{"id":3091,"date":"2025-12-09T11:06:29","date_gmt":"2025-12-09T10:06:29","guid":{"rendered":"https:\/\/cyberoperations.hu\/?post_type=product&#038;p=3091"},"modified":"2026-02-04T18:02:06","modified_gmt":"2026-02-04T17:02:06","slug":"ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron","status":"publish","type":"product","link":"https:\/\/cyberoperations.hu\/en\/product\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\/","title":{"rendered":"AI-based cyber infection screening \u2013 Introductory price"},"content":{"rendered":"<div data-elementor-type=\"product-post\" data-elementor-id=\"3091\" class=\"elementor elementor-3091\" data-elementor-post-type=\"product\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e50cb46 e-flex e-con-boxed e-con e-parent\" data-id=\"4e50cb46\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c21c3d9 elementor-widget elementor-widget-video\" data-id=\"c21c3d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;hosted&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-hosted-video elementor-wrapper elementor-open-inline\">\n\t\t\t\t\t<video class=\"elementor-video\" src=\"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/11\/Cyber_Operations_szurovizsgalat.mp4\" autoplay=\"\" controls=\"\" controlslist=\"nodownload\"><\/video>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6554aea8 elementor-widget elementor-widget-text-editor\" data-id=\"6554aea8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"389\" data-end=\"680\">Cyber Operations&#039; AI-based cyber infection screening <strong data-start=\"452\" data-end=\"523\">one of the most accurate methods based on modern deep learning technologies<\/strong>, which quickly detects hidden infections and risk points that traditional antivirus and EDR solutions often miss.<\/p><p data-start=\"682\" data-end=\"915\">This examination penetrates to a level of detail that other technologies cannot even approach, making it particularly valuable for any company where cybersecurity and compliance (e.g. NIS2) are a key strategic objective.<\/p><h2 data-start=\"922\" data-end=\"959\"><strong data-start=\"925\" data-end=\"957\">Introductory price \u2013 now 999 EUR<\/strong><\/h2><p data-start=\"960\" data-end=\"1049\"><em data-start=\"960\" data-end=\"1049\">(List price of the service: <strong>2,000 EUR<\/strong>, which will be applied after the introduction period.)<\/em><\/p><p data-start=\"1051\" data-end=\"1221\">The goal of the discounted price is to make the level of cyber protection that was previously only available in large enterprise environments available to as many organizations as possible.<\/p><h2 data-start=\"1228\" data-end=\"1261\"><strong data-start=\"1231\" data-end=\"1261\">What does the test include?<\/strong><\/h2><ul data-start=\"1263\" data-end=\"1722\"><li data-start=\"1263\" data-end=\"1366\"><p data-start=\"1265\" data-end=\"1366\"><strong data-start=\"1265\" data-end=\"1299\">Deep Learning AI-based analysis<\/strong>, which identifies malicious patterns before they even run<\/p><\/li><li data-start=\"1367\" data-end=\"1417\"><p data-start=\"1369\" data-end=\"1417\">Full due diligence on designated endpoints<\/p><\/li><li data-start=\"1418\" data-end=\"1496\"><p data-start=\"1420\" data-end=\"1496\">Detect real infections and risk elements \u2013 without false alarms<\/p><\/li><li data-start=\"1497\" data-end=\"1588\"><p data-start=\"1499\" data-end=\"1588\"><strong data-start=\"1499\" data-end=\"1529\">Detailed technical report<\/strong>, which presents the results and risk points<\/p><\/li><li data-start=\"1589\" data-end=\"1629\"><p data-start=\"1591\" data-end=\"1629\">Expert recommendations for moving forward<\/p><\/li><li data-start=\"1630\" data-end=\"1722\"><p data-start=\"1632\" data-end=\"1722\">If required, additional layers of protection (e.g. CYBR SHIELD Pro \/ ProMAX) can be recommended<\/p><\/li><\/ul><p data-start=\"1724\" data-end=\"1937\">The investigation <strong data-start=\"1738\" data-end=\"1806\">senior cybersecurity engineers trained in banking and industrial environments<\/strong> supervised by experts with over 20 years of experience in detecting infections and protecting critical infrastructures.<\/p><h2 data-start=\"1944\" data-end=\"1977\"><strong data-start=\"1947\" data-end=\"1977\">Why is it so important?<\/strong><\/h2><p data-start=\"1979\" data-end=\"2076\">Most cyberattacks enter an organization without being detected by traditional tools:<\/p><ul data-start=\"2077\" data-end=\"2239\"><li data-start=\"2077\" data-end=\"2110\"><p data-start=\"2079\" data-end=\"2110\">unknown (zero-day) samples,<\/p><\/li><li data-start=\"2111\" data-end=\"2136\"><p data-start=\"2113\" data-end=\"2136\">targeted threats,<\/p><\/li><li data-start=\"2137\" data-end=\"2171\"><p data-start=\"2139\" data-end=\"2171\">hidden, already active infections,<\/p><\/li><li data-start=\"2172\" data-end=\"2239\"><p data-start=\"2174\" data-end=\"2239\">or lateral movements that do not trigger an alarm.<\/p><\/li><\/ul><p data-start=\"2241\" data-end=\"2411\">Thanks to the Deep Learning-based engine, the investigation <strong data-start=\"2297\" data-end=\"2326\">can also show these<\/strong>, since it is not based on signatures or databases, but on real learning patterns.<\/p><h2 data-start=\"2418\" data-end=\"2440\"><strong data-start=\"2421\" data-end=\"2440\">How does it work?<\/strong><\/h2><ol data-start=\"2442\" data-end=\"2740\"><li data-start=\"2442\" data-end=\"2517\"><p data-start=\"2445\" data-end=\"2517\">Contact us at &quot;\u201e<strong data-start=\"2466\" data-end=\"2497\">Order a screening test<\/strong>\u201dby clicking the \u201d button<\/p><\/li><li data-start=\"2518\" data-end=\"2563\"><p data-start=\"2521\" data-end=\"2563\">Short technical consultation with our expert<\/p><\/li><li data-start=\"2564\" data-end=\"2621\"><p data-start=\"2567\" data-end=\"2621\">Install the scan module on the designated endpoints<\/p><\/li><li data-start=\"2622\" data-end=\"2666\"><p data-start=\"2625\" data-end=\"2666\">Data collection and deep learning-based analysis<\/p><\/li><li data-start=\"2667\" data-end=\"2696\"><p data-start=\"2670\" data-end=\"2696\">Delivery of a detailed report<\/p><\/li><li data-start=\"2697\" data-end=\"2740\"><p data-start=\"2700\" data-end=\"2740\">Expert consultation on the results<\/p><\/li><\/ol><h2 data-start=\"2747\" data-end=\"2783\"><strong data-start=\"2750\" data-end=\"2783\">What happens after purchase?<\/strong><\/h2><p data-start=\"157\" data-end=\"374\">The service is available through the website <strong data-start=\"195\" data-end=\"221\">available for purchase immediately<\/strong>. After the order is recorded automatically <strong data-start=\"263\" data-end=\"288\">confirmation email<\/strong> containing the order details and the next steps in the process.<\/p><p data-start=\"376\" data-end=\"494\">After confirmation <strong data-start=\"403\" data-end=\"476\">Our cybersecurity expert will contact you shortly<\/strong>, to coordinate:<\/p><ul data-start=\"496\" data-end=\"639\"><li data-start=\"496\" data-end=\"532\"><p data-start=\"498\" data-end=\"532\">the technical conditions of the test,<\/p><\/li><li data-start=\"533\" data-end=\"590\"><p data-start=\"535\" data-end=\"590\">preparation of the analysis module to be installed on the endpoints,<\/p><\/li><li data-start=\"591\" data-end=\"639\"><p data-start=\"593\" data-end=\"639\">and the schedule for initiating the investigation.<\/p><\/li><\/ul><p data-start=\"641\" data-end=\"866\">The entire process is coordinated by our experienced engineers, ensuring a smooth, fast and professionally outstanding implementation of the screening test. After the test is completed, we provide a detailed expert report and recommendations.<\/p><h2 data-start=\"186\" data-end=\"209\"><strong data-start=\"189\" data-end=\"209\">Who do we recommend it to?<\/strong><\/h2><p data-start=\"211\" data-end=\"365\">Cybersecurity screening is especially recommended for any organization where cyber security is a business-critical factor. Ideal choice:<\/p><ul data-start=\"367\" data-end=\"1155\"><li data-start=\"367\" data-end=\"469\"><p data-start=\"369\" data-end=\"469\"><strong data-start=\"369\" data-end=\"400\">For medium and large companies<\/strong>, where security incidents pose significant business risk<\/p><\/li><li data-start=\"470\" data-end=\"559\"><p data-start=\"472\" data-end=\"559\"><strong data-start=\"472\" data-end=\"504\">For manufacturers and industrial players<\/strong>, for whom protecting OT systems is a top priority<\/p><\/li><li data-start=\"560\" data-end=\"673\"><p data-start=\"562\" data-end=\"673\"><strong data-start=\"562\" data-end=\"604\">For companies covered by NIS2<\/strong>, where compliance and incident management auditability are expected<\/p><\/li><li data-start=\"674\" data-end=\"809\"><p data-start=\"676\" data-end=\"809\"><strong data-start=\"676\" data-end=\"731\">For companies that have detected suspicious activity<\/strong>, or want to check the true effectiveness of their current level of protection<\/p><\/li><li data-start=\"810\" data-end=\"907\"><p data-start=\"812\" data-end=\"907\"><strong data-start=\"812\" data-end=\"878\">Before introducing new IT systems, service providers or partners<\/strong>, for risk identification purposes<\/p><\/li><li data-start=\"908\" data-end=\"997\"><p data-start=\"910\" data-end=\"997\"><strong data-start=\"910\" data-end=\"960\">Annual or quarterly security review<\/strong> as part of preventive control<\/p><\/li><li data-start=\"998\" data-end=\"1155\"><p data-start=\"1000\" data-end=\"1155\"><strong data-start=\"1000\" data-end=\"1085\">For companies that want to prove themselves to their customers or partners<\/strong>, that cybersecurity and information security are given high priority<\/p><\/li><\/ul><p data-start=\"1157\" data-end=\"1308\">The survey provides a real, measurable picture of the current infection level and provides a reliable basis for further developments or NIS2 preparation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c203a6a elementor-widget elementor-widget-woocommerce-product-price\" data-id=\"c203a6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"woocommerce-product-price.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"price\"><del aria-hidden=\"true\"><span class=\"woocommerce-Price-amount amount\"><bdi>2000&nbsp;<span class=\"woocommerce-Price-currencySymbol\">\u20ac<\/span><\/bdi><\/span><\/del> <span class=\"screen-reader-text\" data-no-translation=\"\" data-trp-gettext=\"\">Original price was: 2000&nbsp;&euro;.<\/span><ins aria-hidden=\"true\"><span class=\"woocommerce-Price-amount amount\"><bdi>999&nbsp;<span class=\"woocommerce-Price-currencySymbol\">\u20ac<\/span><\/bdi><\/span><\/ins><span class=\"screen-reader-text\" data-no-translation=\"\" data-trp-gettext=\"\">Current price is: 999&nbsp;&euro;.<\/span><\/p>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a26d394 e-add-to-cart--show-quantity-yes elementor-widget elementor-widget-woocommerce-product-add-to-cart\" data-id=\"a26d394\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"woocommerce-product-add-to-cart.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-add-to-cart elementor-product-simple\">\n\t\t\t\n\t\n\t<form class=\"cart\" action=\"https:\/\/cyberoperations.hu\/en\/product\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\/\" method=\"post\" enctype='multipart\/form-data' data-trp-original-action=\"https:\/\/cyberoperations.hu\/en\/product\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\/\">\n\t\t\n\t\t<div class=\"quantity\">\n\t\t<label class=\"screen-reader-text\" for=\"quantity_69f23827a44ac\" data-no-translation=\"\" data-trp-gettext=\"\">AI-alap\u00fa kiberfert\u0151z\u00f6tts\u00e9gi sz\u0171r\u0151vizsg\u00e1lat \u2013 Bevezet\u0151 \u00e1ron quantity<\/label>\n\t<input\n\t\ttype=\"number\"\n\t\t\t\tid=\"quantity_69f23827a44ac\"\n\t\tclass=\"input-text qty text\"\n\t\tname=\"quantity\"\n\t\tvalue=\"1\"\n\t\taria-label=\"Product quantity\"\n\t\t\t\tmin=\"1\"\n\t\t\t\t\t\t\tstep=\"1\"\n\t\t\tplaceholder=\"\"\n\t\t\tinputmode=\"numeric\"\n\t\t\tautocomplete=\"off\" data-no-translation-aria-label=\"\"\n\t\t\t\/>\n\t<\/div>\n\n\t\t<button type=\"submit\" name=\"add-to-cart\" value=\"3091\" class=\"single_add_to_cart_button button alt\" data-no-translation=\"\" data-trp-gettext=\"\">Add to basket<\/button>\n\n\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\n\t\n\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bf615d8 e-flex e-con-boxed e-con e-parent\" data-id=\"bf615d8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<h3 data-start=\"139\" data-end=\"205\"><strong data-start=\"143\" data-end=\"205\">AI-based cyber infection screening \u2013 Introductory price<\/strong><\/h3>\n<p data-start=\"207\" data-end=\"429\">Uncover hidden infections and risks in your company with the most advanced Deep Learning technology!<br data-start=\"309\" data-end=\"312\" \/>Fast, accurate, and false-alarm-free analysis that gives you a true picture of the security status of your IT environment.<\/p>\n<p data-start=\"431\" data-end=\"567\"><strong data-start=\"431\" data-end=\"455\">Bevezet\u0151 \u00e1r: 500 EUR<\/strong> <em data-start=\"456\" data-end=\"478\">(lista\u00e1r: 4 000 EUR)<\/em><br data-start=\"478\" data-end=\"481\" \/>Order online and our experts will contact you shortly.<\/p>","protected":false},"featured_media":3218,"template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"product_brand":[],"product_cat":[25],"product_tag":[],"class_list":{"0":"post-3091","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-uncategorized","7":"desktop-align-left","8":"tablet-align-left","9":"mobile-align-left","11":"first","12":"instock","13":"sale","14":"shipping-taxable","15":"purchasable","16":"product-type-simple"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AI-alap\u00fa kiberfert\u0151z\u00f6tts\u00e9gi sz\u0171r\u0151vizsg\u00e1lat \u2013 Bevezet\u0151 \u00e1ron - Cyber Operations Group Kft.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberoperations.hu\/en\/product\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI-alap\u00fa kiberfert\u0151z\u00f6tts\u00e9gi sz\u0171r\u0151vizsg\u00e1lat \u2013 Bevezet\u0151 \u00e1ron\" \/>\n<meta property=\"og:description\" content=\"AI-alap\u00fa kiberfert\u0151z\u00f6tts\u00e9gi sz\u0171r\u0151vizsg\u00e1lat \u2013 Bevezet\u0151 \u00e1ron Der\u00edtse fel v\u00e1llalata rejtett fert\u0151z\u00e9seit \u00e9s kock\u00e1zatait a legfejlettebb Deep Learning technol\u00f3gi\u00e1val!Gyors, pontos \u00e9s t\u00e9ves riaszt\u00e1sokt\u00f3l mentes elemz\u00e9s, amely val\u00f3di k\u00e9pet ad IT-k\u00f6rnyezet\u00e9nek biztons\u00e1gi \u00e1llapot\u00e1r\u00f3l. Bevezet\u0151 \u00e1r: 500 EUR (lista\u00e1r: 4 000 EUR)Rendelje meg online, szak\u00e9rt\u0151ink pedig r\u00f6vid id\u0151n bel\u00fcl felveszik \u00d6nnel a kapcsolatot.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberoperations.hu\/en\/product\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Operations Group Kft.\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-04T17:02:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/11\/blog_kep2-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Price\" \/>\n\t<meta name=\"twitter:data1\" content=\"999&nbsp;&euro;\" \/>\n\t<meta name=\"twitter:label2\" content=\"Availability\" \/>\n\t<meta name=\"twitter:data2\" content=\"In stock\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/termek\\\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/termek\\\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\\\/\",\"name\":\"AI-alap\u00fa kiberfert\u0151z\u00f6tts\u00e9gi sz\u0171r\u0151vizsg\u00e1lat \u2013 Bevezet\u0151 \u00e1ron - Cyber Operations Group Kft.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/termek\\\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/termek\\\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/blog_kep2.png\",\"datePublished\":\"2025-12-09T10:06:29+00:00\",\"dateModified\":\"2026-02-04T17:02:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/termek\\\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberoperations.hu\\\/termek\\\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/termek\\\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/blog_kep2.png\",\"contentUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/blog_kep2.png\",\"width\":2240,\"height\":1260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/termek\\\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Kezd\u0151lap\",\"item\":\"https:\\\/\\\/cyberoperations.hu\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\\\/\\\/cyberoperations.hu\\\/shop\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"AI-alap\u00fa kiberfert\u0151z\u00f6tts\u00e9gi sz\u0171r\u0151vizsg\u00e1lat \u2013 Bevezet\u0151 \u00e1ron\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"name\":\"Cyber Operations Group Kft.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberoperations.hu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\",\"name\":\"Cyber Operations Group Kft.\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"contentUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"width\":1500,\"height\":400,\"caption\":\"Cyber Operations Group Kft.\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<meta property=\"product:price:amount\" content=\"999\" \/>\n<meta property=\"product:price:currency\" content=\"EUR\" \/>\n<meta property=\"og:availability\" content=\"instock\" \/>\n<meta property=\"product:availability\" content=\"instock\" \/>\n<meta property=\"product:condition\" content=\"new\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI-based cyber infection screening \u2013 Introductory price - Cyber Operations Group Kft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberoperations.hu\/en\/product\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\/","og_locale":"en_GB","og_type":"article","og_title":"AI-alap\u00fa kiberfert\u0151z\u00f6tts\u00e9gi sz\u0171r\u0151vizsg\u00e1lat \u2013 Bevezet\u0151 \u00e1ron","og_description":"AI-alap\u00fa kiberfert\u0151z\u00f6tts\u00e9gi sz\u0171r\u0151vizsg\u00e1lat \u2013 Bevezet\u0151 \u00e1ron Der\u00edtse fel v\u00e1llalata rejtett fert\u0151z\u00e9seit \u00e9s kock\u00e1zatait a legfejlettebb Deep Learning technol\u00f3gi\u00e1val!Gyors, pontos \u00e9s t\u00e9ves riaszt\u00e1sokt\u00f3l mentes elemz\u00e9s, amely val\u00f3di k\u00e9pet ad IT-k\u00f6rnyezet\u00e9nek biztons\u00e1gi \u00e1llapot\u00e1r\u00f3l. Bevezet\u0151 \u00e1r: 500 EUR (lista\u00e1r: 4 000 EUR)Rendelje meg online, szak\u00e9rt\u0151ink pedig r\u00f6vid id\u0151n bel\u00fcl felveszik \u00d6nnel a kapcsolatot.","og_url":"https:\/\/cyberoperations.hu\/en\/product\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\/","og_site_name":"Cyber Operations Group Kft.","article_modified_time":"2026-02-04T17:02:06+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/11\/blog_kep2-1024x576.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Price":"999&nbsp;&euro;","Availability":"In stock"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberoperations.hu\/termek\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\/","url":"https:\/\/cyberoperations.hu\/termek\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\/","name":"AI-based cyber infection screening \u2013 Introductory price - Cyber Operations Group Kft.","isPartOf":{"@id":"https:\/\/cyberoperations.hu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberoperations.hu\/termek\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\/#primaryimage"},"image":{"@id":"https:\/\/cyberoperations.hu\/termek\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/11\/blog_kep2.png","datePublished":"2025-12-09T10:06:29+00:00","dateModified":"2026-02-04T17:02:06+00:00","breadcrumb":{"@id":"https:\/\/cyberoperations.hu\/termek\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberoperations.hu\/termek\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cyberoperations.hu\/termek\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\/#primaryimage","url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/11\/blog_kep2.png","contentUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2025\/11\/blog_kep2.png","width":2240,"height":1260},{"@type":"BreadcrumbList","@id":"https:\/\/cyberoperations.hu\/termek\/ai-alapu-kiberfertozottsegi-szurovizsgalat-bevezeto-aron\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Kezd\u0151lap","item":"https:\/\/cyberoperations.hu\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/cyberoperations.hu\/shop\/"},{"@type":"ListItem","position":3,"name":"AI-alap\u00fa kiberfert\u0151z\u00f6tts\u00e9gi sz\u0171r\u0151vizsg\u00e1lat \u2013 Bevezet\u0151 \u00e1ron"}]},{"@type":"WebSite","@id":"https:\/\/cyberoperations.hu\/#website","url":"https:\/\/cyberoperations.hu\/","name":"Cyber Operations Group Ltd.","description":"","publisher":{"@id":"https:\/\/cyberoperations.hu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberoperations.hu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/cyberoperations.hu\/#organization","name":"Cyber Operations Group Ltd.","url":"https:\/\/cyberoperations.hu\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/","url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","contentUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","width":1500,"height":400,"caption":"Cyber Operations Group Kft."},"image":{"@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/"}}]},"product_price_amount":"999","product_price_currency":"EUR","og_availability":"instock","product_availability":"instock","product_condition":"new"},"_links":{"self":[{"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/product\/3091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/types\/product"}],"version-history":[{"count":0,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/product\/3091\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/media\/3218"}],"wp:attachment":[{"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/media?parent=3091"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/product_brand?post=3091"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/product_cat?post=3091"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/cyberoperations.hu\/en\/wp-json\/wp\/v2\/product_tag?post=3091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}