. Mnoh\u00e9 prostredia OT sa spoliehaj\u00fa na zastaran\u00fd hardv\u00e9r (<a href=\"https:\/\/www.saritasa.com\/insights\/legacy-software-modernization-in-2025-survey-of-500-u-s-it-pros\">\u00fadajne aspo\u0148 62 % americk\u00fdch spolo\u010dnost\u00ed<\/a>), nepodporovan\u00e9 opera\u010dn\u00e9 syst\u00e9my (ako Windows 7) a nezabezpe\u010den\u00e9 protokoly, ktor\u00e9 neboli nikdy navrhnut\u00e9 s oh\u013eadom na kyberbezpe\u010dnos\u0165.<\/p>\n\n\n\n<p>Medzit\u00fdm sa pravdepodobnos\u0165 udelenia pok\u00fat zo strany regula\u010dn\u00fdch org\u00e1nov zvy\u0161uje ka\u017edou min\u00fatou a oddelenie PR sa tie\u017e zo v\u0161etk\u00fdch s\u00edl modl\u00ed za vyrie\u0161enie situ\u00e1cie sk\u00f4r, ako sa t\u00e1to spr\u00e1va dostane medzi partnerov a z\u00e1kazn\u00edkov. <\/p>\n\n\n\n<p>Existuje z toho jednoduch\u00e1 cesta von? V tom bode u\u017e nie. Z\u00e1lo\u017en\u00e9 rie\u0161enia treba vybudova\u0165 vopred, inak v\u00e1s situ\u00e1cia zasko\u010d\u00ed nepripraven\u00fdch.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Pre\u010do t\u00e1 neochota nahradi\u0165 zastaran\u00e9 syst\u00e9my OT?<\/h2>\n\n\n\n<p>V\u00fdrobn\u00e9 spolo\u010dnosti s dlhodobo funguj\u00facimi v\u00fdrobn\u00fdmi linkami, ako s\u00fa v\u00fdrobcovia automobilov a komponentov, v\u00fdrobcovia zdravotn\u00edckych zariaden\u00ed alebo dokonca vysoko \u0161pecializovan\u00e9 z\u00e1vody na v\u00fdrobu po\u010d\u00edta\u010dov\u00fdch \u010dipov, musia zachova\u0165 kontinuitu svojich prev\u00e1dzok, aby splnili svoje zmluvn\u00e9 z\u00e1v\u00e4zky.<\/p>\n\n\n\n<p>Preto je ak\u00e9ko\u013evek naru\u0161enie s\u00favisiace s moderniz\u00e1ciou syst\u00e9mov OT len \u010fal\u0161\u00edm m\u00ednusom v ich vopred napl\u00e1novanom ziskovom pl\u00e1ne, a to kv\u00f4li n\u00e1kladom na v\u00fdmenu a v\u00fdpadkom vo v\u00fdrobe. Existuje d\u00f4vod, pre\u010do napr\u00edklad v\u00fdrobcovia mobiln\u00fdch zariaden\u00ed zriedka, ak v\u00f4bec, menia svojich dod\u00e1vate\u013eov procesorov. Vy\u017eaduje si to ove\u013ea viac v\u00fdskumu a v\u00fdvoja, rizika a intern\u00fdch aj extern\u00fdch znalost\u00ed, nehovoriac o tom, \u017ee by ste museli za\u010da\u0165 od nuly, ke\u010f u\u017e m\u00e1te stabiln\u00fd v\u00fdrobn\u00fd re\u0165azec. Preto zariadenia maj\u00fa tendenciu ponecha\u0165 svoje star\u00e9 OT syst\u00e9my tak, ako s\u00fa. Pokia\u013e funguj\u00fa.<\/p>\n\n\n\n<p>Tieto pomaly sa vyv\u00edjaj\u00face a pr\u00edsne kontrolovan\u00e9 prostredia si vy\u017eaduj\u00fa dlh\u00e9 \u017eivotn\u00e9 cykly. Vo svete IT, ktor\u00fd sa v\u0161ak \u010doraz viac pres\u00fava do oblasti prev\u00e1dzkov\u00fdch technol\u00f3gi\u00ed (OT), v\u0161ak nie je miesto pre stagn\u00e1ciu.<\/p>\n\n\n\n<p>Navy\u0161e, ak sa na to pozrieme z poh\u013eadu softv\u00e9ru, faktom je, \u017ee k\u00f3d (vr\u00e1tane malv\u00e9ru) sa vyv\u00edja r\u00fdchlej\u0161ie ako hardv\u00e9r. To ist\u00e9 plat\u00ed pre firmv\u00e9r, ktor\u00fd je \u0161pecifick\u00fd pre konkr\u00e9tny hardv\u00e9r a pou\u017e\u00edva sa u\u017e desa\u0165ro\u010dia. V tak\u00fdchto prostrediach nemus\u00ed by\u0165 aplikovanie z\u00e1plat realizovate\u013en\u00e9 kv\u00f4li nekompatibilite alebo z\u00e1niku extern\u00fdch dod\u00e1vate\u013eov, \u010do v kone\u010dnom d\u00f4sledku ponech\u00e1va syst\u00e9my vystaven\u00e9 riziku a\u017e do \u010fal\u0161ieho vypnutia. Alebo nav\u017edy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vplyv riz\u00edk s\u00favisiacich s dosluhuj\u00facimi OT na podnikanie<\/h2>\n\n\n\n<p>Andrea Doyle, riadite\u013eka oddelenia Corporate Solutions spolo\u010dnosti ESET pre regi\u00f3n NORAM, m\u00e1 dlhoro\u010dn\u00e9 sk\u00fasenosti s pr\u00e1cou s klientmi, ktor\u00ed prev\u00e1dzkuj\u00fa komplexn\u00fa infra\u0161trukt\u00faru: <em>\u201eStar\u0161ie syst\u00e9my nie s\u00fa probl\u00e9mom, probl\u00e9mom je nespravovan\u00e9 riziko. V\u00e4\u010d\u0161ina v\u00fdrobcov nem\u00f4\u017ee jednoducho vyhodi\u0165 a nahradi\u0165 desa\u0165ro\u010dia prev\u00e1dzkovej technol\u00f3gie. Skuto\u010dn\u00e9 nebezpe\u010denstvo nepredstavuje vek, ale prev\u00e1dzka kritick\u00fdch syst\u00e9mov bez bezpe\u010dnostnej architekt\u00fary navrhnutej pre dlh\u00e9 \u017eivotn\u00e9 cykly a obmedzen\u00e9 mo\u017enosti in\u0161tal\u00e1cie z\u00e1plat.\u201c<\/em><\/p>\n\n\n\n<p>Aktualiz\u00e1cie firmv\u00e9ru s\u00fa zriedkav\u00e9 a pomerne n\u00e1ro\u010dn\u00e9. Existuje v\u0161ak pr\u00edstup, ktor\u00fd by mohol preklen\u00fa\u0165 priepas\u0165 medzi zastaranou infra\u0161trukt\u00farou a modern\u00fdmi bezpe\u010dnostn\u00fdmi po\u017eiadavkami?<\/p>\n\n\n\n<p><em>\u201eOrganiz\u00e1cie nemusia vymeni\u0165 v\u0161etky syst\u00e9my, aby zn\u00ed\u017eili kybernetick\u00e9 riziko; potrebuj\u00fa strat\u00e9giu, ktor\u00e1 zabezpe\u010d\u00ed to, \u010do mus\u00ed na\u010falej fungova\u0165. Nepodporovan\u00e9 syst\u00e9my nielen zvy\u0161uj\u00fa kybernetick\u00fa zranite\u013enos\u0165, ale aj zn\u00e1sobuj\u00fa obchodn\u00e9 riziko. V OT stoja v\u00fdpadky ove\u013ea viac ako n\u00e1prava incidentov. Bezpe\u010dnostn\u00e1 strat\u00e9gia sa mus\u00ed prisp\u00f4sobi\u0165 prev\u00e1dzkovej realite, nie ju nar\u00fa\u0161a\u0165,\u201c<\/em> dodala Doyle.<\/p>\n\n\n\n<p>Pre v\u00fdrobcov preto mo\u017eno v skuto\u010dnosti nejde o inov\u00e1cie. Ak predpoklad\u00e1me, \u017ee v\u00fdrobn\u00e9 zariadenia musia na\u010falej fungova\u0165, predv\u00eddate\u013enos\u0165 je cenn\u00e1 viac ne\u017e \u010doko\u013evek in\u00e9. Prev\u00e1dzkovatelia musia pl\u00e1nova\u0165 dopredu. A pr\u00e1ve tu prich\u00e1dza do hry aj dosiahnutie odolnosti.<\/p>\n\n\n\n<p><em>\u201eMana\u017e\u00e9ri IT bezpe\u010dnosti vo v\u00fdrobnom, energetickom, obrannom a zdravotn\u00edckom sektore musia pos\u00fadi\u0165, \u010di s\u00fa ich star\u0161ie syst\u00e9my st\u00e1le podporovan\u00e9. Ak nie s\u00fa, rie\u0161en\u00edm nie je ich opustenie, ale bezpe\u010dnostn\u00e1 podpora s dlh\u00fdm \u017eivotn\u00fdm cyklom navrhnut\u00e1 \u0161peci\u00e1lne pre prostredia OT,\u201c<\/em> povedal Doyle.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ako zabezpe\u010di\u0165 star\u0161ie OT prostredia bez naru\u0161enia v\u00fdroby<\/h2>\n\n\n\n<p>Je potrebn\u00e9 prehodnoti\u0165 doteraj\u0161ie predpoklady. Lok\u00e1lne, dlhodobo pou\u017e\u00edvan\u00e9 a star\u0161ie syst\u00e9my nezmizn\u00fa. Bud\u00fa koexistova\u0165 s modern\u00fdmi platformami e\u0161te cel\u00e9 desa\u0165ro\u010dia. Skuto\u010dnou v\u00fdzvou nie je vo\u013eba medzi star\u00fdm a nov\u00fdm, ale konzistentn\u00e9 a realistick\u00e9 zabezpe\u010denie cel\u00e9ho IT a OT ekosyst\u00e9mu.<\/p>\n\n\n\n<p>Preto v\u00fdrobn\u00e9 spolo\u010dnosti nielen\u017ee potrebuj\u00fa ochranu pred malv\u00e9rom na koncov\u00fdch zariadeniach, ktor\u00e1 mus\u00ed spo\u013eahlivo fungova\u0165 v ich jedine\u010dn\u00fdch podmienkach s vysokou \u00farov\u0148ou bezpe\u010dnosti, aby bolo zabezpe\u010den\u00e9 ka\u017ed\u00e9 jedno zariadenie, ale ich bezpe\u010dnostn\u00e9 rie\u0161enie mus\u00ed tie\u017e zabezpe\u010di\u0165 dlhodob\u00fa podporu s minim\u00e1lnym vplyvom na ich softv\u00e9rov\u00fa a hardv\u00e9rov\u00fa infra\u0161trukt\u00faru po\u010das dlh\u0161ieho obdobia.<\/p>\n\n\n\n<p><em>\u201ePresne na to s\u00fa navrhnut\u00e9 bezpe\u010dnostn\u00e9 modely zalo\u017een\u00e9 na \u017eivotnom cykle, ako je ESET PRIVATE Industrial Security,\u201c<\/em> vysvet\u013euje Andrea Doyle.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large has-lightbox\"><a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia-na-mieru\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"211\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset_private_banner_1200-1024x211.jpg\" alt=\"\" class=\"wp-image-6620\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset_private_banner_1200-1024x211.jpg 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset_private_banner_1200-300x62.jpg 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset_private_banner_1200-768x158.jpg 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset_private_banner_1200-370x76.jpg 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset_private_banner_1200-760x156.jpg 760w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset_private_banner_1200.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">ESET PRIVATE pre dlhodob\u00fa bezpe\u010dnos\u0165 OT a star\u0161\u00edch syst\u00e9mov<\/h2>\n\n\n\n<p>Ako nazna\u010dila Doyle, spolo\u010dnos\u0165 ESET m\u00e1 rie\u0161enie. <strong><a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia-na-mieru\/\">ESET PRIVATE Industrial Security<\/a><\/strong> pon\u00faka bezpe\u010dnostn\u00e9 rie\u0161enia \u0161it\u00e9 na mieru pre prostredia OT, vr\u00e1tane rie\u0161en\u00ed ESET Lifecycle Solutions, ktor\u00e9 s\u00fa \u0161peci\u00e1lne navrhnut\u00e9 s oh\u013eadom na r\u00f4zne \u010dasov\u00e9 r\u00e1mce:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u0160tandardn\u00e9 rie\u0161enie a podpora (3 roky):<\/h3>\n\n\n\n<p>Ur\u010den\u00e9 pre IT prostredia, ktor\u00e9 nemaj\u00fa \u017eiadne obmedzenia pri aktualiz\u00e1cii svojich zariaden\u00ed. Z\u00e1kazn\u00edci maj\u00fa pr\u00edstup k najnov\u0161\u00edm verzi\u00e1m opera\u010dn\u00e9ho syst\u00e9mu a rie\u0161en\u00ed ESET, \u010do zaru\u010duje najvy\u0161\u0161iu \u00farove\u0148 ochrany a kompatibility.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Dlhodob\u00e1 podpora (7\u201310 rokov):<\/h3>\n\n\n\n<p>Ur\u010den\u00e1 pre z\u00e1kazn\u00edkov v prostrediach OT alebo in\u00fdch kritick\u00fdch prostrediach, ktor\u00ed potrebuj\u00fa stabiln\u00fa verziu bezpe\u010dnostn\u00fdch rie\u0161en\u00ed ESET po\u010das dlh\u0161ieho \u010dasov\u00e9ho obdobia. To zaru\u010duje predv\u00eddate\u013en\u00fa, dlhodob\u00fa bezpe\u010dnos\u0165 bez \u010dast\u00fdch zmien verzi\u00ed, \u010d\u00edm sa podporuje kontinuita podnikania v citliv\u00fdch alebo regulovan\u00fdch prostrediach.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Podpora star\u0161\u00edch verzi\u00ed (10 a viac rokov, prisp\u00f4soben\u00e1 \u010dasov\u00e9mu harmonogramu z\u00e1kazn\u00edka):<\/h3>\n\n\n\n<p>Ur\u010den\u00e9 pre z\u00e1kazn\u00edkov, ktor\u00ed potrebuj\u00fa prev\u00e1dzkova\u0165 star\u0161ie zariadenia, opera\u010dn\u00e9 syst\u00e9my alebo pou\u017e\u00edva\u0165 rie\u0161enia ESET, ktor\u00e9 dosiahli koniec \u017eivotnosti a nemo\u017eno ich aktualizova\u0165 z d\u00f4vodu technick\u00fdch, prev\u00e1dzkov\u00fdch, regula\u010dn\u00fdch alebo obchodn\u00fdch obmedzen\u00ed.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color wp-elements-23baf138e763eea9d9606a41a6a46f08\">Podpora star\u0161\u00edch verzi\u00ed od spolo\u010dnosti ESET zah\u0155\u0148a bezpe\u010dnostn\u00e9 opatrenia pre zastaran\u00e9 opera\u010dn\u00e9 syst\u00e9my, ako s\u00fa Windows XP SP3, Windows 7, Windows Server 2008 a mnoh\u00e9 \u010fal\u0161ie. Ak ide o dlhodob\u00fa prev\u00e1dzku bez v\u00fdpadkov, podpora mus\u00ed dr\u017ea\u0165 krok a re\u0161pektova\u0165 dedi\u010dstvo t\u00fdchto syst\u00e9mov.<\/p>\n\n\n\n<p>Podpora star\u0161\u00edch verzi\u00ed sa zameriava sk\u00f4r na zmier\u0148ovanie riz\u00edk. ESET PRIVATE Industrial Security poskytuje bezpe\u010dnostn\u00e9 krytie pre vybran\u00e9 star\u0161ie platformy prostredn\u00edctvom kontrolovan\u00fdch verzi\u00ed produktov, aktualiz\u00e1ci\u00ed signat\u00far a prisp\u00f4soben\u00fdch bezpe\u010dnostn\u00fdch konfigur\u00e1ci\u00ed. Cie\u013eom je zn\u00ed\u017ei\u0165 vystavenie zn\u00e1mym hrozb\u00e1m a pred\u013a\u017ei\u0165 bezpe\u010dn\u00fa prev\u00e1dzku kritick\u00fdch star\u0161\u00edch zariaden\u00ed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u010co v\u00fdrobcom prin\u00e1\u0161a dlhodob\u00e1 podpora bezpe\u010dnosti OT<\/h2>\n\n\n\n<p>Nezab\u00fadajte, \u017ee cie\u013eom je odstr\u00e1ni\u0165 medzery sp\u00f4soben\u00e9 ch\u00fdbaj\u00facimi aktualiz\u00e1ciami, \u010do sa najlep\u0161ie realizuje v lok\u00e1lnom prostred\u00ed, aby sa zabezpe\u010dila vy\u0161\u0161ia spo\u013eahlivos\u0165 a lep\u0161ie predv\u00eddate\u013en\u00e9 \u010dasov\u00e9 harmonogramy. Sk\u00fasen\u00e9 t\u00edmy DevOps z ESET PRIVATE sa venuj\u00fa rie\u0161eniam s dlh\u00fdm \u017eivotn\u00fdm cyklom, neust\u00e1le pracuj\u00fa na identifik\u00e1cii a odstra\u0148ovan\u00ed slab\u00edn v star\u0161\u00edch rie\u0161eniach a umo\u017e\u0148uj\u00fa v\u010dasn\u00fa detekciu riz\u00edk v celej in\u0161tala\u010dnej z\u00e1kladni. To zlep\u0161uje pripravenos\u0165 a reakciu v pr\u00edpade kritick\u00e9ho incidentu.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color wp-elements-ee6e8e12e3dd6d0c97e495ef0f08218d\">Spolo\u010dnos\u0165 ESET poskytuje komplexn\u00e9 technol\u00f3gie kybernetickej bezpe\u010dnosti v prostrediach IT aj OT, ktor\u00e9 s\u00fa plne nasadzovan\u00e9 na mieste (on-premises), s&nbsp;on-premises platformou, ktor\u00e1 je neust\u00e1le vylep\u0161ovan\u00e1 a \u010falej rozv\u00edjan\u00e1 a pon\u00faka ochranu siahaj\u00facu od modern\u00fdch priemyseln\u00fdch syst\u00e9mov a\u017e po desa\u0165ro\u010dia star\u00e9 star\u0161ie platformy.<\/p>\n\n\n\n<p>N\u00e1vrhy zabezpe\u010denia OT ESET PRIVATE Industrial Security re\u0161pektuj\u00fa prev\u00e1dzkov\u00e9, bezpe\u010dnostn\u00e9 a dostupnostn\u00e9 obmedzenia jej jedine\u010dn\u00fdch z\u00e1kazn\u00edkov. Na\u0161e technol\u00f3gie nez\u00e1visl\u00e9 od odvetvia s\u00fa pou\u017eite\u013en\u00e9 vo v\u00fdrobnom, energetickom, dopravnom a in\u00fdch kritick\u00fdch sektoroch a s\u00fa dod\u00e1van\u00e9 priamo alebo v r\u00e1mci OEM technol\u00f3gi\u00ed.<\/p>\n\n\n\n<p>Podpora star\u0161\u00edch verzi\u00ed zah\u0155\u0148a aj pomoc s konfigur\u00e1ciou a nasaden\u00edm, ako aj odpor\u00fa\u010dania t\u00fdkaj\u00face sa kompenza\u010dn\u00fdch bezpe\u010dnostn\u00fdch opatren\u00ed (end-to-end rie\u0161enia). Pokia\u013e ide o prev\u00e1dzku, pon\u00fakame \u0161pecializovan\u00fa infra\u0161trukt\u00faru pre aktualiz\u00e1cie, ktor\u00e1 zabezpe\u010duje riaden\u00e9 dod\u00e1vanie aktualiz\u00e1ci\u00ed v priebehu nieko\u013ek\u00fdch rokov, s predv\u00eddate\u013en\u00fdm modelom n\u00e1kladov a vyhraden\u00fdm mana\u017e\u00e9rom SLA pre priamy kontakt.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-hover-background-color has-text-color has-background has-link-color wp-elements-55fa97519709245c802cc57c65a97f12\">Pre OT poskytuje <strong><a href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia-na-mieru\/\">ESET PRIVATE<\/a><\/strong> aj poradenstvo v oblasti kyberbezpe\u010dnosti, n\u00e1vrh rie\u0161en\u00ed na mieru, v\u00fdvoj a implement\u00e1ciu, ako aj spravovan\u00e9 slu\u017eby, vr\u00e1tane SOC as a Service pre monitorovanie riaden\u00e9 \u013eu\u010fmi.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Prepojenie star\u0161\u00edch OT syst\u00e9mov a modern\u00fdch bezpe\u010dnostn\u00fdch po\u017eiadaviek<\/h2>\n\n\n\n<p>V prostrediach OT s\u00fa zariadenia navrhnut\u00e9 tak, aby vydr\u017eali, a preto mus\u00ed podpora \u00eds\u0165 ruka v ruke s t\u00fdm, aby sa zabezpe\u010dilo, \u017ee tomu tak aj bude.<\/p>\n\n\n\n<p>Ako to teda je? S\u00fa pou\u017e\u00edvatelia star\u0161\u00edch OT syst\u00e9mov ods\u00faden\u00ed na prev\u00e1dzku s pretrv\u00e1vaj\u00facimi zranite\u013enos\u0165ami? Je priepas\u0165 medzi star\u00fdmi a modern\u00fdmi po\u017eiadavkami neprekonate\u013en\u00e1? Na\u0161\u0165astie nie. Preklenutie tejto priepasti si v\u0161ak vy\u017eaduje pr\u00edstup zameran\u00fd na \u017eivotn\u00fd cyklus, ktor\u00fd vypln\u00ed medzery pomocou bezpe\u010dnostn\u00fdch rie\u0161en\u00ed navrhnut\u00fdch na mieru s oh\u013eadom na dlhodob\u00e9 ciele.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.eset.com\/sk\/firemna-it-bezpecnost\/riesenia-na-mieru\/\">Viac o ESET PRIVATE<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Viete, ako preklen\u00fa\u0165 priepas\u0165 medzi rizikami star\u0161\u00edch OT syst\u00e9mov a modern\u00fdmi bezpe\u010dnostn\u00fdmi po\u017eiadavkami? Je dobr\u00e9 ma\u0165 spo\u013eahliv\u00fa technol\u00f3giu, ktor\u00e1 funguje cel\u00e9 roky. Najm\u00e4 v prostrediach prev\u00e1dzkovej technol\u00f3gie (OT) s\u00fa zariadenia navrhnut\u00e9 tak, aby vydr\u017eali. To, \u010do bolo nain\u0161talovan\u00e9 pred 30 rokmi, v\u0161ak nemus\u00ed sta\u010di\u0165 na v\u00fdzvy s\u00fa\u010dasnosti. V roku 1996 bol internet e\u0161te v plienkach a umel\u00e1 inteligencia bola v\u00e4\u010d\u0161inou len sci-fi.&hellip;<\/p>\n","protected":false},"author":8,"featured_media":6617,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[143],"tags":[],"class_list":["post-6615","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eset-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ako sa vyrovna\u0165 s\u00a0n\u00e1strahami star\u0161\u00edch OT technol\u00f3gi\u00ed | ESET<\/title>\n<meta name=\"description\" content=\"Viete, ako preklen\u00fa\u0165 priepas\u0165 medzi rizikami star\u0161\u00edch OT syst\u00e9mov a modern\u00fdmi bezpe\u010dnostn\u00fdmi po\u017eiadavkami?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ako sa vyrovna\u0165 s\u00a0n\u00e1strahami star\u0161\u00edch OT technol\u00f3gi\u00ed | ESET\" \/>\n<meta property=\"og:description\" content=\"Viete, ako preklen\u00fa\u0165 priepas\u0165 medzi rizikami star\u0161\u00edch OT syst\u00e9mov a modern\u00fdmi bezpe\u010dnostn\u00fdmi po\u017eiadavkami?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-21T13:23:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-21T13:28:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset-private-ot-lifecycle-solutions-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1244\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"igorkmit\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"igorkmit\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\\\/\"},\"author\":{\"name\":\"igorkmit\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\"},\"headline\":\"Ako sa vyrovna\u0165 s\u00a0n\u00e1strahami star\u0161\u00edch OT technol\u00f3gi\u00ed vo v\u00fdrobnom sektore\",\"datePublished\":\"2026-05-21T13:23:02+00:00\",\"dateModified\":\"2026-05-21T13:28:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\\\/\"},\"wordCount\":2817,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/05\\\/eset-private-ot-lifecycle-solutions-1.jpg\",\"articleSection\":[\"ESET Blog\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\\\/\",\"name\":\"Ako sa vyrovna\u0165 s\u00a0n\u00e1strahami star\u0161\u00edch OT technol\u00f3gi\u00ed | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/05\\\/eset-private-ot-lifecycle-solutions-1.jpg\",\"datePublished\":\"2026-05-21T13:23:02+00:00\",\"dateModified\":\"2026-05-21T13:28:29+00:00\",\"description\":\"Viete, ako preklen\u00fa\u0165 priepas\u0165 medzi rizikami star\u0161\u00edch OT syst\u00e9mov a modern\u00fdmi bezpe\u010dnostn\u00fdmi po\u017eiadavkami?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/05\\\/eset-private-ot-lifecycle-solutions-1.jpg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/05\\\/eset-private-ot-lifecycle-solutions-1.jpg\",\"width\":1244,\"height\":700,\"caption\":\"BVF OT ilustracny obrazok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/eset-blog\\\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ako sa vyrovna\u0165 s\u00a0n\u00e1strahami star\u0161\u00edch OT technol\u00f3gi\u00ed vo v\u00fdrobnom sektore\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/0b6eea8250c76790569dbea41b2810a3\",\"name\":\"igorkmit\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g\",\"caption\":\"igorkmit\"},\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/author\\\/igorkmit\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ako sa vyrovna\u0165 s\u00a0n\u00e1strahami star\u0161\u00edch OT technol\u00f3gi\u00ed | ESET","description":"Viete, ako preklen\u00fa\u0165 priepas\u0165 medzi rizikami star\u0161\u00edch OT syst\u00e9mov a modern\u00fdmi bezpe\u010dnostn\u00fdmi po\u017eiadavkami?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\/","og_locale":"sk_SK","og_type":"article","og_title":"Ako sa vyrovna\u0165 s\u00a0n\u00e1strahami star\u0161\u00edch OT technol\u00f3gi\u00ed | ESET","og_description":"Viete, ako preklen\u00fa\u0165 priepas\u0165 medzi rizikami star\u0161\u00edch OT syst\u00e9mov a modern\u00fdmi bezpe\u010dnostn\u00fdmi po\u017eiadavkami?","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2026-05-21T13:23:02+00:00","article_modified_time":"2026-05-21T13:28:29+00:00","og_image":[{"width":1244,"height":700,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset-private-ot-lifecycle-solutions-1.jpg","type":"image\/jpeg"}],"author":"igorkmit","twitter_card":"summary_large_image","twitter_misc":{"Autor":"igorkmit","Predpokladan\u00fd \u010das \u010d\u00edtania":"12 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\/"},"author":{"name":"igorkmit","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3"},"headline":"Ako sa vyrovna\u0165 s\u00a0n\u00e1strahami star\u0161\u00edch OT technol\u00f3gi\u00ed vo v\u00fdrobnom sektore","datePublished":"2026-05-21T13:23:02+00:00","dateModified":"2026-05-21T13:28:29+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\/"},"wordCount":2817,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset-private-ot-lifecycle-solutions-1.jpg","articleSection":["ESET Blog"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\/","name":"Ako sa vyrovna\u0165 s\u00a0n\u00e1strahami star\u0161\u00edch OT technol\u00f3gi\u00ed | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset-private-ot-lifecycle-solutions-1.jpg","datePublished":"2026-05-21T13:23:02+00:00","dateModified":"2026-05-21T13:28:29+00:00","description":"Viete, ako preklen\u00fa\u0165 priepas\u0165 medzi rizikami star\u0161\u00edch OT syst\u00e9mov a modern\u00fdmi bezpe\u010dnostn\u00fdmi po\u017eiadavkami?","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset-private-ot-lifecycle-solutions-1.jpg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2026\/05\/eset-private-ot-lifecycle-solutions-1.jpg","width":1244,"height":700,"caption":"BVF OT ilustracny obrazok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/eset-blog\/ako-sa-vyrovnat-s-nastrahami-starsich-ot-technologii-vo-vyrobnom-sektore\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Ako sa vyrovna\u0165 s\u00a0n\u00e1strahami star\u0161\u00edch OT technol\u00f3gi\u00ed vo v\u00fdrobnom sektore"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/person\/0b6eea8250c76790569dbea41b2810a3","name":"igorkmit","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bfe57d85421fcd92911fa073b55d2e8a95a8db8dee4874888ace1a6a5156f7ae?s=96&d=mm&r=g","caption":"igorkmit"},"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/igorkmit\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=6615"}],"version-history":[{"count":2,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6615\/revisions"}],"predecessor-version":[{"id":6622,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/6615\/revisions\/6622"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/6617"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=6615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=6615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=6615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}