{"id":641,"date":"2026-03-10T10:38:24","date_gmt":"2026-03-10T10:38:24","guid":{"rendered":"https:\/\/www.knoxtera.com\/?page_id=641"},"modified":"2026-04-27T12:22:43","modified_gmt":"2026-04-27T12:22:43","slug":"edr-endpoint-detection-response","status":"publish","type":"page","link":"https:\/\/www.knoxtera.com\/en\/uslugi-cyberbezpieczenstwa\/edr-endpoint-detection-response\/","title":{"rendered":"EDR \u2013 Endpoint Detection &amp; Response"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"641\" class=\"elementor elementor-641\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d548ae3 e-flex e-con-boxed e-con e-parent\" data-id=\"d548ae3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3d7e7c7 e-con-full e-flex e-con e-child\" data-id=\"3d7e7c7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-443005c elementor-widget elementor-widget-image\" data-id=\"443005c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/businesspeople-working-together-with-abstract-digi-2026-01-11-08-41-01-utc-1024x512.jpg\" class=\"attachment-large size-large wp-image-166\" alt=\"\" srcset=\"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/businesspeople-working-together-with-abstract-digi-2026-01-11-08-41-01-utc-1024x512.jpg 1024w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/businesspeople-working-together-with-abstract-digi-2026-01-11-08-41-01-utc-300x150.jpg 300w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/businesspeople-working-together-with-abstract-digi-2026-01-11-08-41-01-utc-768x384.jpg 768w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/businesspeople-working-together-with-abstract-digi-2026-01-11-08-41-01-utc-1536x768.jpg 1536w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/businesspeople-working-together-with-abstract-digi-2026-01-11-08-41-01-utc-2048x1024.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e2cb93a e-con-full e-flex e-con e-child\" data-id=\"e2cb93a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9af650c elementor-widget elementor-widget-heading\" data-id=\"9af650c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Zaawansowana ochrona urz\u0105dze\u0144 ko\u0144cowych - <span style=\"color:#292929\">wykryj i zneutralizuj zagro\u017cenie, zanim si\u0119 rozprzestrzeni<\/span><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8671a16 elementor-widget elementor-widget-heading\" data-id=\"8671a16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">EDR (Endpoint Detection &amp; Response) \u2013 real-time monitoring, analiza behawioralna i b\u0142yskawiczna reakcja na zagro\u017cenia na ka\u017cdym urz\u0105dzeniu w Twojej organizacji.<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8cf700 elementor-widget elementor-widget-text-editor\" data-id=\"d8cf700\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Tradycyjny antywirus wykrywa to, co ju\u017c zna. Cyberprzest\u0119pcy wiedz\u0105 o tym doskonale \u2013 dlatego coraz cz\u0119\u015bciej stosuj\u0105 techniki, kt\u00f3re go omijaj\u0105. EDR dzia\u0142a inaczej: stale monitoruje zachowanie ka\u017cdego urz\u0105dzenia i wykrywa zagro\u017cenia na podstawie tego, co si\u0119 dzieje \u2013 nie tylko tego, co jest znane.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-755ab14 elementor-widget elementor-widget-button\" data-id=\"755ab14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"#edr-from\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Chc\u0119 porozmawia\u0107 o EDR<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c204a3 e-flex e-con-boxed e-con e-parent\" data-id=\"3c204a3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-144bce6 e-con-full e-flex e-con e-child\" data-id=\"144bce6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-812be0c elementor-widget elementor-widget-image\" data-id=\"812be0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"244\" src=\"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/knoxtera__0014_Vector-Smart-Object-300x244.png\" class=\"attachment-medium size-medium wp-image-252\" alt=\"\" srcset=\"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/knoxtera__0014_Vector-Smart-Object-300x244.png 300w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/knoxtera__0014_Vector-Smart-Object-1024x834.png 1024w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/knoxtera__0014_Vector-Smart-Object-768x625.png 768w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/knoxtera__0014_Vector-Smart-Object.png 1234w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cec5efb e-con-full e-flex e-con e-child\" data-id=\"cec5efb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10a6984 elementor-widget elementor-widget-heading\" data-id=\"10a6984\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Czym jest <span style=\"color:#292929\">EDR?<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57af53e elementor-widget elementor-widget-text-editor\" data-id=\"57af53e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>EDR (Endpoint Detection &amp; Response) to rozwi\u0105zanie bezpiecze\u0144stwa nowej generacji, kt\u00f3re w czasie rzeczywistym monitoruje aktywno\u015b\u0107 na urz\u0105dzeniach ko\u0144cowych \u2013 komputerach, laptopach i serwerach. W odr\u00f3\u017cnieniu od klasycznego antywirusa EDR nie opiera si\u0119 wy\u0142\u0105cznie na sygnaturach znanych zagro\u017ce\u0144, lecz analizuje zachowanie proces\u00f3w, u\u017cytkownik\u00f3w i systemu, wykrywaj\u0105c anomalie charakterystyczne dla zaawansowanych atak\u00f3w.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4fc65dc e-flex e-con-boxed e-con e-parent\" data-id=\"4fc65dc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-47ec2d2 e-con-full e-flex e-con e-child\" data-id=\"47ec2d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-905f830 elementor-widget elementor-widget-heading\" data-id=\"905f830\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jakie zagro\u017cenia wykrywa <span style=\"color:#292929\">EDR?<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e19478 elementor-widget elementor-widget-text-editor\" data-id=\"0e19478\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>EDR skutecznie identyfikuje zagro\u017cenia, kt\u00f3re omijaj\u0105 tradycyjne zabezpieczenia, w tym:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db2dfbd elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"db2dfbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Ransomware<\/strong> - wykrywa szyfrowanie plik\u00f3w i zatrzymuje atak we wczesnej fazie.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Ataki zero-day<\/strong> - identyfikuje nieznane wcze\u015bniej exploity na podstawie analizy behawioralnej.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Fileless malware<\/strong> - z\u0142o\u015bliwe oprogramowanie dzia\u0142aj\u0105ce wy\u0142\u0105cznie w pami\u0119ci, bez pliku na dysku.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Ruchy lateralne<\/strong> - pr\u00f3by przemieszczania si\u0119 atakuj\u0105cego mi\u0119dzy urz\u0105dzeniami w sieci.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Zagro\u017cenia wewn\u0119trzne<\/strong> - podejrzane dzia\u0142ania pracownik\u00f3w lub przej\u0119tych kont.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Kradzie\u017c danych uwierzytelniaj\u0105cych<\/strong> - ataki na has\u0142a, tokeny i sesje u\u017cytkownik\u00f3w.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d91aaac e-con-full e-flex e-con e-child\" data-id=\"d91aaac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b97d76 elementor-widget elementor-widget-heading\" data-id=\"1b97d76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dlaczego klasyczny antywirus <span style=\"color:#292929\">nie wystarcza?<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-febe50f elementor-widget elementor-widget-text-editor\" data-id=\"febe50f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Wsp\u00f3\u0142czesne ataki s\u0105 zaprojektowane tak, by omija\u0107 sygnaturowe metody detekcji. Atakuj\u0105cy u\u017cywaj\u0105 legalnych narz\u0119dzi systemowych, dzia\u0142aj\u0105 w pami\u0119ci operacyjnej i stopniowo eskaluj\u0105 uprawnienia \u2014 bez pozostawiania \u015blad\u00f3w, kt\u00f3re wykry\u0142by tradycyjny AV.<\/p><p>EDR zamyka t\u0119 luk\u0119 dzi\u0119ki:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-545d029 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"545d029\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Analizie behawioralnej<\/strong> - monitoruje wzorce zachowania, nie tylko znane sygnatury.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Ci\u0105g\u0142emu zapisowi aktywno\u015bci<\/strong> - pe\u0142na historia zdarze\u0144 na ka\u017cdym endpoincie.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Automatycznej reakcji<\/strong> - izolacja zainfekowanego urz\u0105dzenia bez udzia\u0142u cz\u0142owieka.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Wsparciu analityka<\/strong> - dedykowany operator mo\u017ce r\u0119cznie interweniowa\u0107 w z\u0142o\u017conych przypadkach.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-192835a e-flex e-con-boxed e-con e-parent\" data-id=\"192835a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-664a425 e-con-full e-flex e-con e-child\" data-id=\"664a425\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-56f6706 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"56f6706\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bfcfeb1 e-con-full e-flex e-con e-child\" data-id=\"bfcfeb1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b804bda elementor-widget elementor-widget-heading\" data-id=\"b804bda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Dla kogo jest rozwi\u0105zanie EDR?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fece943 elementor-widget elementor-widget-text-editor\" data-id=\"fece943\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>EDR jest szczeg\u00f3lnie warto\u015bciowy dla organizacji, kt\u00f3re:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d5fe81 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"6d5fe81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Przetwarzaj\u0105 <strong>wra\u017cliwe dane finansowe lub osobowe<\/strong> i nie mog\u0105 pozwoli\u0107 sobie na przest\u00f3j.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Posiadaj\u0105 <strong>rozproszon\u0105 flot\u0119 urz\u0105dze\u0144<\/strong> - praca zdalna, BYOD, wiele lokalizacji.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Podlegaj\u0105 <strong>regulacjom wymagaj\u0105cym ochrony endpoint\u00f3w<\/strong> - UKSC, NIS2, PCI-DSS, ISO 27001.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Do\u015bwiadczy\u0142y <strong>incydentu ransomware lub malware<\/strong> i szukaj\u0105 skuteczniejszej ochrony.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Nie dysponuj\u0105 du\u017cym zespo\u0142em IT<\/strong> i potrzebuj\u0105 automatyzacji reakcji na zagro\u017cenia.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cbe1b7 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"4cbe1b7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9eb4736 e-flex e-con-boxed e-con e-parent\" data-id=\"9eb4736\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-54834a5 e-con-full e-flex e-con e-child\" data-id=\"54834a5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83c5476 elementor-widget elementor-widget-heading\" data-id=\"83c5476\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jak dzia\u0142a <span style=\"color:#292929\">EDR<\/span> w praktyce?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6dfa0f elementor-widget elementor-widget-text-editor\" data-id=\"d6dfa0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Ochrona endpoint\u00f3w z EDR przebiega w czterech krokach:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-859f057 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"859f057\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Monitoring<\/strong> - agent EDR zainstalowany na urz\u0105dzeniu stale rejestruje aktywno\u015b\u0107 proces\u00f3w, sieci i u\u017cytkownik\u00f3w.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Detekcja<\/strong> - silnik analityczny identyfikuje anomalie i zagro\u017cenia w czasie rzeczywistym.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Reakcja automatyczna<\/strong> - izolacja urz\u0105dzenia, zatrzymanie procesu lub cofni\u0119cie zmian bez udzia\u0142u cz\u0142owieka.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><strong>Analiza i remediacja<\/strong> - dedykowany analityk weryfikuje incydent, ustala jego przebieg i wdra\u017ca dzia\u0142ania naprawcze.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-29d9534 e-con-full e-flex e-con e-child\" data-id=\"29d9534\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ee71eb elementor-widget elementor-widget-image\" data-id=\"0ee71eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/close-up-of-electronic-circuit-board-2026-01-05-00-57-48-utc-1024x683.jpg\" class=\"attachment-large size-large wp-image-201\" alt=\"\" srcset=\"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/close-up-of-electronic-circuit-board-2026-01-05-00-57-48-utc-1024x683.jpg 1024w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/close-up-of-electronic-circuit-board-2026-01-05-00-57-48-utc-300x200.jpg 300w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/close-up-of-electronic-circuit-board-2026-01-05-00-57-48-utc-768x512.jpg 768w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/close-up-of-electronic-circuit-board-2026-01-05-00-57-48-utc-1536x1024.jpg 1536w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/close-up-of-electronic-circuit-board-2026-01-05-00-57-48-utc-2048x1365.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-948c3ff e-flex e-con-boxed e-con e-parent\" data-id=\"948c3ff\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ffbf9cb elementor-widget elementor-widget-heading\" data-id=\"ffbf9cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Poznaj pozosta\u0142e nasze us\u0142ugi<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ebcfbb6 e-flex e-con-boxed e-con e-parent\" data-id=\"ebcfbb6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-74dbc5c9 e-con-full e-flex e-con e-child\" data-id=\"74dbc5c9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74719b4 elementor-widget elementor-widget-image\" data-id=\"74719b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/03\/focused-employees-working-in-modern-coworking-spac-2026-01-09-10-29-35-utc-300x200.jpg\" class=\"attachment-medium size-medium wp-image-628\" alt=\"\" srcset=\"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/03\/focused-employees-working-in-modern-coworking-spac-2026-01-09-10-29-35-utc-300x200.jpg 300w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/03\/focused-employees-working-in-modern-coworking-spac-2026-01-09-10-29-35-utc-1024x683.jpg 1024w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/03\/focused-employees-working-in-modern-coworking-spac-2026-01-09-10-29-35-utc-768x512.jpg 768w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/03\/focused-employees-working-in-modern-coworking-spac-2026-01-09-10-29-35-utc-1536x1024.jpg 1536w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/03\/focused-employees-working-in-modern-coworking-spac-2026-01-09-10-29-35-utc-2048x1365.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-522979e e-con-full e-flex e-con e-child\" data-id=\"522979e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c698884 elementor-widget elementor-widget-heading\" data-id=\"c698884\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Potrzebujesz nie tylko narz\u0119dzia, <span style=\"color:#292929\">ale&nbsp;i&nbsp;ekspert\u00f3w za nim stoj\u0105cych?<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4160d35 elementor-widget elementor-widget-text-editor\" data-id=\"4160d35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>SIEM daje wiedz\u0119 \u2013 ale kto\u015b musi dzia\u0142a\u0107 na jej podstawie. Nasz Wirtualny Zesp\u00f3\u0142 Bezpiecze\u0144stwa przejmuje pe\u0142n\u0105 odpowiedzialno\u015b\u0107 za monitorowanie, analiz\u0119 i reagowanie na incydenty, dostarczaj\u0105c kompetencje ca\u0142ego dzia\u0142u bezpiecze\u0144stwa bez koszt\u00f3w jego budowania.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7f929b elementor-widget elementor-widget-button\" data-id=\"d7f929b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Poznaj zasady<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-30a09e9 e-flex e-con-boxed e-con e-parent\" data-id=\"30a09e9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2109f14 e-con-full e-flex e-con e-child\" data-id=\"2109f14\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-24f8a83 elementor-widget elementor-widget-image\" data-id=\"24f8a83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/female-architects-explain-building-model-and-inter-2026-01-08-07-28-34-utc-300x169.jpg\" class=\"attachment-medium size-medium wp-image-154\" alt=\"\" srcset=\"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/female-architects-explain-building-model-and-inter-2026-01-08-07-28-34-utc-300x169.jpg 300w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/female-architects-explain-building-model-and-inter-2026-01-08-07-28-34-utc-1024x576.jpg 1024w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/female-architects-explain-building-model-and-inter-2026-01-08-07-28-34-utc-768x432.jpg 768w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/female-architects-explain-building-model-and-inter-2026-01-08-07-28-34-utc-1536x864.jpg 1536w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/female-architects-explain-building-model-and-inter-2026-01-08-07-28-34-utc-2048x1152.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6adb18b e-con-full e-flex e-con e-child\" data-id=\"6adb18b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2685878 elementor-widget elementor-widget-heading\" data-id=\"2685878\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">DLP - Data Loss Prevention<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1807d3c elementor-widget elementor-widget-text-editor\" data-id=\"1807d3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"container\"><div id=\"model-response-message-contentr_634c87a704509aa4\" class=\"markdown markdown-main-panel stronger enable-updated-hr-color\" dir=\"ltr\" aria-live=\"polite\" aria-busy=\"false\">Nie pozw\u00f3l, aby najcenniejszy zas\u00f3b Twojej firmy sta\u0142 si\u0119 jej najwi\u0119kszym zagro\u017ceniem \u2013 zabezpiecz dane, zanim trafi\u0105 w niepowo\u0142ane r\u0119ce. Nasze rozwi\u0105zanie <b data-path-to-node=\"0\" data-index-in-node=\"156\">DLP (Data Loss Prevention)<\/b> to inteligentna tarcza, kt\u00f3ra identyfikuje i kontroluje przep\u0142yw poufnych informacji wsz\u0119dzie tam, gdzie one pracuj\u0105: od lokalnych stacji roboczych po chmur\u0119. Uniknij parali\u017cuj\u0105cych strat finansowych i wizerunkowych, zyskuj\u0105c pe\u0142n\u0105 kontrol\u0119 nad dokumentami finansowymi, danymi klient\u00f3w i w\u0142asno\u015bci\u0105 intelektualn\u0105.<\/div><div dir=\"ltr\" aria-live=\"polite\" aria-busy=\"false\">\u00a0<\/div><div class=\"markdown markdown-main-panel stronger enable-updated-hr-color\" dir=\"ltr\" aria-live=\"polite\" aria-busy=\"false\">Z DLP nie tylko chronisz cyfrowe aktywa, ale przede wszystkim budujesz fundament trwa\u0142ego zaufania w \u015bwiecie pe\u0142nym cyberzagro\u017ce\u0144.<\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe372d0 elementor-widget elementor-widget-button\" data-id=\"fe372d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/www.knoxtera.com\/?page_id=654\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Przejd\u017a do DLP<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f09443 e-flex e-con-boxed e-con e-parent\" data-id=\"1f09443\" data-element_type=\"container\" data-e-type=\"container\" id=\"edr-from\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ff09b87 e-con-full e-flex e-con e-child\" data-id=\"ff09b87\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-34b9923 e-con-full e-flex e-con e-child\" data-id=\"34b9923\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8d0ce2 elementor-widget elementor-widget-image\" data-id=\"e8d0ce2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"364\" height=\"667\" src=\"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/kontakt.png\" class=\"attachment-medium_large size-medium_large wp-image-289\" alt=\"\" srcset=\"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/kontakt.png 364w, https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/kontakt-164x300.png 164w\" sizes=\"(max-width: 364px) 100vw, 364px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc400af e-con-full e-flex e-con e-child\" data-id=\"dc400af\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22aa358 elementor-widget elementor-widget-heading\" data-id=\"22aa358\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Chcesz wiedzie\u0107, czy Twoje urz\u0105dzenia s\u0105 naprawd\u0119 chronione?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ced7d36 elementor-widget elementor-widget-text-editor\" data-id=\"ced7d36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Porozmawiaj z naszymi ekspertami i sprawd\u017a, jak EDR mo\u017ce wzmocni\u0107 ochron\u0119 endpoint\u00f3w w Twojej organizacji.\u00a0<\/p><p><strong><span class=\"font-semibold\" data-streamdown=\"strong\">Um\u00f3w bezp\u0142atn\u0105 konsultacj\u0119 z naszym ekspertem. Odpowiemy w ci\u0105gu 24 godzin.<\/span><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7262cfc elementor-button-align-stretch elementor-widget elementor-widget-global elementor-global-584 elementor-widget-form\" data-id=\"7262cfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Nast\\u0119pny&quot;,&quot;step_previous_label&quot;:&quot;Poprzedni&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Nowy formularz\" aria-label=\"Nowy formularz\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"641\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"7262cfc\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Strong security Smooth operations\" \/>\n\n\t\t\t\n\t\t\t<div class=\"ele-extensions-hide-form elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tImi\u0119 i nazwisko\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Imi\u0119 i nazwisko\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tE-mail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"E-mail\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tWiadomo\u015b\u0107\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"4\" placeholder=\"Wiadomo\u015b\u0107\" required=\"required\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Wy\u015blij<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Zaawansowana ochrona urz\u0105dze\u0144 ko\u0144cowych &#8211; wykryj i zneutralizuj zagro\u017cenie, zanim si\u0119 rozprzestrzeni EDR (Endpoint Detection &amp; Response) \u2013 real-time monitoring, analiza behawioralna i b\u0142yskawiczna reakcja na zagro\u017cenia na ka\u017cdym urz\u0105dzeniu w Twojej organizacji. Tradycyjny antywirus wykrywa to, co ju\u017c zna. Cyberprzest\u0119pcy wiedz\u0105 o tym doskonale \u2013 dlatego coraz cz\u0119\u015bciej stosuj\u0105 techniki, kt\u00f3re go omijaj\u0105. EDR [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":389,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-641","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>EDR - Endpoint Detection &amp; Response - Strong security Smooth operations<\/title>\n<meta name=\"description\" content=\"EDR wykrywa zaawansowane zagro\u017cenia na urz\u0105dzeniach ko\u0144cowych w czasie rzeczywistym - w tym ransomware i ataki zero-day.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.knoxtera.com\/en\/cybersecurity-services\/edr-endpoint-detection-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EDR - Endpoint Detection &amp; Response\" \/>\n<meta property=\"og:description\" content=\"EDR wykrywa zaawansowane zagro\u017cenia na urz\u0105dzeniach ko\u0144cowych w czasie rzeczywistym - w tym ransomware i ataki zero-day.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.knoxtera.com\/en\/cybersecurity-services\/edr-endpoint-detection-response\/\" \/>\n<meta property=\"og:site_name\" content=\"Strong security Smooth operations\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-27T12:22:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/businesspeople-working-together-with-abstract-digi-2026-01-11-08-41-01-utc-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.knoxtera.com\\\/uslugi-cyberbezpieczenstwa\\\/edr-endpoint-detection-response\\\/\",\"url\":\"https:\\\/\\\/www.knoxtera.com\\\/uslugi-cyberbezpieczenstwa\\\/edr-endpoint-detection-response\\\/\",\"name\":\"EDR - Endpoint Detection &amp; Response - Strong security Smooth operations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knoxtera.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.knoxtera.com\\\/uslugi-cyberbezpieczenstwa\\\/edr-endpoint-detection-response\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.knoxtera.com\\\/uslugi-cyberbezpieczenstwa\\\/edr-endpoint-detection-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.knoxtera.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/businesspeople-working-together-with-abstract-digi-2026-01-11-08-41-01-utc-1024x512.jpg\",\"datePublished\":\"2026-03-10T10:38:24+00:00\",\"dateModified\":\"2026-04-27T12:22:43+00:00\",\"description\":\"EDR wykrywa zaawansowane zagro\u017cenia na urz\u0105dzeniach ko\u0144cowych w czasie rzeczywistym - w tym ransomware i ataki zero-day.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.knoxtera.com\\\/uslugi-cyberbezpieczenstwa\\\/edr-endpoint-detection-response\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.knoxtera.com\\\/uslugi-cyberbezpieczenstwa\\\/edr-endpoint-detection-response\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.knoxtera.com\\\/uslugi-cyberbezpieczenstwa\\\/edr-endpoint-detection-response\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.knoxtera.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/businesspeople-working-together-with-abstract-digi-2026-01-11-08-41-01-utc-1024x512.jpg\",\"contentUrl\":\"https:\\\/\\\/www.knoxtera.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/businesspeople-working-together-with-abstract-digi-2026-01-11-08-41-01-utc-1024x512.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.knoxtera.com\\\/uslugi-cyberbezpieczenstwa\\\/edr-endpoint-detection-response\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/www.knoxtera.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produkty\",\"item\":\"https:\\\/\\\/www.knoxtera.com\\\/uslugi-cyberbezpieczenstwa\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"EDR &#8211; Endpoint Detection &amp; Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.knoxtera.com\\\/#website\",\"url\":\"https:\\\/\\\/www.knoxtera.com\\\/\",\"name\":\"Strong security Smooth operations\",\"description\":\"Strong security Smooth operations\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.knoxtera.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.knoxtera.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.knoxtera.com\\\/#organization\",\"name\":\"Strong security Smooth operations\",\"url\":\"https:\\\/\\\/www.knoxtera.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.knoxtera.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.knoxtera.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/konxtera_logo_www.png\",\"contentUrl\":\"https:\\\/\\\/www.knoxtera.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/konxtera_logo_www.png\",\"width\":83,\"height\":110,\"caption\":\"Strong security Smooth operations\"},\"image\":{\"@id\":\"https:\\\/\\\/www.knoxtera.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"EDR - Endpoint Detection &amp; Response - Strong security Smooth operations","description":"EDR detects advanced endpoint threats in real time, including ransomware and zero-day attacks, and enables immediate response before they spread.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.knoxtera.com\/en\/cybersecurity-services\/edr-endpoint-detection-response\/","og_locale":"en_GB","og_type":"article","og_title":"EDR - Endpoint Detection &amp; Response","og_description":"EDR wykrywa zaawansowane zagro\u017cenia na urz\u0105dzeniach ko\u0144cowych w czasie rzeczywistym - w tym ransomware i ataki zero-day.","og_url":"https:\/\/www.knoxtera.com\/en\/cybersecurity-services\/edr-endpoint-detection-response\/","og_site_name":"Strong security Smooth operations","article_modified_time":"2026-04-27T12:22:43+00:00","og_image":[{"width":2560,"height":1280,"url":"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/businesspeople-working-together-with-abstract-digi-2026-01-11-08-41-01-utc-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.knoxtera.com\/uslugi-cyberbezpieczenstwa\/edr-endpoint-detection-response\/","url":"https:\/\/www.knoxtera.com\/uslugi-cyberbezpieczenstwa\/edr-endpoint-detection-response\/","name":"EDR - Endpoint Detection &amp; Response - Strong security Smooth operations","isPartOf":{"@id":"https:\/\/www.knoxtera.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.knoxtera.com\/uslugi-cyberbezpieczenstwa\/edr-endpoint-detection-response\/#primaryimage"},"image":{"@id":"https:\/\/www.knoxtera.com\/uslugi-cyberbezpieczenstwa\/edr-endpoint-detection-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/businesspeople-working-together-with-abstract-digi-2026-01-11-08-41-01-utc-1024x512.jpg","datePublished":"2026-03-10T10:38:24+00:00","dateModified":"2026-04-27T12:22:43+00:00","description":"EDR detects advanced endpoint threats in real time, including ransomware and zero-day attacks, and enables immediate response before they spread.","breadcrumb":{"@id":"https:\/\/www.knoxtera.com\/uslugi-cyberbezpieczenstwa\/edr-endpoint-detection-response\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.knoxtera.com\/uslugi-cyberbezpieczenstwa\/edr-endpoint-detection-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.knoxtera.com\/uslugi-cyberbezpieczenstwa\/edr-endpoint-detection-response\/#primaryimage","url":"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/businesspeople-working-together-with-abstract-digi-2026-01-11-08-41-01-utc-1024x512.jpg","contentUrl":"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/businesspeople-working-together-with-abstract-digi-2026-01-11-08-41-01-utc-1024x512.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.knoxtera.com\/uslugi-cyberbezpieczenstwa\/edr-endpoint-detection-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.knoxtera.com\/"},{"@type":"ListItem","position":2,"name":"Produkty","item":"https:\/\/www.knoxtera.com\/uslugi-cyberbezpieczenstwa\/"},{"@type":"ListItem","position":3,"name":"EDR &#8211; Endpoint Detection &amp; Response"}]},{"@type":"WebSite","@id":"https:\/\/www.knoxtera.com\/#website","url":"https:\/\/www.knoxtera.com\/","name":"Strong security Smooth operations","description":"Strong security Smooth operations","publisher":{"@id":"https:\/\/www.knoxtera.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.knoxtera.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.knoxtera.com\/#organization","name":"Strong security Smooth operations","url":"https:\/\/www.knoxtera.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.knoxtera.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/konxtera_logo_www.png","contentUrl":"https:\/\/www.knoxtera.com\/wp-content\/uploads\/2026\/02\/konxtera_logo_www.png","width":83,"height":110,"caption":"Strong security Smooth operations"},"image":{"@id":"https:\/\/www.knoxtera.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.knoxtera.com\/en\/wp-json\/wp\/v2\/pages\/641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.knoxtera.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.knoxtera.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.knoxtera.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.knoxtera.com\/en\/wp-json\/wp\/v2\/comments?post=641"}],"version-history":[{"count":29,"href":"https:\/\/www.knoxtera.com\/en\/wp-json\/wp\/v2\/pages\/641\/revisions"}],"predecessor-version":[{"id":1755,"href":"https:\/\/www.knoxtera.com\/en\/wp-json\/wp\/v2\/pages\/641\/revisions\/1755"}],"up":[{"embeddable":true,"href":"https:\/\/www.knoxtera.com\/en\/wp-json\/wp\/v2\/pages\/389"}],"wp:attachment":[{"href":"https:\/\/www.knoxtera.com\/en\/wp-json\/wp\/v2\/media?parent=641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}