{"id":8076,"date":"2024-02-15T12:58:39","date_gmt":"2024-02-15T11:58:39","guid":{"rendered":"https:\/\/esysco.pl\/?p=8076"},"modified":"2024-02-15T12:58:39","modified_gmt":"2024-02-15T11:58:39","slug":"pki-w-ochronie-iot-i-dla-przedsiebiorstw","status":"publish","type":"post","link":"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/","title":{"rendered":"PKI w ochronie IoT i dla przedsi\u0119biorstw"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-padding-bottom:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-right:10%;--awb-padding-left:10%;--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\"><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:32;line-height:1.1;\"><h1><strong>PKI w ochronie IoT i dla przedsi\u0119biorstw <\/strong><\/h1>\n<h1><strong>&#8211; poznaj r\u00f3\u017cnice<\/strong><\/h1><\/h1><\/div><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"600\" height=\"414\" src=\"https:\/\/edjsgjovgxm.exactdn.com\/wp-content\/uploads\/grafika-3-600x414.jpg?strip=all\" alt class=\"img-responsive wp-image-8079\" srcset=\"https:\/\/edjsgjovgxm.exactdn.com\/wp-content\/uploads\/grafika-3-200x138.jpg?strip=all 200w, https:\/\/edjsgjovgxm.exactdn.com\/wp-content\/uploads\/grafika-3-400x276.jpg?strip=all 400w, https:\/\/edjsgjovgxm.exactdn.com\/wp-content\/uploads\/grafika-3-600x414.jpg?strip=all 600w, https:\/\/edjsgjovgxm.exactdn.com\/wp-content\/uploads\/grafika-3-800x553.jpg?strip=all 800w, https:\/\/edjsgjovgxm.exactdn.com\/wp-content\/uploads\/grafika-3-1200x829.jpg?strip=all 1200w, https:\/\/edjsgjovgxm.exactdn.com\/wp-content\/uploads\/grafika-3.jpg?strip=all 1920w, https:\/\/edjsgjovgxm.exactdn.com\/wp-content\/uploads\/grafika-3.jpg?strip=all&amp;w=1536 1536w, https:\/\/edjsgjovgxm.exactdn.com\/wp-content\/uploads\/grafika-3.jpg?strip=all&amp;w=450 450w\" sizes=\"(max-width: 960px) 100vw, 1200px\" \/><\/span><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:50px;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-1\"><p><span data-contrast=\"auto\">O <\/span><b><span data-contrast=\"auto\">Infrastrukturze Klucza Publicznego (PKI) <\/span><\/b><span data-contrast=\"auto\">pisali\u015bmy ju\u017c w artyku\u0142ach: <\/span><a href=\"https:\/\/esysco.pl\/pl\/news\/jak-wprowadzic-bezpieczne-urzadzenia-iot-na-rynek\/\"><span data-contrast=\"none\">Jak wprowadzi\u0107 bezpieczne urz\u0105dzenia IoT na rynek?<\/span><\/a><span data-contrast=\"auto\"> czy <\/span><span data-contrast=\"none\"><a href=\"https:\/\/esysco.pl\/pl\/news\/wyzwania-dotyczace-bezpieczenstwa-iot\/\">Wyzwania dotycz\u0105ce bezpiecze\u0144stwa IoT<\/a>.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Jednak implementacja PKI w ekosystem biznesowy przedsi\u0119biorstwa r\u00f3\u017cni si\u0119 od tej, w kt\u00f3rej zabezpieczy\u0107 nale\u017cy urz\u0105dzenia IoT na szerok\u0105 skal\u0119. Z dzisiejszego newsa dowiesz si\u0119 na czym te r\u00f3\u017cnice polegaj\u0105. <\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<\/div><div class=\"fusion-text fusion-text-2\"><h2><strong><span class=\"TextRun SCXW25982662 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW25982662 BCX0\">PKI w ochronie <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW25982662 BCX0\">IoT<\/span><span class=\"NormalTextRun SCXW25982662 BCX0\"> i dla bezpiecze\u0144stwa przedsi\u0119biorstw<\/span><\/span><span class=\"EOP SCXW25982662 BCX0\" data-ccp-props=\"{\">\u00a0<\/span><\/strong><\/h2>\n<p><span data-contrast=\"auto\">W obydwu przypadkach podstawy PKI pozostaj\u0105 sp\u00f3jne i dotycz\u0105 m.in. wykorzystania certyfikat\u00f3w cyfrowych od zaufanych urz\u0119d\u00f3w certyfikacji (CA). Jednak wyzwania zwi\u0105zane z dopasowaniem si\u0119 do z\u0142o\u017conych \u0142a\u0144cuch\u00f3w dostaw sprz\u0119tu i cykli \u017cycia urz\u0105dze\u0144 IoT znacznie r\u00f3\u017cni si\u0119 od tych dla organizacji. Poni\u017cej wymienili\u015bmy kilka z nich.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<h3><strong>01 Skalowalno\u015b\u0107 i dost\u0119pno\u015b\u0107<\/strong><\/h3>\n<p><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242232309 BCX0\">I<\/span><span class=\"NormalTextRun SCXW242232309 BCX0\">l<\/span><span class=\"NormalTextRun SCXW242232309 BCX0\">o\u015b\u0107 i szybko\u015b\u0107 wydawania certyfikat\u00f3w <\/span><span class=\"NormalTextRun SCXW242232309 BCX0\">w <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW242232309 BCX0\">IoT<\/span> <span class=\"NormalTextRun SCXW242232309 BCX0\">jest znacznie wy\u017csza <\/span><span class=\"NormalTextRun SCXW242232309 BCX0\">ni\u017c we wdro\u017ceniach korporacyjnych<\/span><span class=\"NormalTextRun SCXW242232309 BCX0\">. <\/span><span class=\"NormalTextRun SCXW242232309 BCX0\">W rezultacie komponenty PKI<\/span> <span class=\"NormalTextRun SCXW242232309 BCX0\">takie jak g\u0142\u00f3wne<\/span><\/span><span class=\"TrackChangeTextDeletionMarker TrackedChange SCXW242232309 BCX0\"><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun TrackChangeTextDeletion SCXW242232309 BCX0\">\u00a0<\/span><\/span><\/span><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242232309 BCX0\">urz\u0119dy<\/span><\/span><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242232309 BCX0\">\u00a0certyfikacji <\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW242232309 BCX0\"><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242232309 BCX0\">(ang. <em>Root CA<\/em> oraz <\/span><\/span><\/span><em><span class=\"TrackChangeTextInsertion TrackedChange SCXW242232309 BCX0\"><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW242232309 BCX0\">Subordinate<\/span><\/span><\/span><\/em><span class=\"TrackChangeTextInsertion TrackedChange SCXW242232309 BCX0\"><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242232309 BCX0\"><em> CA<\/em>) oraz<\/span><\/span><\/span> serwisy <span class=\"TrackChangeTextInsertion TrackedChange SCXW242232309 BCX0\"><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242232309 BCX0\">o<\/span><\/span><\/span><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242232309 BCX0\">dwo\u0142ywania<\/span> <\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW242232309 BCX0\"><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242232309 BCX0\">(ang. <\/span><\/span><\/span><em><span class=\"TrackChangeTextInsertion TrackedChange SCXW242232309 BCX0\"><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW242232309 BCX0\">Revocation<\/span><\/span><\/span><\/em><span class=\"TrackChangeTextInsertion TrackedChange SCXW242232309 BCX0\"><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242232309 BCX0\"><em> Authority<\/em>) i <\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW242232309 BCX0\"><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242232309 BCX0\">walidacji <\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW242232309 BCX0\"><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242232309 BCX0\">(ang. <\/span><\/span><\/span><em><span class=\"TrackChangeTextInsertion TrackedChange SCXW242232309 BCX0\"><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW242232309 BCX0\">Validation<\/span><\/span><\/span> <span class=\"TrackChangeTextInsertion TrackedChange SCXW242232309 BCX0\"><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW242232309 BCX0\">Authority<\/span><\/span><\/span><\/em><span class=\"TrackChangeTextInsertion TrackedChange SCXW242232309 BCX0\"><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242232309 BCX0\">) <\/span><\/span><\/span><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242232309 BCX0\">musz\u0105<\/span><span class=\"NormalTextRun SCXW242232309 BCX0\"> spe\u0142nia\u0107 wysokie poziomy <\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW242232309 BCX0\"><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW242232309 BCX0\">bezpiecze\u0144stwa<\/span><\/span><\/span><span class=\"TrackChangeTextInsertion TrackedChange SCXW242232309 BCX0\"><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242232309 BCX0\">, <\/span><\/span><\/span><span class=\"TextRun SCXW242232309 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW242232309 BCX0\">dost\u0119pno\u015bci i wydajno\u015bci<\/span><span class=\"NormalTextRun SCXW242232309 BCX0\">. Ponadto <\/span><span class=\"NormalTextRun SCXW242232309 BCX0\">ca\u0142y program wymaga hierarchii PKI z odpowiednimi zasadami i silnymi algorytmami.<\/span><\/span><\/p>\n<h3><strong><span class=\"TextRun SCXW61034293 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW61034293 BCX0\">02 Generowanie i przechowywanie <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW61034293 BCX0\">kluczy<\/span><span class=\"NormalTextRun SCXW61034293 BCX0\"> prywatnych<\/span><\/span><\/strong><\/h3>\n<p><span class=\"TextRun SCXW61034293 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW61034293 BCX0\">U<\/span><span class=\"NormalTextRun SCXW61034293 BCX0\">rz\u0105dzenia <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW61034293 BCX0\">IoT<\/span><span class=\"NormalTextRun SCXW61034293 BCX0\"> zazwyczaj znajduj\u0105 si\u0119 w miejscach, kt\u00f3re s\u0105 publicznie dost\u0119pne (w przeciwie\u0144stwie do korporacyjnych serwer\u00f3w internetowych), <\/span><span class=\"NormalTextRun SCXW61034293 BCX0\">dlatego <\/span><span class=\"NormalTextRun SCXW61034293 BCX0\">producenci potrzebuj\u0105 sposobu na ochron\u0119 kluczy prywatnych przechowywanych na tych urz\u0105dzeniach w celu uwierzytelnienia. Zazwyczaj wymaga to generowania kluczy prywatnych w bezpiecznym komponencie sprz\u0119towym, aby nigdy nie zosta\u0142y ujawnione poza urz\u0105dzeniem. Takie podej\u015bcie wymaga wcze\u015bniejszego zdefiniowania wymaga\u0144 bezpiecze\u0144stwa dla wszystkich dostawc\u00f3w w ca\u0142ym procesie projektowania.<\/span><\/span><span class=\"EOP SCXW61034293 BCX0\" data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<h3><strong><span class=\"TextRun SCXW150230484 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW150230484 BCX0\">03 Certyfikaty<\/span><\/span><\/strong><\/h3>\n<p><span class=\"NormalTextRun SCXW150230484 BCX0\">Przestrzeganie odpowiedniej polityki certyfikacyjnej jest w obydwu przypadkach bardzo wa\u017cne, a w kontek\u015bcie <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW150230484 BCX0\">IoT<\/span><span class=\"NormalTextRun SCXW150230484 BCX0\">, bior\u0105c pod uwag\u0119 zr\u00f3\u017cnicowan<\/span><span class=\"NormalTextRun SCXW150230484 BCX0\">ie tego <\/span><span class=\"NormalTextRun SCXW150230484 BCX0\">ekosystem<\/span><span class=\"NormalTextRun SCXW150230484 BCX0\">u staje si\u0119 jeszcze istotniejsze<\/span><span class=\"NormalTextRun SCXW150230484 BCX0\">. <\/span><span class=\"NormalTextRun SCXW150230484 BCX0\">Producenci korzystaj\u0105cy z PKI <\/span><span class=\"NormalTextRun SCXW150230484 BCX0\">w <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW150230484 BCX0\">IoT<\/span><span class=\"NormalTextRun SCXW150230484 BCX0\"> musz\u0105 mie\u0107 bardziej rygorystyczne podej\u015bcie do certyfikacji<\/span><span class=\"NormalTextRun SCXW150230484 BCX0\">, co w rezultacie pomo\u017ce w audytach bezpiecze\u0144stwa i budowaniu zaufania w ca\u0142ym \u0142a\u0144cuchu dostaw <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW150230484 BCX0\">IoT<\/span><span class=\"NormalTextRun SCXW150230484 BCX0\">.<\/span><span class=\"EOP SCXW150230484 BCX0\" style=\"font-size: 16px;\" data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">04 Zarz\u0105dzanie cyklem \u017cycia<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Cykl \u017cycia certyfikatu cyfrowego, kt\u00f3ry znajduje si\u0119 na urz\u0105dzeniu IoT, znacznie r\u00f3\u017cni si\u0119 od certyfikatu cyfrowego u\u017cywanego do zabezpieczenia serwera WWW w PKI przedsi\u0119biorstwa. W przypadku bezpiecze\u0144stwa IoT producenci musz\u0105 zrozumie\u0107, w jaki spos\u00f3b to\u017csamo\u015bci b\u0119d\u0105 dostarczane i aktualizowane w czasie dla danego urz\u0105dzenia oraz wprowadzi\u0107 jasny plan reagowania na wszelkie naruszone certyfikaty lub RoT.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-padding-bottom:20px;--awb-background-color:#f4f6f7;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-right:10%;--awb-padding-left:10%;--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-3\"><p>W ESYSCO wspieramy zar\u00f3wno mi\u0119dzynarodowych przedsi\u0119biorc\u00f3w, jak i producent\u00f3w urz\u0105dze\u0144 IoT we wdra\u017caniu PKI &#8211; Infrastruktury Klucza Publicznego. Jeste\u015bmy pewni, \u017ce ju\u017c wkr\u00f3tce takie rozwi\u0105zanie b\u0119dzie musia\u0142o trafi\u0107 na masow\u0105 skal\u0119 tak\u017ce do polskich firm. Dla sieci rz\u0105dowych i administracji publicznej, np. urz\u0119d\u00f3w skarbowych, PKI to najskuteczniejszy system zabezpiecze\u0144 przed niepowo\u0142anym dost\u0119pem, a ESYSCO oferuje us\u0142ugi wy\u0142\u0105cznie od zaufanych Partner\u00f3w, takich jak <a href=\"https:\/\/www.keyfactor.com\/\">Keyfactor<\/a> czy\u202f<a href=\"https:\/\/www.primekey.com\/\">PrimeKey<\/a>.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-background-position:left top;--awb-border-sizes-top:0px;--awb-border-sizes-bottom:0px;--awb-border-sizes-left:0px;--awb-border-sizes-right:0px;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:20px;--awb-padding-bottom:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-right:10%;--awb-padding-left:10%;--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-4\"><p><span class=\"TextRun SCXW5782956 BCX0\" lang=\"PL-PL\" xml:lang=\"PL-PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW5782956 BCX0\">S<\/span><span class=\"NormalTextRun SCXW5782956 BCX0\">pecjalnie dla Ciebie udost\u0119pniamy <\/span><strong><span class=\"NormalTextRun SCXW5782956 BCX0\">przewodnik po PKI<\/span> <span class=\"NormalTextRun SCXW5782956 BCX0\">bezpo\u015brednio <\/span><span class=\"NormalTextRun SCXW5782956 BCX0\">od <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW5782956 BCX0\">Keyfactor<\/span><\/strong><span class=\"NormalTextRun SCXW5782956 BCX0\"><strong>.<\/strong> D<\/span><span class=\"NormalTextRun SCXW5782956 BCX0\">zi\u0119ki <\/span><span class=\"NormalTextRun SCXW5782956 BCX0\">niemu<\/span><span class=\"NormalTextRun SCXW5782956 BCX0\"> dowiesz si\u0119 jeszcze wi\u0119cej na temat tego kompleksowego rozwi\u0105zania<\/span><span class=\"NormalTextRun SCXW5782956 BCX0\"> &#8211; <\/span><span class=\"NormalTextRun SCXW5782956 BCX0\">zapraszamy do lektury.<\/span><\/span><span class=\"EOP SCXW5782956 BCX0\" data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">A je\u015bli masz do Nas pytania &#8211; napisz na:<\/span><\/b> <strong><a href=\"mailto:connect@esysco.pl\">connect@esysco.pl<\/a> ch\u0119tnie na nie odpowiemy!<\/strong><\/p>\n<\/div><div class=\"fusion-aligncenter\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_margin-top:20px;--button_margin-bottom:20px;\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/esysco.pl\/wp-content\/uploads\/Buyers-Guide_-The-Essential-Guide-to-Evaluating-PKI-Solutions.pdf\"><i class=\"fa-file-pdf fas awb-button__icon awb-button__icon--default button-icon-left\" aria-hidden=\"true\"><\/i><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Pobierz PRZEWODNIK<\/span><\/a><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-button-wrapper\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type fusion-load-more-button\" target=\"_self\" href=\"https:\/\/esysco.pl\/en\/news\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">POWR\u00d3T<\/span><\/a><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bank Millennium wybiera C-View Certificate Management &#8211; skuteczne rozwi\u0105zanie dla Microsoft Active Directory Certificate Services (AD CS). ESYSCO z sukcesem wdra\u017ca rozwi\u0105zanie w jednym z najwi\u0119kszych bank\u00f3w w Polsce.<\/p>\n","protected":false},"author":13,"featured_media":8079,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[14],"tags":[],"class_list":["post-8076","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PKI w ochronie IoT i dla przedsi\u0119biorstw<\/title>\n<meta name=\"description\" content=\"Poznaj r\u00f3\u017cnice mi\u0119dzy zastosowaniem PKI w ochronie urz\u0105dze\u0144 IoT a dla zapewnienia bezpiecze\u0144stwa system\u00f3w korporacyjnych.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PKI w ochronie IoT i dla przedsi\u0119biorstw\" \/>\n<meta property=\"og:description\" content=\"Poznaj r\u00f3\u017cnice mi\u0119dzy zastosowaniem PKI w ochronie urz\u0105dze\u0144 IoT a dla zapewnienia bezpiecze\u0144stwa system\u00f3w korporacyjnych.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/\" \/>\n<meta property=\"og:site_name\" content=\"ESYSCO\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-15T11:58:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/esysco.pl\/wp-content\/uploads\/grafika-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1326\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ewa Kawczynska\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ewa Kawczynska\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/\"},\"author\":{\"name\":\"Ewa Kawczynska\",\"@id\":\"https:\/\/esysco.pl\/en\/#\/schema\/person\/037497b7c786a6f9106ebbc262ebc141\"},\"headline\":\"PKI w ochronie IoT i dla przedsi\u0119biorstw\",\"datePublished\":\"2024-02-15T11:58:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/\"},\"wordCount\":2446,\"image\":{\"@id\":\"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/edjsgjovgxm.exactdn.com\/wp-content\/uploads\/grafika-3.jpg?strip=all\",\"articleSection\":[\"News\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/\",\"url\":\"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/\",\"name\":\"PKI w ochronie IoT i dla przedsi\u0119biorstw\",\"isPartOf\":{\"@id\":\"https:\/\/esysco.pl\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/edjsgjovgxm.exactdn.com\/wp-content\/uploads\/grafika-3.jpg?strip=all\",\"datePublished\":\"2024-02-15T11:58:39+00:00\",\"author\":{\"@id\":\"https:\/\/esysco.pl\/en\/#\/schema\/person\/037497b7c786a6f9106ebbc262ebc141\"},\"description\":\"Poznaj r\u00f3\u017cnice mi\u0119dzy zastosowaniem PKI w ochronie urz\u0105dze\u0144 IoT a dla zapewnienia bezpiecze\u0144stwa system\u00f3w korporacyjnych.\",\"breadcrumb\":{\"@id\":\"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/#primaryimage\",\"url\":\"https:\/\/edjsgjovgxm.exactdn.com\/wp-content\/uploads\/grafika-3.jpg?strip=all\",\"contentUrl\":\"https:\/\/edjsgjovgxm.exactdn.com\/wp-content\/uploads\/grafika-3.jpg?strip=all\",\"width\":1920,\"height\":1326},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/esysco.pl\/pl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PKI w ochronie IoT i dla przedsi\u0119biorstw\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/esysco.pl\/en\/#website\",\"url\":\"https:\/\/esysco.pl\/en\/\",\"name\":\"ESYSCO\",\"description\":\"Solutions for Trusted Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/esysco.pl\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/esysco.pl\/en\/#\/schema\/person\/037497b7c786a6f9106ebbc262ebc141\",\"name\":\"Ewa Kawczynska\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PKI w ochronie IoT i dla przedsi\u0119biorstw","description":"Poznaj r\u00f3\u017cnice mi\u0119dzy zastosowaniem PKI w ochronie urz\u0105dze\u0144 IoT a dla zapewnienia bezpiecze\u0144stwa system\u00f3w korporacyjnych.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/","og_locale":"pl_PL","og_type":"article","og_title":"PKI w ochronie IoT i dla przedsi\u0119biorstw","og_description":"Poznaj r\u00f3\u017cnice mi\u0119dzy zastosowaniem PKI w ochronie urz\u0105dze\u0144 IoT a dla zapewnienia bezpiecze\u0144stwa system\u00f3w korporacyjnych.","og_url":"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/","og_site_name":"ESYSCO","article_published_time":"2024-02-15T11:58:39+00:00","og_image":[{"width":1920,"height":1326,"url":"https:\/\/esysco.pl\/wp-content\/uploads\/grafika-3.jpg","type":"image\/jpeg"}],"author":"Ewa Kawczynska","twitter_card":"summary_large_image","twitter_misc":{"Napisane przez":"Ewa Kawczynska","Szacowany czas czytania":"3 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/#article","isPartOf":{"@id":"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/"},"author":{"name":"Ewa Kawczynska","@id":"https:\/\/esysco.pl\/en\/#\/schema\/person\/037497b7c786a6f9106ebbc262ebc141"},"headline":"PKI w ochronie IoT i dla przedsi\u0119biorstw","datePublished":"2024-02-15T11:58:39+00:00","mainEntityOfPage":{"@id":"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/"},"wordCount":2446,"image":{"@id":"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/#primaryimage"},"thumbnailUrl":"https:\/\/edjsgjovgxm.exactdn.com\/wp-content\/uploads\/grafika-3.jpg?strip=all","articleSection":["News"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/","url":"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/","name":"PKI w ochronie IoT i dla przedsi\u0119biorstw","isPartOf":{"@id":"https:\/\/esysco.pl\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/#primaryimage"},"image":{"@id":"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/#primaryimage"},"thumbnailUrl":"https:\/\/edjsgjovgxm.exactdn.com\/wp-content\/uploads\/grafika-3.jpg?strip=all","datePublished":"2024-02-15T11:58:39+00:00","author":{"@id":"https:\/\/esysco.pl\/en\/#\/schema\/person\/037497b7c786a6f9106ebbc262ebc141"},"description":"Poznaj r\u00f3\u017cnice mi\u0119dzy zastosowaniem PKI w ochronie urz\u0105dze\u0144 IoT a dla zapewnienia bezpiecze\u0144stwa system\u00f3w korporacyjnych.","breadcrumb":{"@id":"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/#primaryimage","url":"https:\/\/edjsgjovgxm.exactdn.com\/wp-content\/uploads\/grafika-3.jpg?strip=all","contentUrl":"https:\/\/edjsgjovgxm.exactdn.com\/wp-content\/uploads\/grafika-3.jpg?strip=all","width":1920,"height":1326},{"@type":"BreadcrumbList","@id":"https:\/\/esysco.pl\/pl\/news\/pki-w-ochronie-iot-i-dla-przedsiebiorstw\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/esysco.pl\/pl\/"},{"@type":"ListItem","position":2,"name":"PKI w ochronie IoT i dla przedsi\u0119biorstw"}]},{"@type":"WebSite","@id":"https:\/\/esysco.pl\/en\/#website","url":"https:\/\/esysco.pl\/en\/","name":"ESYSCO","description":"Solutions for Trusted Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/esysco.pl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Person","@id":"https:\/\/esysco.pl\/en\/#\/schema\/person\/037497b7c786a6f9106ebbc262ebc141","name":"Ewa Kawczynska"}]}},"_links":{"self":[{"href":"https:\/\/esysco.pl\/pl\/wp-json\/wp\/v2\/posts\/8076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/esysco.pl\/pl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/esysco.pl\/pl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/esysco.pl\/pl\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/esysco.pl\/pl\/wp-json\/wp\/v2\/comments?post=8076"}],"version-history":[{"count":26,"href":"https:\/\/esysco.pl\/pl\/wp-json\/wp\/v2\/posts\/8076\/revisions"}],"predecessor-version":[{"id":8115,"href":"https:\/\/esysco.pl\/pl\/wp-json\/wp\/v2\/posts\/8076\/revisions\/8115"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/esysco.pl\/pl\/wp-json\/wp\/v2\/media\/8079"}],"wp:attachment":[{"href":"https:\/\/esysco.pl\/pl\/wp-json\/wp\/v2\/media?parent=8076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/esysco.pl\/pl\/wp-json\/wp\/v2\/categories?post=8076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/esysco.pl\/pl\/wp-json\/wp\/v2\/tags?post=8076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}