{"id":967,"date":"2022-04-19T20:23:17","date_gmt":"2022-04-19T20:23:17","guid":{"rendered":"https:\/\/www.upgreat.pl\/?page_id=967"},"modified":"2023-07-27T11:10:54","modified_gmt":"2023-07-27T11:10:54","slug":"bezpieczenstwo-sieci-i-tresci","status":"publish","type":"page","link":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/","title":{"rendered":"Web and content security systems"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"967\" class=\"elementor elementor-967\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6d2576a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d2576a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cf75c6\" data-id=\"3cf75c6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43c912b elementor-widget elementor-widget-heading\" data-id=\"43c912b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Web and content security systems<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d035f6a elementor-widget elementor-widget-breadcrumbs\" data-id=\"d035f6a\" data-element_type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www.upgreat.pl\/en\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f6bb74d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f6bb74d\" data-element_type=\"section\" id=\"tabs-nav\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b1a5cdf\" data-id=\"b1a5cdf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d085ff9 elementor-widget elementor-widget-heading\" data-id=\"d085ff9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/\">Security of IT systems<\/a><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc45979 elementor-nav-menu--dropdown-none menu-oferta elementor-widget elementor-widget-nav-menu\" data-id=\"bc45979\" data-element_type=\"widget\" data-settings=\"{&quot;layout&quot;:&quot;vertical&quot;,&quot;submenu_icon&quot;:{&quot;value&quot;:&quot;&lt;i class=\\&quot;fas fa-caret-down\\&quot; aria-hidden=\\&quot;true\\&quot;&gt;&lt;\\\/i&gt;&quot;,&quot;library&quot;:&quot;fa-solid&quot;}}\" data-widget_type=\"nav-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<nav aria-label=\"Menu\" class=\"elementor-nav-menu--main elementor-nav-menu__container elementor-nav-menu--layout-vertical e--pointer-background e--animation-fade\">\n\t\t\t\t<ul id=\"menu-1-bc45979\" class=\"elementor-nav-menu sm-vertical\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-964\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/audyty-bezpieczenstwa\/\" class=\"elementor-item\">Security audits<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-985\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/testy-penetracyjne\/\" class=\"elementor-item\">Penetration tests<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-984\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/\" class=\"elementor-item\">Security policies<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-983\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/\" class=\"elementor-item\">Web and content security systems<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-982\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwa-punktow-koncowych\/\" class=\"elementor-item\">Endpoint security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-981\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/\" class=\"elementor-item\">Prevention of leakage<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-980\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/\" class=\"elementor-item\">Risk management<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-979\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/\" class=\"elementor-item\">Physical security<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t\t<nav class=\"elementor-nav-menu--dropdown elementor-nav-menu__container\" aria-hidden=\"true\">\n\t\t\t\t<ul id=\"menu-2-bc45979\" class=\"elementor-nav-menu sm-vertical\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-964\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/audyty-bezpieczenstwa\/\" class=\"elementor-item\" tabindex=\"-1\">Security audits<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-985\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/testy-penetracyjne\/\" class=\"elementor-item\" tabindex=\"-1\">Penetration tests<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-984\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/\" class=\"elementor-item\" tabindex=\"-1\">Security policies<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-983\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/\" class=\"elementor-item\" tabindex=\"-1\">Web and content security systems<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-982\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwa-punktow-koncowych\/\" class=\"elementor-item\" tabindex=\"-1\">Endpoint security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-981\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/\" class=\"elementor-item\" tabindex=\"-1\">Prevention of leakage<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-980\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/\" class=\"elementor-item\" tabindex=\"-1\">Risk management<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-979\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/\" class=\"elementor-item\" tabindex=\"-1\">Physical security<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1abc68b\" data-id=\"1abc68b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-72a0b0c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"72a0b0c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-bc7416d\" data-id=\"bc7416d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bd9932e elementor-widget elementor-widget-text-editor\" data-id=\"bd9932e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The security of the ICT network and the content transmitted through it can be considered the basis for the security of the entire infrastructure, and thus of all business processes. Without a secure network, which is the backbone for all ICT services and the data sent over it, there is no secure organization.\u00a0<\/p><h2>Web and content protection<\/h2><p>To help you in the difficult task of protecting your network and the content sent in it, we offer support in the selection, installation, configuration and administration of the following solutions:<\/p><ul><li>IPS \/ IDS probes (Intrusion Prevention \/ Detection System) - aimed at detecting attacks based on network traffic signatures and appropriate counteraction by blocking malicious traffic<\/li><li>Firewalls and NG Firewalls - for securing and filtering traffic at points of contact with the Internet or at the border of individual network segments, at the level of not only the network and transport layer, but also the application layer<\/li><li>Web gateways and proxy servers - for filtering traffic sent via HTTP, HTTPS and FTP protocols to eliminate threats related to attacks on web browsers<\/li><li>Email and anti-spam gateways - filtering SMTP, POP3 and IMAP protocols to eliminate spam and threats from virus-infected attachments<\/li><li>VPN gateways - ensuring safe access to corporate network resources from the outside<\/li><li>UTM devices - combining various of the above functionalities<\/li><li>SIEM (Security Information and Event Management) systems - aimed at correlating various system events and assessing the related risk<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Network and content security IT systems security The security of the ICT network and the content transmitted via it can be considered the basis for the security of the entire infrastructure and, therefore, of all business processes. Without a secure network, which constitutes the backbone for all ICT services and data transmitted via it, there is no safe organization. Network and content protection [\u2026]<\/p>","protected":false},"author":1,"featured_media":0,"parent":456,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-967","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Bezpiecze\u0144stwo sieci, bezpiecze\u0144stwo danych w sieci | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bezpiecze\u0144stwo sieci, bezpiecze\u0144stwo danych w sieci | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\" \/>\n<meta property=\"og:description\" content=\"Bezpiecze\u0144stwo sieci i tre\u015bci Bezpiecze\u0144stwo System\u00f3w IT Bezpiecze\u0144stwo sieci teleinformatycznej oraz przesy\u0142anych za jej pomoc\u0105 tre\u015bci uzna\u0107 mo\u017cna za podstaw\u0119 bezpiecze\u0144stwa ca\u0142ej infrastruktury, a co za tym idzie wszystkich proces\u00f3w biznesowych. Bez bezpiecznej sieci, kt\u00f3ra stanowi szkielet dla wszystkich us\u0142ug teleinformatycznych i przesy\u0142anych za jej pomoc\u0105 danych nie ma bezpiecznej organizacji.\u00a0 Ochrona sieci i tre\u015bci [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/\" \/>\n<meta property=\"og:site_name\" content=\"Upgreat\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-27T11:10:54+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/\",\"url\":\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/\",\"name\":\"Bezpiecze\u0144stwo sieci, bezpiecze\u0144stwo danych w sieci | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\",\"isPartOf\":{\"@id\":\"https:\/\/www.upgreat.pl\/#website\"},\"datePublished\":\"2022-04-19T20:23:17+00:00\",\"dateModified\":\"2023-07-27T11:10:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.upgreat.pl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bezpiecze\u0144stwo System\u00f3w IT\",\"item\":\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Bezpiecze\u0144stwo sieci i tre\u015bci\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.upgreat.pl\/#website\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"name\":\"Upgreat\",\"description\":\"Bezpiecze\u0144stwo system\u00f3w IT, Outsourcing IT, Architektura system\u00f3w IT\",\"publisher\":{\"@id\":\"https:\/\/www.upgreat.pl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.upgreat.pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.upgreat.pl\/#organization\",\"name\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"contentUrl\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"width\":600,\"height\":220,\"caption\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\"},\"image\":{\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network security, online data security | UpGreat.pl \u2013 professional IT services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/","og_locale":"en_US","og_type":"article","og_title":"Bezpiecze\u0144stwo sieci, bezpiecze\u0144stwo danych w sieci | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne","og_description":"Bezpiecze\u0144stwo sieci i tre\u015bci Bezpiecze\u0144stwo System\u00f3w IT Bezpiecze\u0144stwo sieci teleinformatycznej oraz przesy\u0142anych za jej pomoc\u0105 tre\u015bci uzna\u0107 mo\u017cna za podstaw\u0119 bezpiecze\u0144stwa ca\u0142ej infrastruktury, a co za tym idzie wszystkich proces\u00f3w biznesowych. Bez bezpiecznej sieci, kt\u00f3ra stanowi szkielet dla wszystkich us\u0142ug teleinformatycznych i przesy\u0142anych za jej pomoc\u0105 danych nie ma bezpiecznej organizacji.\u00a0 Ochrona sieci i tre\u015bci [&hellip;]","og_url":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/","og_site_name":"Upgreat","article_modified_time":"2023-07-27T11:10:54+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/","url":"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/","name":"Network security, online data security | UpGreat.pl \u2013 professional IT services","isPartOf":{"@id":"https:\/\/www.upgreat.pl\/#website"},"datePublished":"2022-04-19T20:23:17+00:00","dateModified":"2023-07-27T11:10:54+00:00","breadcrumb":{"@id":"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.upgreat.pl\/"},{"@type":"ListItem","position":2,"name":"Bezpiecze\u0144stwo System\u00f3w IT","item":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/"},{"@type":"ListItem","position":3,"name":"Bezpiecze\u0144stwo sieci i tre\u015bci"}]},{"@type":"WebSite","@id":"https:\/\/www.upgreat.pl\/#website","url":"https:\/\/www.upgreat.pl\/","name":"Upgreat","description":"Security of IT systems, IT Outsourcing, Architecture of IT systems","publisher":{"@id":"https:\/\/www.upgreat.pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.upgreat.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.upgreat.pl\/#organization","name":"UpGreat.pl \u2013 professional IT services","url":"https:\/\/www.upgreat.pl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/","url":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","contentUrl":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","width":600,"height":220,"caption":"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne"},"image":{"@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/comments?post=967"}],"version-history":[{"count":14,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/967\/revisions"}],"predecessor-version":[{"id":1924,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/967\/revisions\/1924"}],"up":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/456"}],"wp:attachment":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/media?parent=967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}