{"id":767,"date":"2015-01-16T23:29:16","date_gmt":"2015-01-16T23:29:16","guid":{"rendered":"http:\/\/evosec.eu\/?page_id=767"},"modified":"2017-09-08T01:08:35","modified_gmt":"2017-09-08T01:08:35","slug":"homepage","status":"publish","type":"page","link":"https:\/\/evosec.eu\/pl\/","title":{"rendered":"Zapraszamy!"},"content":{"rendered":"<div class=\"row\">\n<div class=\"col-lg-12\">\n<div class=\"panel panel-default\">\n<div class=\"panel-body\">Jeste\u015bmy firm\u0105 informatyczn\u0105 tech, specjalizuje si\u0119 w dostarczaniu us\u0142ug, rozwi\u0105za\u0144 i niestandardowe produkty dla ma\u0142ych i \u015brednich przedsi\u0119biorstw.Uwa\u017camy, \u017ce ma\u0142ych i \u015brednich firm ma go potrzebuje r\u00f3\u017cni\u0105 si\u0119 od tych, kt\u00f3re wymagaj\u0105 du\u017cych przedsi\u0119biorstw i korporacji. Jeszcze, M\u015aP nadal potrzebuj\u0105 wysoko wykwalifikowanych zasob\u00f3w i dobrze rozwini\u0119tych rozwi\u0105za\u0144 aby m\u00f3c konkurowa\u0107 na dowolnym rynku, zw\u0142aszcza teraz, kiedy praktycznie ka\u017cde przedsi\u0119biorstwo jest przekszta\u0142cenie\/przesuni\u0119cie do digital i napotykaj\u0105 nowy \u015bwiat, nowe korzy\u015bci i wyzwania.<\/p>\n<p>Jednym z naszych cel\u00f3w jest zapewnienie ma\u0142ych i \u015brednich firm z tej samej przewag konkurencyjnych, kt\u00f3re maj\u0105 wi\u0119ksze organizacje.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-xs-12 col-sm-12 col-md-6 col-lg-6\">\n<div class=\"thumbnail\"><a href=\"\/security\/\"><img decoding=\"async\" src=\"\/wp-content\/images\/security.png\" alt=\"Bezpiecze\u0144stwa IT\" \/><\/a><\/p>\n<div class=\"caption\">\n<h1><i class=\"fa fa-shield fa-fw\"><\/i>Bezpiecze\u0144stwa IT<\/h1>\n<p><a class=\"btn btn-primary\" href=\"\/security\/\">Dowiedz si\u0119 wi\u0119cej<\/a><\/div>\n<\/div>\n<\/div>\n<div class=\"col-xs-12 col-sm-12 col-md-6 col-lg-6\">\n<div class=\"thumbnail\"><a href=\"\/operations\/\"><img decoding=\"async\" src=\"\/wp-content\/images\/operations.png\" alt=\"Operacje IT\" \/><\/a><\/p>\n<div class=\"caption\">\n<h1><i class=\"fa fa-heartbeat fa-fw\"><\/i>Operacje IT<\/h1>\n<p><a class=\"btn btn-success\" href=\"\/category\/case-studies\/it-operations\/\">Dowiedz si\u0119 wi\u0119cej<\/a>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-xs-12 col-sm-12 col-md-6 col-lg-6\">\n<div class=\"thumbnail\"><a href=\"\/automation\/\"><img decoding=\"async\" src=\"\/wp-content\/images\/automation.png\" alt=\"Automatyzacja\" \/><\/a><\/p>\n<div class=\"caption\">\n<h1><i class=\"fa fa-cogs fa-fw\"><\/i>Automatyzacja<\/h1>\n<p><a class=\"btn btn-info\" href=\"\/category\/case-studies\/automation\/\">Dowiedz si\u0119 wi\u0119cej<\/a><\/div>\n<\/div>\n<\/div>\n<div class=\"col-xs-12 col-sm-12 col-md-6 col-lg-6\">\n<div class=\"thumbnail\"><a href=\"\/pl\/category\/case-studies\/iot-security\/\"><img decoding=\"async\" src=\"\/wp-content\/images\/iot.png\" alt=\"Urz\u0105dze\u0144 IoT\" \/><\/a><\/p>\n<div class=\"caption\">\n<h1><i class=\"fa fa-wifi fa-fw\"><\/i>Urz\u0105dze\u0144 IoT<\/h1>\n<p><a class=\"btn btn-warning\" href=\"\/pl\/category\/case-studies\/iot-security\/\">Dowiedz si\u0119 wi\u0119cej<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Jeste\u015bmy firm\u0105 informatyczn\u0105 tech, specjalizuje si\u0119 w dostarczaniu us\u0142ug, rozwi\u0105za\u0144 i niestandardowe produkty dla ma\u0142ych i \u015brednich przedsi\u0119biorstw.Uwa\u017camy, \u017ce ma\u0142ych i \u015brednich firm ma go potrzebuje r\u00f3\u017cni\u0105 si\u0119 od tych, kt\u00f3re wymagaj\u0105 du\u017cych przedsi\u0119biorstw i korporacji. Jeszcze, M\u015aP nadal potrzebuj\u0105 wysoko wykwalifikowanych zasob\u00f3w i dobrze rozwini\u0119tych rozwi\u0105za\u0144 aby m\u00f3c konkurowa\u0107 &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-767","page","type-page","status-publish","hentry"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"pl","enabled_languages":["en","da","de","es","fi","fr","it","hu","nl","no","pl","pt","ru","sv"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"da":{"title":true,"content":true,"excerpt":false},"de":{"title":true,"content":true,"excerpt":false},"es":{"title":true,"content":true,"excerpt":false},"fi":{"title":true,"content":true,"excerpt":false},"fr":{"title":true,"content":true,"excerpt":false},"it":{"title":true,"content":true,"excerpt":false},"hu":{"title":true,"content":true,"excerpt":false},"nl":{"title":true,"content":true,"excerpt":false},"no":{"title":true,"content":true,"excerpt":false},"pl":{"title":true,"content":true,"excerpt":false},"pt":{"title":false,"content":false,"excerpt":false},"ru":{"title":true,"content":true,"excerpt":false},"sv":{"title":true,"content":true,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/evosec.eu\/pl\/wp-json\/wp\/v2\/pages\/767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evosec.eu\/pl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/evosec.eu\/pl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/evosec.eu\/pl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/evosec.eu\/pl\/wp-json\/wp\/v2\/comments?post=767"}],"version-history":[{"count":3,"href":"https:\/\/evosec.eu\/pl\/wp-json\/wp\/v2\/pages\/767\/revisions"}],"predecessor-version":[{"id":1159,"href":"https:\/\/evosec.eu\/pl\/wp-json\/wp\/v2\/pages\/767\/revisions\/1159"}],"wp:attachment":[{"href":"https:\/\/evosec.eu\/pl\/wp-json\/wp\/v2\/media?parent=767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}