{"id":2450,"date":"2017-08-11T00:26:45","date_gmt":"2017-08-11T00:26:45","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/"},"modified":"2019-05-29T12:19:26","modified_gmt":"2019-05-29T12:19:26","slug":"eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/","title":{"rendered":"ESET Endpoint Security \u2013 \u043f\u044f\u0442\u044c \u0437\u0432\u0435\u0437\u0434 \u0438\u0437 \u043f\u044f\u0442\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0445"},"content":{"rendered":"<p>\u0423\u0433\u0440\u043e\u0437\u044b \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u043e \u0440\u0430\u0437\u0432\u0438\u0432\u0430\u044e\u0442\u0441\u044f, \u0442\u0430\u043a \u0447\u0442\u043e \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0434\u043e\u043b\u0436\u043d\u0430 \u043d\u0435 \u0441\u0442\u043e\u044f\u0442\u044c \u043d\u0430 \u043c\u0435\u0441\u0442\u0435.&nbsp; \u041d\u0430 \u0441\u0435\u0433\u043e\u0434\u043d\u044f\u0448\u043d\u0438\u0439 \u0434\u0435\u043d\u044c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f\u043c \u043d\u0443\u0436\u043d\u044b \u0440\u0435\u0448\u0435\u043d\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u043e\u0442\u0438\u0432\u043e\u0441\u0442\u043e\u044f\u0442\u044c \u0446\u0435\u043b\u0435\u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u043c \u0438 \u043a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u044b\u043c \u043c\u0435\u0442\u043e\u0434\u0430\u043c, \u043c\u043e\u0431\u0438\u043b\u0438\u0437\u0443\u0435\u043c\u044b\u043c \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438, \u0435\u0441\u043b\u0438 \u043e\u043d\u0438 \u0445\u043e\u0442\u044f\u0442 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0442\u0438\u0442\u044c \u0432\u0435\u0441\u044c\u043c\u0430 \u0440\u0435\u0430\u043b\u044c\u043d\u0443\u044e \u043f\u0435\u0440\u0441\u043f\u0435\u043a\u0442\u0438\u0432\u0443 \u043f\u0430\u0441\u0442\u044c \u0436\u0435\u0440\u0442\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u0430\u043d\u043d\u044b\u0445.<\/p>\n<p>\u0425\u043e\u0442\u044f \u043c\u043d\u043e\u0433\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u0437\u0430\u043d\u0438\u043c\u0430\u044e\u0449\u0438\u0435\u0441\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439, \u0437\u0430\u044f\u0432\u043b\u044f\u044e\u0442, \u0447\u0442\u043e \u043e\u043d\u0438 \u043c\u043e\u0433\u0443\u0442 \u0441\u043f\u0440\u0430\u0432\u0438\u0442\u044c\u0441\u044f \u0441 \u0438\u0437\u043c\u0435\u043d\u0447\u0438\u0432\u044b\u043c \u00ab\u043b\u0430\u043d\u0434\u0448\u0430\u0444\u0442\u043e\u043c\u00bb \u0443\u0433\u0440\u043e\u0437, \u0432\u0435\u0441\u044c\u043c\u0430 \u043d\u0435\u043c\u043d\u043e\u0433\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0440\u0430\u0437\u0432\u0438\u0432\u0430\u043b\u0438 \u043f\u0440\u043e\u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0435, \u043c\u043d\u043e\u0433\u043e\u0441\u043b\u043e\u0439\u043d\u044b\u0435 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0438 \u0437\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044e\u044e \u0447\u0435\u0442\u0432\u0435\u0440\u0442\u044c \u0432\u0435\u043a\u0430.<\/p>\n<p>\u041e\u0434\u043d\u0430\u043a\u043e \u043c\u044b, \u0432 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 ESET, \u043a\u043e\u043c\u0431\u0438\u043d\u0438\u0440\u0443\u0435\u043c \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0438\u044e \u0438 \u0447\u0435\u043b\u043e\u0432\u0435\u0447\u0435\u0441\u043a\u0438\u0435 \u0437\u043d\u0430\u043d\u0438\u044f, \u043e\u0441\u043d\u043e\u0432\u044b\u0432\u0430\u044f\u0441\u044c \u043d\u0430 \u0431\u043e\u043b\u0435\u0435 \u0447\u0435\u043c 25 \u0433\u043e\u0434\u0430\u0445 \u043e\u043f\u044b\u0442\u0430 \u0438\u0437\u0443\u0447\u0435\u043d\u0438\u044f \u0443\u0433\u0440\u043e\u0437, \u0447\u0442\u043e\u0431\u044b \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0430\u0442\u044c \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u044b, \u0432\u044b\u0437\u044b\u0432\u0430\u0435\u043c\u044b\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430\u043c\u0438, \u043d\u0430 \u0441\u0430\u043c\u044b\u0445 \u0440\u0430\u0437\u043d\u044b\u0445 \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u0445 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430\u0445. \u041d\u0430\u0448\u0430 \u043f\u0440\u043e\u0430\u043a\u0442\u0438\u0432\u043d\u0430\u044f \u0438 \u0438\u043d\u0442\u0435\u043b\u043b\u0435\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0430\u044f \u043c\u043d\u043e\u0433\u043e\u0441\u043b\u043e\u0439\u043d\u0430\u044f \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u044f \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u0435\u0442 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f\u043c \u0432\u0441\u0435\u0445 \u0440\u0430\u0437\u043c\u0435\u0440\u043e\u0432 \u0434\u0443\u0448\u0435\u0432\u043d\u043e\u0435 \u0441\u043f\u043e\u043a\u043e\u0439\u0441\u0442\u0432\u0438\u0435 \u2013 \u0437\u0430\u0432\u0435\u0440\u044f\u044f \u0438\u0445, \u0447\u0442\u043e \u0430\u0442\u0430\u043a\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0430\u044f \u0438\u0445 \u0432 \u0442\u043e\u0442 \u043c\u043e\u043c\u0435\u043d\u0442, \u043a\u043e\u0433\u0434\u0430 \u0430\u0442\u0430\u043a\u0438 \u043d\u0435\u043c\u0438\u043d\u0443\u0435\u043c\u044b.<\/p>\n<p><strong>\u041f\u044f\u0442\u0438\u0437\u0432\u0435\u0437\u0434\u043e\u0447\u043d\u044b\u0439 \u0440\u0435\u0439\u0442\u0438\u043d\u0433<\/strong><\/p>\n<p>\u041e\u0442\u0440\u0430\u0441\u043b\u0435\u0432\u044b\u0435 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u0442\u0435\u043f\u0435\u0440\u044c \u0442\u043e\u0436\u0435 \u043f\u0440\u0438\u0437\u043d\u0430\u043b\u0438 ESET \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043f\u0440\u043e\u0432\u0430\u0439\u0434\u0435\u0440\u0430 \u043f\u0435\u0440\u0432\u043e\u043a\u043b\u0430\u0441\u0441\u043d\u044b\u0445 \u0440\u0435\u0448\u0435\u043d\u0438\u0439 \u0432 \u0441\u0444\u0435\u0440\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043f\u0440\u0438 \u0442\u043e\u043c \u0447\u0442\u043e \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441 <a href=\"https:\/\/www.eset.com\/us\/business\/endpoint-security\/\">ESET Endpoint Security<\/a>&nbsp;\u043d\u0435\u0434\u0430\u0432\u043d\u043e \u0443\u0434\u043e\u0441\u0442\u043e\u0438\u043b\u0441\u044f \u043f\u044f\u0442\u0438 \u0437\u0432\u0435\u0437\u0434 \u0438\u0437 \u043f\u044f\u0442\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0445 \u0432 \u043a\u0430\u0436\u0434\u043e\u0439 \u0438\u0437 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0439 \u043f\u043e\u0441\u043b\u0435 \u043e\u0431\u0437\u043e\u0440\u0430 \u0436\u0443\u0440\u043d\u0430\u043b\u0430 <a href=\"https:\/\/www.scmagazine.com\/eset-endpoint-security\/review\/9386\/\">SC Magazine<\/a>.<\/p>\n<p>\u041e\u0446\u0435\u043d\u0438\u0432 \u0432\u0441\u0451 \u2013 \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u043e\u0442 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043a \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430, \u0435\u0433\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0438 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438 \u0438 \u0437\u0430\u043a\u0430\u043d\u0447\u0438\u0432\u0430\u044f \u0435\u0433\u043e \u0441\u0442\u043e\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u0432 \u0434\u0435\u043d\u0435\u0436\u043d\u043e\u043c \u0432\u044b\u0440\u0430\u0436\u0435\u043d\u0438\u0438 \u0438 \u043b\u0435\u0433\u043a\u043e\u0441\u0442\u044c\u044e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f, \u0436\u0443\u0440\u043d\u0430\u043b <em>SC Magazine<\/em> \u043f\u043e\u0445\u0432\u0430\u043b\u0438\u043b \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441 ESET Endpoint Security \u0437\u0430 \u0442\u043e\u0447\u043d\u043e\u0441\u0442\u044c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f, \u0441\u043a\u043e\u0440\u043e\u0441\u0442\u044c \u0438 \u0438\u0441\u0447\u0435\u0440\u043f\u044b\u0432\u0430\u044e\u0449\u0438\u0439 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u0440\u0438\u0439 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0435\u0433\u043e \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c\u044e.<\/p>\n<p><strong>\u041f\u043e \u0432\u0441\u0435\u043c \u043f\u0443\u043d\u043a\u0442\u0430\u043c<\/strong><\/p>\n<p>\u0414\u043b\u044f \u043b\u044e\u0431\u043e\u0439 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u0430 \u0432 \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u043c\u0430\u043b\u043e\u0433\u043e \u0438 \u0441\u0440\u0435\u0434\u043d\u0435\u0433\u043e \u0431\u0438\u0437\u043d\u0435\u0441\u0430, \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u0430\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430 \u0434\u043e\u043b\u0436\u043d\u0430 \u0432\u044b\u0437\u044b\u0432\u0430\u0442\u044c \u043c\u0438\u043d\u0438\u043c\u0430\u043b\u044c\u043d\u043e\u0435 \u0432\u043c\u0435\u0448\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u043e \u0432 \u043a\u043e\u043c\u043c\u0435\u0440\u0447\u0435\u0441\u043a\u0438\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0434\u043e\u043b\u0436\u043d\u0430 \u0431\u044b\u0442\u044c \u043f\u0440\u043e\u0441\u0442\u043e\u0439 \u0432\u043e \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0438 \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438. \u0412 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u0430 ESET Endpoint Security \u0430\u0432\u0442\u043e\u0440\u044b \u043e\u0431\u0437\u043e\u0440\u0430 \u0441\u043a\u0430\u0437\u0430\u043b\u0438, \u0447\u0442\u043e \u00ab\u043d\u0430\u0431\u043e\u0440 \u043c\u0435\u043d\u044e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u2013 \u0441\u0430\u043c\u044b\u0439 \u0438\u0441\u0447\u0435\u0440\u043f\u044b\u0432\u0430\u044e\u0449\u0438\u0439 \u0438\u0437 \u0432\u0441\u0435\u0445, \u043a\u0430\u043a\u0438\u0435 \u043c\u044b \u043a\u043e\u0433\u0434\u0430-\u043b\u0438\u0431\u043e \u0432\u0438\u0434\u0435\u043b\u0438. \u041c\u044b \u043d\u0435 \u043d\u0430\u0448\u043b\u0438 \u043d\u0438 \u043e\u0434\u043d\u043e\u0433\u043e \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0433\u043e \u0430\u0441\u043f\u0435\u043a\u0442\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u043c\u0430\u0448\u0438\u043d\u044b, \u043f\u043e\u043b\u0438\u0442\u0438\u043a\u0438 \u0438\u043b\u0438 \u0438\u043d\u043e\u0433\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f. \u0412\u044b \u043c\u043e\u0436\u0435\u0442\u0435 \u0434\u0435\u043b\u0430\u0442\u044c \u0432\u0441\u0451 \u2013 \u043e\u0442 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0434\u043e \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 \u2013 \u043f\u0440\u044f\u043c\u043e \u0438\u0437 \u043e\u0434\u043d\u043e\u0433\u043e \u043d\u0430\u0431\u043e\u0440\u0430 \u043c\u0435\u043d\u044e\u00bb.<\/p>\n<p>\u0411\u043e\u043b\u0435\u0435 \u0442\u043e\u0433\u043e, \u0432\u0441\u0451 \u0442\u043e, \u0447\u0442\u043e \u0430\u0432\u0442\u043e\u0440\u044b \u043e\u0431\u0437\u043e\u0440\u0430 \u0432 \u0436\u0443\u0440\u043d\u0430\u043b\u0435 <em>SC Magazine<\/em> \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u043b\u0438 \u043a \u043d\u0430\u0448\u0435\u043c\u0443 \u0440\u0435\u0448\u0435\u043d\u0438\u044e, \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u043b\u043e \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u0443 ESET Endpoint Security \u043f\u0440\u043e\u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0432\u043e\u044e \u043f\u0440\u0438\u0441\u043f\u043e\u0441\u043e\u0431\u043b\u044f\u0435\u043c\u043e\u0441\u0442\u044c \u0438 \u043a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u043e\u0441\u0442\u044c. \u041d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0432\u0441\u0435 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u0441\u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0444\u0430\u0439\u043b, \u0438\u043d\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0432\u0438\u0440\u0443\u0441\u043e\u043c-\u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u043c <a href=\"https:\/\/www.welivesecurity.com\/2016\/04\/04\/analysis-of-the-locky-infection-process\/\">Locky<\/a>, \u0431\u044b\u043b\u0438 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u044b, \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441 ESET \u043e\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u043b \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0443, \u043f\u0440\u0435\u0436\u0434\u0435 \u0447\u0435\u043c \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0449\u0438\u043a\u0438 \u0437\u0430\u043a\u043e\u043d\u0447\u0438\u043b\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u043f\u0435\u0440\u0435\u043d\u043e\u0441\u0430 \u0434\u0430\u043d\u043d\u044b\u0445.<\/p>\n<p>\u0412 \u044d\u0442\u043e\u043c \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u0436\u0443\u0440\u043d\u0430\u043b <em>SC Magazine<\/em> \u043e\u0442\u043c\u0435\u0442\u0438\u043b \u0440\u0435\u0448\u0435\u043d\u0438\u0435 ESET Endpoint Security \u043a\u0430\u043a \u00ab\u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0435 \u043f\u043e\u043a\u043e\u043b\u0435\u043d\u0438\u0435 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043e\u0432, \u0443\u0432\u044f\u0437\u0430\u043d\u043d\u043e\u0435 \u0441 \u043c\u0430\u0448\u0438\u043d\u043d\u044b\u043c \u043e\u0431\u0443\u0447\u0435\u043d\u0438\u0435\u043c \u0438 \u0443\u0441\u0438\u043b\u0435\u043d\u043d\u043e\u0435 \u0436\u0438\u0432\u044b\u043c\u0438 \u0430\u043d\u0430\u043b\u0438\u0442\u0438\u043a\u0430\u043c\u0438, \u0447\u0442\u043e\u0431\u044b \u043f\u043e\u043a\u0440\u044b\u0432\u0430\u0442\u044c \u0441\u043e\u0431\u044b\u0442\u0438\u044f \u0432 \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u0445 \u0443\u0437\u043b\u0430\u0445, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u043d\u0435 \u043c\u043e\u0436\u0435\u0442 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043a\u0430\u043a \u043f\u043e\u043b\u043e\u0436\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435\u00bb.<\/p>\n<p>\u00ab\u0422\u043e, \u0447\u0442\u043e \u043e\u0442\u0440\u0430\u0441\u043b\u0435\u0432\u044b\u0435 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043d\u0430\u0433\u0440\u0430\u0434\u0438\u043b\u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441 ESET Endpoint Security \u043f\u044f\u0442\u044c\u044e \u0437\u0432\u0435\u0437\u0434\u0430\u043c\u0438 \u0438\u0437 \u043f\u044f\u0442\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0445, \u0441\u0432\u0438\u0434\u0435\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0443\u0435\u0442 \u043e \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0442\u043e\u0439 \u043f\u0440\u043e\u0434\u0443\u043a\u0446\u0438\u0438, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043c\u044b \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u0435\u043c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u043c \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u043d\u0430 \u0448\u0430\u0433 \u043e\u043f\u0435\u0440\u0435\u0436\u0430\u0442\u044c \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u043e\u0432\u00bb, \u2013 \u0441\u043a\u0430\u0437\u0430\u043b \u041c\u0438\u0445\u0430\u043b \u042f\u043d\u043a\u0435\u0447, \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440 \u043f\u043e \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u044b\u043c \u0431\u0438\u0437\u043d\u0435\u0441-\u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u043c. \u2013 \u00ab\u041c\u044b \u0433\u043e\u0440\u0434\u0438\u043c\u0441\u044f \u0442\u0435\u043c, \u0447\u0442\u043e \u043d\u0430\u043c\u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0438\u043d\u0442\u0435\u0433\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435, \u043a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u044e\u0442 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0438\u0441\u0447\u0435\u0440\u043f\u044b\u0432\u0430\u044e\u0449\u0438\u0439 \u043d\u0430\u0431\u043e\u0440 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0435\u0439 \u0434\u043b\u044f \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f, \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0443\u0433\u0440\u043e\u0437, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043d\u0430 \u043d\u0438\u0445 \u2013 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u044f \u0432\u0435\u0441\u044c \u0430\u0440\u0441\u0435\u043d\u0430\u043b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f\u043c \u043f\u0440\u0438\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c \u0441\u0435\u0439\u0447\u0430\u0441 \u0438 \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0438\u043c \u043f\u0440\u0438\u0434\u0435\u0442\u0441\u044f \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c \u0432 \u0431\u0443\u0434\u0443\u0449\u0435\u043c\u00bb.<\/p>\n<p>\u0427\u0442\u043e\u0431\u044b \u043f\u0440\u043e\u0447\u0435\u0441\u0442\u044c \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u043e\u0431\u0437\u043e\u0440 \u0432 \u0436\u0443\u0440\u043d\u0430\u043b\u0435 <em>SC Magazine<\/em>, \u043f\u043e\u0436\u0430\u043b\u0443\u0439\u0441\u0442\u0430, <a href=\"https:\/\/www.scmagazine.com\/eset-endpoint-security\/review\/9386\/\">\u043d\u0430\u0436\u043c\u0438\u0442\u0435 \u0441\u044e\u0434\u0430<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0423\u0433\u0440\u043e\u0437\u044b \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u043e \u0440\u0430\u0437\u0432\u0438\u0432\u0430\u044e\u0442\u0441\u044f, \u0442\u0430\u043a \u0447\u0442\u043e \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0434\u043e\u043b\u0436\u043d\u0430 \u043d\u0435 \u0441\u0442\u043e\u044f\u0442\u044c \u043d\u0430 \u043c\u0435\u0441\u0442\u0435.&nbsp; \u041d\u0430 \u0441\u0435\u0433\u043e\u0434\u043d\u044f\u0448\u043d\u0438\u0439 \u0434\u0435\u043d\u044c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f\u043c \u043d\u0443\u0436\u043d\u044b \u0440\u0435\u0448\u0435\u043d\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u043e\u0442\u0438\u0432\u043e\u0441\u0442\u043e\u044f\u0442\u044c \u0446\u0435\u043b\u0435\u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u043c \u0438 \u043a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u044b\u043c \u043c\u0435\u0442\u043e\u0434\u0430\u043c, \u043c\u043e\u0431\u0438\u043b\u0438\u0437\u0443\u0435\u043c\u044b\u043c \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438, \u0435\u0441\u043b\u0438 \u043e\u043d\u0438 \u0445\u043e\u0442\u044f\u0442 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0442\u0438\u0442\u044c \u0432\u0435\u0441\u044c\u043c\u0430 \u0440\u0435\u0430\u043b\u044c\u043d\u0443\u044e \u043f\u0435\u0440\u0441\u043f\u0435\u043a\u0442\u0438\u0432\u0443 \u043f\u0430\u0441\u0442\u044c \u0436\u0435\u0440\u0442\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u0430\u043d\u043d\u044b\u0445. \u0425\u043e\u0442\u044f \u043c\u043d\u043e\u0433\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u0437\u0430\u043d\u0438\u043c\u0430\u044e\u0449\u0438\u0435\u0441\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439, \u0437\u0430\u044f\u0432\u043b\u044f\u044e\u0442, \u0447\u0442\u043e \u043e\u043d\u0438 \u043c\u043e\u0433\u0443\u0442 \u0441\u043f\u0440\u0430\u0432\u0438\u0442\u044c\u0441\u044f \u0441 \u0438\u0437\u043c\u0435\u043d\u0447\u0438\u0432\u044b\u043c \u00ab\u043b\u0430\u043d\u0434\u0448\u0430\u0444\u0442\u043e\u043c\u00bb \u0443\u0433\u0440\u043e\u0437, \u0432\u0435\u0441\u044c\u043c\u0430<\/p>\n","protected":false},"author":5,"featured_media":2190,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[222,211],"tags":[],"class_list":["post-2450","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-222","category-news-ru"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ESET Endpoint Security \u2013 \u043f\u044f\u0442\u044c \u0437\u0432\u0435\u0437\u0434 \u0438\u0437 \u043f\u044f\u0442\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0445 - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/\" \/>\n<meta property=\"og:locale\" content=\"ru_RU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ESET Endpoint Security \u2013 \u043f\u044f\u0442\u044c \u0437\u0432\u0435\u0437\u0434 \u0438\u0437 \u043f\u044f\u0442\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0445\" \/>\n<meta property=\"og:description\" content=\"\u0423\u0433\u0440\u043e\u0437\u044b \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u043e \u0440\u0430\u0437\u0432\u0438\u0432\u0430\u044e\u0442\u0441\u044f, \u0442\u0430\u043a \u0447\u0442\u043e \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0434\u043e\u043b\u0436\u043d\u0430 \u043d\u0435 \u0441\u0442\u043e\u044f\u0442\u044c \u043d\u0430 \u043c\u0435\u0441\u0442\u0435.&nbsp; \u041d\u0430 \u0441\u0435\u0433\u043e\u0434\u043d\u044f\u0448\u043d\u0438\u0439 \u0434\u0435\u043d\u044c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f\u043c \u043d\u0443\u0436\u043d\u044b \u0440\u0435\u0448\u0435\u043d\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u043e\u0442\u0438\u0432\u043e\u0441\u0442\u043e\u044f\u0442\u044c \u0446\u0435\u043b\u0435\u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u043c \u0438 \u043a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u044b\u043c \u043c\u0435\u0442\u043e\u0434\u0430\u043c, \u043c\u043e\u0431\u0438\u043b\u0438\u0437\u0443\u0435\u043c\u044b\u043c \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438, \u0435\u0441\u043b\u0438 \u043e\u043d\u0438 \u0445\u043e\u0442\u044f\u0442 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0442\u0438\u0442\u044c \u0432\u0435\u0441\u044c\u043c\u0430 \u0440\u0435\u0430\u043b\u044c\u043d\u0443\u044e \u043f\u0435\u0440\u0441\u043f\u0435\u043a\u0442\u0438\u0432\u0443 \u043f\u0430\u0441\u0442\u044c \u0436\u0435\u0440\u0442\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u0430\u043d\u043d\u044b\u0445. \u0425\u043e\u0442\u044f \u043c\u043d\u043e\u0433\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u0437\u0430\u043d\u0438\u043c\u0430\u044e\u0449\u0438\u0435\u0441\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439, \u0437\u0430\u044f\u0432\u043b\u044f\u044e\u0442, \u0447\u0442\u043e \u043e\u043d\u0438 \u043c\u043e\u0433\u0443\u0442 \u0441\u043f\u0440\u0430\u0432\u0438\u0442\u044c\u0441\u044f \u0441 \u0438\u0437\u043c\u0435\u043d\u0447\u0438\u0432\u044b\u043c \u00ab\u043b\u0430\u043d\u0434\u0448\u0430\u0444\u0442\u043e\u043c\u00bb \u0443\u0433\u0440\u043e\u0437, \u0432\u0435\u0441\u044c\u043c\u0430\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-11T00:26:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:19:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/sc.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"262\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u041d\u0430\u043f\u0438\u0441\u0430\u043d\u043e \u0430\u0432\u0442\u043e\u0440\u043e\u043c\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/2017\\\/08\\\/11\\\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/2017\\\/08\\\/11\\\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"ESET Endpoint Security \u2013 \u043f\u044f\u0442\u044c \u0437\u0432\u0435\u0437\u0434 \u0438\u0437 \u043f\u044f\u0442\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0445\",\"datePublished\":\"2017-08-11T00:26:45+00:00\",\"dateModified\":\"2019-05-29T12:19:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/2017\\\/08\\\/11\\\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\\\/\"},\"wordCount\":470,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/2017\\\/08\\\/11\\\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/sc.jpg\",\"articleSection\":[\"\u043c\u0430\u043b\u044b\u0439 \u0431\u0438\u0437\u043d\u0435\u0441\",\"\u043d\u043e\u0432\u043e\u0441\u0442\u0438\"],\"inLanguage\":\"ru-RU\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/2017\\\/08\\\/11\\\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/2017\\\/08\\\/11\\\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\\\/\",\"name\":\"ESET Endpoint Security \u2013 \u043f\u044f\u0442\u044c \u0437\u0432\u0435\u0437\u0434 \u0438\u0437 \u043f\u044f\u0442\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0445 - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/2017\\\/08\\\/11\\\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/2017\\\/08\\\/11\\\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/sc.jpg\",\"datePublished\":\"2017-08-11T00:26:45+00:00\",\"dateModified\":\"2019-05-29T12:19:26+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/2017\\\/08\\\/11\\\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\\\/#breadcrumb\"},\"inLanguage\":\"ru-RU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/2017\\\/08\\\/11\\\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ru-RU\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/2017\\\/08\\\/11\\\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/sc.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/sc.jpg\",\"width\":250,\"height\":262},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/2017\\\/08\\\/11\\\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ESET Endpoint Security \u2013 \u043f\u044f\u0442\u044c \u0437\u0432\u0435\u0437\u0434 \u0438\u0437 \u043f\u044f\u0442\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0445\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ru-RU\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"ru-RU\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/ru\\\/2017\\\/08\\\/11\\\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ESET Endpoint Security \u2013 \u043f\u044f\u0442\u044c \u0437\u0432\u0435\u0437\u0434 \u0438\u0437 \u043f\u044f\u0442\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0445 - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/","og_locale":"ru_RU","og_type":"article","og_title":"ESET Endpoint Security \u2013 \u043f\u044f\u0442\u044c \u0437\u0432\u0435\u0437\u0434 \u0438\u0437 \u043f\u044f\u0442\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0445","og_description":"\u0423\u0433\u0440\u043e\u0437\u044b \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u043e \u0440\u0430\u0437\u0432\u0438\u0432\u0430\u044e\u0442\u0441\u044f, \u0442\u0430\u043a \u0447\u0442\u043e \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0434\u043e\u043b\u0436\u043d\u0430 \u043d\u0435 \u0441\u0442\u043e\u044f\u0442\u044c \u043d\u0430 \u043c\u0435\u0441\u0442\u0435.&nbsp; \u041d\u0430 \u0441\u0435\u0433\u043e\u0434\u043d\u044f\u0448\u043d\u0438\u0439 \u0434\u0435\u043d\u044c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f\u043c \u043d\u0443\u0436\u043d\u044b \u0440\u0435\u0448\u0435\u043d\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u043e\u0442\u0438\u0432\u043e\u0441\u0442\u043e\u044f\u0442\u044c \u0446\u0435\u043b\u0435\u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u043c \u0438 \u043a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u044b\u043c \u043c\u0435\u0442\u043e\u0434\u0430\u043c, \u043c\u043e\u0431\u0438\u043b\u0438\u0437\u0443\u0435\u043c\u044b\u043c \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438, \u0435\u0441\u043b\u0438 \u043e\u043d\u0438 \u0445\u043e\u0442\u044f\u0442 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0442\u0438\u0442\u044c \u0432\u0435\u0441\u044c\u043c\u0430 \u0440\u0435\u0430\u043b\u044c\u043d\u0443\u044e \u043f\u0435\u0440\u0441\u043f\u0435\u043a\u0442\u0438\u0432\u0443 \u043f\u0430\u0441\u0442\u044c \u0436\u0435\u0440\u0442\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u0430\u043d\u043d\u044b\u0445. \u0425\u043e\u0442\u044f \u043c\u043d\u043e\u0433\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u0437\u0430\u043d\u0438\u043c\u0430\u044e\u0449\u0438\u0435\u0441\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439, \u0437\u0430\u044f\u0432\u043b\u044f\u044e\u0442, \u0447\u0442\u043e \u043e\u043d\u0438 \u043c\u043e\u0433\u0443\u0442 \u0441\u043f\u0440\u0430\u0432\u0438\u0442\u044c\u0441\u044f \u0441 \u0438\u0437\u043c\u0435\u043d\u0447\u0438\u0432\u044b\u043c \u00ab\u043b\u0430\u043d\u0434\u0448\u0430\u0444\u0442\u043e\u043c\u00bb \u0443\u0433\u0440\u043e\u0437, \u0432\u0435\u0441\u044c\u043c\u0430","og_url":"https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-08-11T00:26:45+00:00","article_modified_time":"2019-05-29T12:19:26+00:00","og_image":[{"width":250,"height":262,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/sc.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"\u041d\u0430\u043f\u0438\u0441\u0430\u043d\u043e \u0430\u0432\u0442\u043e\u0440\u043e\u043c":"ESET Blog"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/ru\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"ESET Endpoint Security \u2013 \u043f\u044f\u0442\u044c \u0437\u0432\u0435\u0437\u0434 \u0438\u0437 \u043f\u044f\u0442\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0445","datePublished":"2017-08-11T00:26:45+00:00","dateModified":"2019-05-29T12:19:26+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/"},"wordCount":470,"image":{"@id":"https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/sc.jpg","articleSection":["\u043c\u0430\u043b\u044b\u0439 \u0431\u0438\u0437\u043d\u0435\u0441","\u043d\u043e\u0432\u043e\u0441\u0442\u0438"],"inLanguage":"ru-RU","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/","url":"https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/","name":"ESET Endpoint Security \u2013 \u043f\u044f\u0442\u044c \u0437\u0432\u0435\u0437\u0434 \u0438\u0437 \u043f\u044f\u0442\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0445 - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/sc.jpg","datePublished":"2017-08-11T00:26:45+00:00","dateModified":"2019-05-29T12:19:26+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/ru\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/#breadcrumb"},"inLanguage":"ru-RU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/"]}]},{"@type":"ImageObject","inLanguage":"ru-RU","@id":"https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/sc.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/sc.jpg","width":250,"height":262},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/ru\/"},{"@type":"ListItem","position":2,"name":"ESET Endpoint Security \u2013 \u043f\u044f\u0442\u044c \u0437\u0432\u0435\u0437\u0434 \u0438\u0437 \u043f\u044f\u0442\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0445"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/ru\/#website","url":"https:\/\/blog.eset.ee\/et\/ru\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/ru\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ru-RU"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/ru\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/ru\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"ru-RU","@id":"https:\/\/blog.eset.ee\/et\/ru\/2017\/08\/11\/eset-endpoint-security-%d0%bf%d1%8f%d1%82%d1%8c-%d0%b7%d0%b2%d0%b5%d0%b7%d0%b4-%d0%b8%d0%b7-%d0%bf%d1%8f%d1%82%d0%b8-%d0%b2%d0%be%d0%b7%d0%bc%d0%be%d0%b6%d0%bd%d1%8b%d1%85\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/ru\/wp-json\/wp\/v2\/posts\/2450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/ru\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/ru\/wp-json\/wp\/v2\/comments?post=2450"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/ru\/wp-json\/wp\/v2\/posts\/2450\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/ru\/wp-json\/wp\/v2\/media\/2190"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/ru\/wp-json\/wp\/v2\/media?parent=2450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/ru\/wp-json\/wp\/v2\/categories?post=2450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/ru\/wp-json\/wp\/v2\/tags?post=2450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}