{"id":50019,"date":"2013-02-17T07:00:02","date_gmt":"2013-02-17T05:00:02","guid":{"rendered":"https:\/\/i-hls.com\/2013\/02\/%d7%a4%d7%9c%d7%98%d7%a4%d7%95%d7%a8%d7%9e%d7%aa-%d7%a0%d7%99%d7%98%d7%95%d7%a8-%d7%9c%d7%9e%d7%a2%d7%a8%d7%9b%d7%95%d7%aa-%d7%a1%d7%99%d7%99%d7%91%d7%a8-%d7%95%d7%90%d7%91%d7%98%d7%97%d7%aa-%d7%9e\/"},"modified":"2013-02-17T07:00:02","modified_gmt":"2013-02-17T05:00:02","slug":"%d7%a4%d7%9c%d7%98%d7%a4%d7%95%d7%a8%d7%9e%d7%aa-%d7%a0%d7%99%d7%98%d7%95%d7%a8-%d7%9c%d7%9e%d7%a2%d7%a8%d7%9b%d7%95%d7%aa-%d7%a1%d7%99%d7%99%d7%91%d7%a8-%d7%95%d7%90%d7%91%d7%98%d7%97%d7%aa-%d7%9e","status":"publish","type":"post","link":"https:\/\/i-hls.com\/he\/archives\/50019","title":{"rendered":"\u05e4\u05dc\u05d8\u05e4\u05d5\u05e8\u05de\u05ea \u05e0\u05d9\u05d8\u05d5\u05e8 \u05dc\u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2"},"content":{"rendered":"

\"7101474_s\"<\/a>RSA, \u05d7\u05d8\u05d9\u05d1\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05e9\u05dc EMC Corporation, \u05d4\u05db\u05e8\u05d9\u05d6\u05d4 \u05d4\u05d9\u05d5\u05dd \u05e2\u05dc \u05d4\u05e9\u05e7\u05ea RSA Security Analytics \u2013 \u05e4\u05ea\u05e8\u05d5\u05df \u05e4\u05d5\u05e8\u05e5 \u05d3\u05e8\u05da \u05dc\u05e0\u05d9\u05d8\u05d5\u05e8 \u05d5\u05ea\u05d7\u05e7\u05d5\u05e8 \u05dc\u05e6\u05e8\u05db\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2,\u00a0 \u05d4\u05de\u05d9\u05d5\u05e2\u05d3 \u05dc\u05e1\u05d9\u05d9\u05e2 \u05dc\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05d1\u05d4\u05d2\u05e0\u05d4 \u05e2\u05dc \u05d4\u05e0\u05db\u05e1\u05d9\u05dd \u05d4\u05d3\u05d9\u05d2\u05d9\u05d8\u05dc\u05d9\u05d9\u05dd \u05e9\u05dc\u05d4\u05dd \u05db\u05e0\u05d2\u05d3 \u05d4\u05d0\u05d9\u05d5\u05de\u05d9\u05dd \u05d4\u05e4\u05e0\u05d9\u05de\u05d9\u05d9\u05dd \u05d5\u05d4\u05d7\u05d9\u05e6\u05d5\u05e0\u05d9\u05d9\u05dd \u05d4\u05de\u05ea\u05d5\u05d7\u05db\u05de\u05d9\u05dd \u05d1\u05d9\u05d5\u05ea\u05e8 \u05d4\u05e7\u05d9\u05d9\u05de\u05d9\u05dd \u05db\u05d9\u05d5\u05dd. RSA Security Analytics, \u05d4\u05de\u05d1\u05d5\u05e1\u05e1 \u05e2\u05dc \u05d4\u05d0\u05e8\u05db\u05d9\u05d8\u05e7\u05d8\u05d5\u05e8\u05d4 \u05d4\u05de\u05d5\u05db\u05d7\u05ea \u05e9\u05dc \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05d9\u05ea RSA NetWitness\u00ae, \u05de\u05d0\u05d7\u05d3 \u05d0\u05ea \u05db\u05dc\u05d9 \u05d4- SIEM, Network Forensics \u05d5- Big Data analytics \u05dc\u05e4\u05dc\u05d8\u05e4\u05d5\u05e8\u05de\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05d4\u05de\u05d9\u05d5\u05e2\u05d3\u05ea \u05dc\u05e9\u05de\u05e9 \u05d0\u05d1\u05df \u05e4\u05d9\u05e0\u05d4 \u05dc\u05d3\u05d5\u05e8 \u05d4\u05d1\u05d0 \u05e9\u05dc \u05de\u05e8\u05db\u05d6\u05d9 \u05d4\u05e0\u05d9\u05d8\u05d5\u05e8 \u05d5\u05d4\u05d4\u05e4\u05e2\u05dc\u05d4 \u05e9\u05dc \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2.<\/strong><\/p>\n

\u05db\u05dc \u05ea\u05d5\u05db\u05e0\u05d9\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05e2\u05ea\u05d9\u05e8\u05ea-\u05d1\u05d9\u05e0\u05d4 \u05d7\u05d9\u05d9\u05d1\u05ea \u05dc\u05d4\u05ea\u05d7\u05d9\u05dc \u05e2\u05dd \u05d4\u05d1\u05e0\u05d4 \u05de\u05e7\u05e4\u05ea \u05e9\u05dc \u05d4\u05e1\u05d9\u05db\u05d5\u05e0\u05d9\u05dd \u05d1\u05e4\u05e0\u05d9\u05d4\u05dd \u05e0\u05d9\u05e6\u05d1 \u05d4\u05d0\u05e8\u05d2\u05d5\u05df. \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05d5\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05d4\u05e7\u05d9\u05d9\u05de\u05d5\u05ea, \u05d4\u05db\u05d5\u05dc\u05dc\u05d5\u05ea \u05db\u05dc\u05d9 SIEM, \u05dc\u05e2\u05d9\u05ea\u05d9\u05dd \u05e7\u05e8\u05d5\u05d1\u05d5\u05ea \u05e0\u05db\u05e9\u05dc\u05d5\u05ea \u05d1\u05ea\u05d7\u05d5\u05dd \u05d6\u05d4, \u05db\u05d9\u05d5\u05d5\u05df \u05e9\u05d0\u05d9\u05df \u05d1\u05d9\u05db\u05d5\u05dc\u05ea\u05df \u05dc\u05e1\u05e4\u05e7 \u05e0\u05e7\u05d5\u05d3\u05ea \u05de\u05d1\u05d8 \u05de\u05e2\u05de\u05d9\u05e7\u05d4 \u05de\u05e1\u05e4\u05d9\u05e7 \u05dc\u05ea\u05d5\u05da \u05d4\u05d0\u05d9\u05d5\u05de\u05d9\u05dd \u05e9\u05dc \u05d4\u05d9\u05d5\u05dd, \u05d5\u05dc\u05e2\u05d9\u05ea\u05d9\u05dd \u05e7\u05e8\u05d5\u05d1\u05d5\u05ea \u05d2\u05dd \u05d0\u05d9\u05df \u05d1\u05d9\u05db\u05d5\u05dc\u05ea\u05df \u05dc\u05d4\u05ea\u05de\u05d5\u05d3\u05d3\u00a0 \u05e2\u05dd \u05d4\u05d2\u05d9\u05d3\u05d5\u05dc \u05d1\u05d4\u05d9\u05e7\u05e4\u05d9 \u05d4\u05de\u05d9\u05d3\u05e2 \u05d4\u05de\u05e0\u05d5\u05ea\u05d7 \u05d4\u05de\u05ea\u05d0\u05d9\u05dd \u05dc\u05e6\u05e8\u05db\u05d9\u05dd \u05e9\u05dc \u05d9\u05de\u05d9\u05e0\u05d5.<\/p>\n

\u05e2\u05dc \u05d9\u05d3\u05d9 \u05d0\u05e1\u05e4\u05e7\u05ea \u05e0\u05e7\u05d5\u05d3\u05ea \u05d4\u05de\u05d1\u05d8 \u05d4\u05de\u05e2\u05de\u05d9\u05e7\u05d4 \u05d4\u05e0\u05d3\u05e8\u05e9\u05ea \u05dc\u05de\u05d5\u05de\u05d7\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05e9\u05dc \u05d9\u05de\u05d9\u05e0\u05d5 \u05db\u05d3\u05d9 \u05dc\u05e8\u05d0\u05d5\u05ea \u05d5\u05dc\u05d4\u05d1\u05d9\u05df \u05d0\u05ea \u05e0\u05e7\u05d5\u05d3\u05d5\u05ea \u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d5\u05d4\u05d4\u05ea\u05e7\u05e4\u05d5\u05ea \u05d4\u05e2\u05d9\u05e7\u05e8\u05d9\u05d5\u05ea, RSA Security Analytics \u05ea\u05d5\u05db\u05e0\u05e0\u05d4 \u05dc\u05d0\u05e4\u05e9\u05e8 \u05d2\u05d9\u05dc\u05d5\u05d9 \u05d4\u05e1\u05d9\u05db\u05d5\u05e0\u05d9\u05dd \u05e2\u05dd \u05d4\u05d5\u05e4\u05e2\u05ea\u05dd, \u05d5\u05e2\u05dc \u05d9\u05d3\u05d9 \u05db\u05da \u05dc\u05d4\u05d1\u05d9\u05d0 \u05dc\u05d4\u05e4\u05d7\u05ea\u05d4 \u05de\u05e9\u05de\u05e2\u05d5\u05ea\u05d9\u05ea \u05e9\u05dc \u05d4\u05d6\u05de\u05df \u05d4\u05e0\u05d3\u05e8\u05e9 \u05dc\u05e6\u05e8\u05db\u05d9 \u05ea\u05d7\u05e7\u05d5\u05e8 \u05de\u05d9\u05de\u05d9\u05dd \u05dc\u05d3\u05e7\u05d5\u05ea. \u05d9\u05ea\u05e8 \u05e2\u05dc \u05db\u05df, \u05e2\u05dc \u05d9\u05d3\u05d9 \u05e1\u05d9\u05d5\u05e2 \u05dc\u05de\u05d5\u05de\u05d7\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05d1\u05d4\u05d1\u05e0\u05ea \u05d4\u05e1\u05d9\u05db\u05d5\u05e0\u05d9\u05dd \u05d4\u05d3\u05d9\u05d2\u05d9\u05d8\u05dc\u05d9\u05d9\u05dd \u05de\u05ea\u05d5\u05da \u05d4\u05d0\u05e8\u05d2\u05d5\u05df \u05d5\u05de\u05d7\u05d5\u05e6\u05d4 \u05dc\u05d5, \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05d9\u05db\u05d5\u05dc\u05d9\u05dd \u05dc\u05d4\u05d2\u05df \u05d8\u05d5\u05d1 \u05d9\u05d5\u05ea\u05e8 \u05e2\u05dc \u05e0\u05db\u05e1\u05d9\u05d4\u05dd \u05d4\u05e2\u05e1\u05e7\u05d9\u05d9\u05dd, \u05db\u05d5\u05dc\u05dc \u05de\u05d9\u05d3\u05e2 \u05e7\u05e0\u05d9\u05d9\u05e0\u05d9 \u05d5\u05de\u05d9\u05d3\u05e2 \u05e8\u05d2\u05d9\u05e9 \u05d0\u05d7\u05e8, \u05ea\u05d5\u05da \u05e6\u05de\u05e6\u05d5\u05dd \u05de\u05e9\u05da \u05d4\u05d6\u05de\u05df \u05d4\u05e0\u05d3\u05e8\u05e9 \u05d5\u05d4\u05e2\u05dc\u05d5\u05ea \u05d4\u05db\u05e8\u05d5\u05db\u05d4 \u05d1\u05e0\u05d9\u05d4\u05d5\u05dc \u05d4\u05e1\u05d9\u05db\u05d5\u05e0\u05d9\u05dd \u05d5\u05d3\u05d9\u05d5\u05d5\u05d7 \u05de\u05de\u05d5\u05e7\u05d3-\u05ea\u05d0\u05d9\u05de\u05d5\u05ea (compliance focused reporting ).<\/p>\n

\u05e2\u05de\u05d9\u05ea \u05d9\u05d5\u05e8\u05df, \u05e1\u05d2\u05df \u05e0\u05e9\u05d9\u05d0 \u05d1\u05db\u05d9\u05e8 \u05e9\u05dc RSA, \u05d7\u05d8\u05d9\u05d1\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05e9\u05dc EMC, \u05d0\u05d5\u05de\u05e8: "\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05d7\u05d9\u05d9\u05d1\u05d9\u05dd \u05dc\u05d4\u05ea\u05d2\u05d1\u05e8 \u05e2\u05dc \u05de\u05d2\u05d1\u05dc\u05d5\u05ea \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d4\u05de\u05e1\u05d5\u05e8\u05ea\u05d9\u05ea \u05d5\u05dc\u05d0\u05de\u05e5 \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05d5\u05ea \u05d5\u05e9\u05d9\u05d8\u05d5\u05ea \u05d6\u05e8\u05d9\u05d6\u05d5\u05ea \u05dc\u05d8\u05d9\u05e4\u05d5\u05dc \u05d1\u05d0\u05d9\u05d5\u05de\u05d9\u05dd \u05d4\u05d3\u05d9\u05e0\u05d0\u05de\u05d9\u05d9\u05dd \u05e9\u05dc \u05d4\u05d9\u05d5\u05dd. RSA Security Analytics \u05ea\u05d5\u05db\u05e0\u05e0\u05d4 \u05d1\u05d0\u05d5\u05e4\u05df \u05e4\u05d5\u05e8\u05e5 \u05d3\u05e8\u05da, \u05d4\u05de\u05de\u05e6\u05d9\u05d0 \u05de\u05d7\u05d3\u05e9 \u05d0\u05ea \u05e0\u05d9\u05d8\u05d5\u05e8 \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d5\u05d2\u05d9\u05dc\u05d5\u05d9 \u05d4\u05d0\u05d9\u05d5\u05de\u05d9\u05dd. \u05e2"\u05d9 \u05e9\u05d9\u05dc\u05d5\u05d1 \u05e0\u05e7\u05d5\u05d3\u05ea \u05e8\u05d0\u05d5\u05ea \u05de\u05e9\u05e4\u05d8\u05d9\u05ea \u05d1\u05d0\u05d9\u05db\u05d5\u05ea \u05d2\u05d1\u05d5\u05d4\u05d4 \u05e2\u05dd \u05d0\u05d9\u05e1\u05d5\u05e3 \u05e2\u05ea\u05d9\u05e8 \u05de\u05d9\u05d3\u05e2 \u05dc\u05e6\u05e8\u05db\u05d9 \u05e0\u05d9\u05d4\u05d5\u05dc \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2, \u05d5\u05de\u05d4\u05e4\u05db\u05d4 \u05de\u05dc\u05d0\u05d4 \u05d1\u05d9\u05db\u05d5\u05dc\u05d5\u05ea \u05e0\u05d9\u05ea\u05d5\u05d7 \u05de\u05ea\u05e7\u05d3\u05de\u05d5\u05ea, RSA \u05de\u05e1\u05d9\u05d9\u05e2\u05ea \u05dc\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05dc\u05d4\u05e2\u05dc\u05d5\u05ea \u05d0\u05ea \u05ea\u05d5\u05db\u05e0\u05d9\u05d5\u05ea \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05e9\u05dc\u05d4\u05df \u05d5\u05d0\u05ea \u05de\u05e8\u05db\u05d6\u05d9 \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d4\u05de\u05ea\u05e7\u05d3\u05de\u05d9\u05dd \u05e9\u05dc\u05d4\u05dd \u05dc\u05e8\u05de\u05d4 \u05d7\u05d3\u05e9\u05d4 \u05d5\u05de\u05ea\u05e7\u05d3\u05de\u05ea".<\/p>\n

\u00a0\u05e9\u05d9\u05dc\u05d5\u05d1 \u05e4\u05dc\u05d8\u05e4\u05d5\u05e8\u05de\u05d5\u05ea \u05de\u05d5\u05db\u05d7\u05d5\u05ea \u05e9\u05dc Big Data \u05d5\u05e9\u05d9\u05d8\u05d5\u05ea \u05d0\u05e0\u05dc\u05d9\u05d8\u05d9\u05d5\u05ea \u05d1\u05ea\u05d5\u05da \u05db\u05dc\u05d9 \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05de\u05d0\u05e4\u05e9\u05e8 \u05d4\u05ea\u05e7\u05d3\u05de\u05d5\u05ea \u05de\u05e9\u05de\u05e2\u05d5\u05ea\u05d9\u05ea \u05d1\u05d0\u05d5\u05e4\u05df \u05d1\u05d5 \u05de\u05ea\u05d1\u05e6\u05e2\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2. \u05d1\u05d4\u05ea\u05d0\u05dd \u05dc\u05de\u05d1\u05e0\u05d4 \u05e9\u05dc\u05d4, \u05e4\u05dc\u05d8\u05e4\u05d5\u05e8\u05de\u05ea RSA Security Analytics \u05de\u05e9\u05dc\u05d1\u05ea \u05e8\u05d0\u05d5\u05ea \u05dc\u05dc\u05d0 \u05de\u05ea\u05d7\u05e8\u05d9\u05dd, \u05ea\u05d5\u05da \u05de\u05d9\u05e0\u05d5\u05e3 \u05e9\u05d9\u05d8\u05d5\u05ea \u05e0\u05d9\u05ea\u05d5\u05d7 \u05de\u05ea\u05e7\u05d3\u05de\u05d5\u05ea \u05d5\u05e4\u05dc\u05d8\u05e4\u05d5\u05e8\u05de\u05d5\u05ea Big Data \u05d4\u05de\u05d0\u05e4\u05e9\u05e8\u05d9\u05dd \u05d6\u05d9\u05d4\u05d5\u05d9 \u05e4\u05e2\u05d9\u05dc\u05d5\u05d9\u05d5\u05ea \u05d4\u05de\u05d4\u05d5\u05d5\u05ea \u05e1\u05d9\u05db\u05d5\u05df \u05d2\u05d1\u05d5\u05d4, \u05d4\u05e7\u05dc\u05d4 \u05de\u05e9\u05de\u05e2\u05d5\u05ea\u05d9\u05ea \u05d1\u05e8\u05de\u05ea \u05d4\u05e1\u05d9\u05db\u05d5\u05df \u05d5\u05e2\u05de\u05d9\u05d3\u05d4 \u05d1\u05d9\u05e2\u05d3\u05d9 \u05d4\u05ea\u05d0\u05d9\u05de\u05d5\u05ea.<\/p>\n

\u05dc\u05e4\u05d9 Jon Oltsik, \u05d0\u05e0\u05dc\u05d9\u05e1\u05d8 \u05e8\u05d0\u05e9\u05d9 \u05e9\u05dc \u05e7\u05d1\u05d5\u05e6\u05ea \u05d4\u05d0\u05e1\u05d8\u05e8\u05d8\u05d2\u05d9\u05d4 \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05ea (Enterprise Strategy Group), "\u05ea\u05d7\u05db\u05d5\u05dd \u05d4\u05d4\u05ea\u05e7\u05e4\u05d5\u05ea \u05d4\u05de\u05ea\u05e7\u05d3\u05de\u05d5\u05ea \u05d5\u05ea\u05d5\u05db\u05e0\u05d5\u05ea \u05d4\u05e0\u05d5\u05d6\u05e7\u05d4 (malware) \u05d4\u05e7\u05e9\u05d5\u05e8\u05d5\u05ea \u05d1\u05d4\u05dd \u05d2\u05d3\u05dc\u05d9\u05dd \u05de\u05d9\u05d5\u05dd \u05dc\u05d9\u05d5\u05dd \u05ea\u05d5\u05da \u05d0\u05ea\u05d2\u05d5\u05e8 \u05d4\u05de\u05d2\u05d1\u05dc\u05d5\u05ea \u05e9\u05dc \u05db\u05dc\u05d9 \u05d4\u05e0\u05d9\u05ea\u05d5\u05d7 \u05d4\u05e7\u05d9\u05d9\u05de\u05d9\u05dd \u05d1\u05ea\u05d7\u05d5\u05dd \u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2. \u05ea\u05d5\u05e4\u05e2\u05ea \u05d4-Big Data \u00a0\u05e2\u05e9\u05d5\u05d9\u05d4 \u05dc\u05e1\u05d9\u05d9\u05e2 \u05d1\u05d8\u05d9\u05e4\u05d5\u05dc \u05d1\u05de\u05e6\u05d1 \u05d6\u05d4 \u05e2\u05dc \u05d9\u05d3\u05d9 \u05de\u05d5\u05de\u05d7\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2, \u05ea\u05d5\u05da \u05d4\u05d3\u05d2\u05e9\u05ea \u05d4\u05e6\u05d5\u05e8\u05da \u05e9\u05dc \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05dc\u05d1\u05d7\u05d5\u05df \u05de\u05d7\u05d3\u05e9 \u05d0\u05ea \u05de\u05d2\u05d5\u05d5\u05df \u05d4\u05e4\u05ea\u05e8\u05d5\u05e0\u05d5\u05ea \u05e9\u05dc \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2 \u05d4\u05e0\u05d1\u05d7\u05e8\u05d9\u05dd\u00a0 \u05e2\u05d1\u05d5\u05e8 \u05d4\u05d0\u05e8\u05d2\u05d5\u05df \u05e9\u05dc\u05d4\u05dd. \u05e9\u05d9\u05dc\u05d5\u05d1 \u05d0\u05d1\u05d8\u05d7\u05d4 \u05de\u05d9\u05d3\u05e2 \u05e2\u05ea\u05d9\u05e8\u05ea-\u05d1\u05d9\u05e0\u05d4 \u05e2\u05dd \u05e0\u05d9\u05ea\u05d5\u05d7\u05d9 \u05de\u05d9\u05d3\u05e2 \u05de\u05e1\u05d5\u05d2 Big Data \u05d9\u05d5\u05e6\u05e8 \u05e4\u05d5\u05d8\u05e0\u05e6\u05d9\u05d0\u05dc \u05dc\u05de\u05ea\u05df \u05e1\u05d9\u05d5\u05e2 \u05dc\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05d1\u05e4\u05ea\u05e8\u05d5\u05df \u05d4\u05d1\u05e2\u05d9\u05d5\u05ea \u05d4\u05de\u05d5\u05e8\u05db\u05d1\u05d5\u05ea \u05e9\u05dc \u05d0\u05d9\u05d5\u05de\u05d9\u05dd \u05de\u05ea\u05e7\u05d3\u05de\u05d9\u05dd, \u05d5\u05e2\u05dc \u05d9\u05d3\u05d9 \u05db\u05da \u05de\u05e1\u05e4\u05e7 \u05de\u05e2\u05e0\u05d4 \u05dc\u05d3\u05e8\u05d9\u05e9\u05d4 \u05de\u05e9\u05de\u05e2\u05d5\u05ea\u05d9\u05ea \u05d4\u05e7\u05d9\u05d9\u05de\u05ea \u05db\u05d9\u05d5\u05dd \u05d1\u05e9\u05d5\u05e7 \u05e2\u05d1\u05d5\u05e8 \u05e0\u05d5\u05e9\u05d0 \u05d6\u05d4. "<\/p>\n

\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"

RSA, \u05d7\u05d8\u05d9\u05d1\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05e9\u05dc EMC Corporation, \u05d4\u05db\u05e8\u05d9\u05d6\u05d4 \u05d4\u05d9\u05d5\u05dd \u05e2\u05dc \u05d4\u05e9\u05e7\u05ea RSA Security Analytics \u2013 \u05e4\u05ea\u05e8\u05d5\u05df \u05e4\u05d5\u05e8\u05e5 \u05d3\u05e8\u05da \u05dc\u05e0\u05d9\u05d8\u05d5\u05e8 \u05d5\u05ea\u05d7\u05e7\u05d5\u05e8 \u05dc\u05e6\u05e8\u05db\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2,\u00a0 \u05d4\u05de\u05d9\u05d5\u05e2\u05d3 \u05dc\u05e1\u05d9\u05d9\u05e2 \u05dc\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05d1\u05d4\u05d2\u05e0\u05d4 \u05e2\u05dc \u05d4\u05e0\u05db\u05e1\u05d9\u05dd \u05d4\u05d3\u05d9\u05d2\u05d9\u05d8\u05dc\u05d9\u05d9\u05dd \u05e9\u05dc\u05d4\u05dd \u05db\u05e0\u05d2\u05d3 \u05d4\u05d0\u05d9\u05d5\u05de\u05d9\u05dd \u05d4\u05e4\u05e0\u05d9\u05de\u05d9\u05d9\u05dd \u05d5\u05d4\u05d7\u05d9\u05e6\u05d5\u05e0\u05d9\u05d9\u05dd \u05d4\u05de\u05ea\u05d5\u05d7\u05db\u05de\u05d9\u05dd \u05d1\u05d9\u05d5\u05ea\u05e8 \u05d4\u05e7\u05d9\u05d9\u05de\u05d9\u05dd \u05db\u05d9\u05d5\u05dd. RSA Security Analytics, \u05d4\u05de\u05d1\u05d5\u05e1\u05e1 \u05e2\u05dc \u05d4\u05d0\u05e8\u05db\u05d9\u05d8\u05e7\u05d8\u05d5\u05e8\u05d4 \u05d4\u05de\u05d5\u05db\u05d7\u05ea \u05e9\u05dc \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05d9\u05ea RSA NetWitness\u00ae, \u05de\u05d0\u05d7\u05d3 \u05d0\u05ea \u05db\u05dc\u05d9 \u05d4- SIEM, […]<\/p>\n","protected":false},"author":9,"featured_media":5274,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"tdm_status":"","tdm_grid_status":"","footnotes":""},"categories":[5231,5111],"tags":[],"class_list":{"0":"post-50019","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber_security-2","8":"category-5111"},"acf":[],"yoast_head":"\ni-HLS ISrael Homeland Security RSA Analytics Leverages Big Data<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/i-hls.com\/he\/archives\/50019\" \/>\n<meta property=\"og:locale\" content=\"he_IL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"i-HLS ISrael Homeland Security RSA Analytics Leverages Big Data\" \/>\n<meta property=\"og:description\" content=\"RSA, \u05d7\u05d8\u05d9\u05d1\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05e9\u05dc EMC Corporation, \u05d4\u05db\u05e8\u05d9\u05d6\u05d4 \u05d4\u05d9\u05d5\u05dd \u05e2\u05dc \u05d4\u05e9\u05e7\u05ea RSA Security Analytics \u2013 \u05e4\u05ea\u05e8\u05d5\u05df \u05e4\u05d5\u05e8\u05e5 \u05d3\u05e8\u05da \u05dc\u05e0\u05d9\u05d8\u05d5\u05e8 \u05d5\u05ea\u05d7\u05e7\u05d5\u05e8 \u05dc\u05e6\u05e8\u05db\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2,\u00a0 \u05d4\u05de\u05d9\u05d5\u05e2\u05d3 \u05dc\u05e1\u05d9\u05d9\u05e2 \u05dc\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05d1\u05d4\u05d2\u05e0\u05d4 \u05e2\u05dc \u05d4\u05e0\u05db\u05e1\u05d9\u05dd \u05d4\u05d3\u05d9\u05d2\u05d9\u05d8\u05dc\u05d9\u05d9\u05dd \u05e9\u05dc\u05d4\u05dd \u05db\u05e0\u05d2\u05d3 \u05d4\u05d0\u05d9\u05d5\u05de\u05d9\u05dd \u05d4\u05e4\u05e0\u05d9\u05de\u05d9\u05d9\u05dd \u05d5\u05d4\u05d7\u05d9\u05e6\u05d5\u05e0\u05d9\u05d9\u05dd \u05d4\u05de\u05ea\u05d5\u05d7\u05db\u05de\u05d9\u05dd \u05d1\u05d9\u05d5\u05ea\u05e8 \u05d4\u05e7\u05d9\u05d9\u05de\u05d9\u05dd \u05db\u05d9\u05d5\u05dd. RSA Security Analytics, \u05d4\u05de\u05d1\u05d5\u05e1\u05e1 \u05e2\u05dc \u05d4\u05d0\u05e8\u05db\u05d9\u05d8\u05e7\u05d8\u05d5\u05e8\u05d4 \u05d4\u05de\u05d5\u05db\u05d7\u05ea \u05e9\u05dc \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05d9\u05ea RSA NetWitness\u00ae, \u05de\u05d0\u05d7\u05d3 \u05d0\u05ea \u05db\u05dc\u05d9 \u05d4- SIEM, […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/i-hls.com\/he\/archives\/50019\" \/>\n<meta property=\"og:site_name\" content=\"iHLS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/israelhls\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/israelhls\" \/>\n<meta property=\"article:published_time\" content=\"2013-02-17T05:00:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i-hls.com\/wp-content\/uploads\/2013\/02\/7101474_s.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"264\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iHLS News Desk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ihls1\" \/>\n<meta name=\"twitter:site\" content=\"@ihls1\" \/>\n<meta name=\"twitter:label1\" content=\"\u05e0\u05db\u05ea\u05d1 \u05e2\u05dc \u05d9\u05d3\" \/>\n\t<meta name=\"twitter:data1\" content=\"iHLS News Desk\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/i-hls.com\/he\/archives\/50019#article\",\"isPartOf\":{\"@id\":\"https:\/\/i-hls.com\/he\/archives\/50019\"},\"author\":{\"name\":\"iHLS News Desk\",\"@id\":\"https:\/\/i-hls.com\/he#\/schema\/person\/afe479eb2ba3961f167eab61c6c55021\"},\"headline\":\"\u05e4\u05dc\u05d8\u05e4\u05d5\u05e8\u05de\u05ea \u05e0\u05d9\u05d8\u05d5\u05e8 \u05dc\u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\",\"datePublished\":\"2013-02-17T05:00:02+00:00\",\"dateModified\":\"2013-02-17T05:00:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/i-hls.com\/he\/archives\/50019\"},\"wordCount\":52,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/i-hls.com\/he#organization\"},\"image\":{\"@id\":\"https:\/\/i-hls.com\/he\/archives\/50019#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i-hls.com\/wp-content\/uploads\/2013\/02\/7101474_s.jpg\",\"articleSection\":[\"\u05d0\u05d1\u05d8\u05d7\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8\",\"\u05d7\u05d3\u05e9\u05d5\u05ea\"],\"inLanguage\":\"he-IL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/i-hls.com\/he\/archives\/50019\",\"url\":\"https:\/\/i-hls.com\/he\/archives\/50019\",\"name\":\"i-HLS ISrael Homeland Security RSA Analytics Leverages Big Data\",\"isPartOf\":{\"@id\":\"https:\/\/i-hls.com\/he#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/i-hls.com\/he\/archives\/50019#primaryimage\"},\"image\":{\"@id\":\"https:\/\/i-hls.com\/he\/archives\/50019#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i-hls.com\/wp-content\/uploads\/2013\/02\/7101474_s.jpg\",\"datePublished\":\"2013-02-17T05:00:02+00:00\",\"dateModified\":\"2013-02-17T05:00:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/i-hls.com\/he\/archives\/50019#breadcrumb\"},\"inLanguage\":\"he-IL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/i-hls.com\/he\/archives\/50019\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"he-IL\",\"@id\":\"https:\/\/i-hls.com\/he\/archives\/50019#primaryimage\",\"url\":\"https:\/\/i-hls.com\/wp-content\/uploads\/2013\/02\/7101474_s.jpg\",\"contentUrl\":\"https:\/\/i-hls.com\/wp-content\/uploads\/2013\/02\/7101474_s.jpg\",\"width\":400,\"height\":264},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/i-hls.com\/he\/archives\/50019#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/i-hls.com\/he\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u05e4\u05dc\u05d8\u05e4\u05d5\u05e8\u05de\u05ea \u05e0\u05d9\u05d8\u05d5\u05e8 \u05dc\u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/i-hls.com\/he#website\",\"url\":\"https:\/\/i-hls.com\/he\",\"name\":\"iHLS\",\"description\":\"Israel Homeland Security Home ( i-HLS )\",\"publisher\":{\"@id\":\"https:\/\/i-hls.com\/he#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/i-hls.com\/he?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"he-IL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/i-hls.com\/he#organization\",\"name\":\"iHLS Israel Homeland Security\",\"url\":\"https:\/\/i-hls.com\/he\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"he-IL\",\"@id\":\"https:\/\/i-hls.com\/he#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i-hls.com\/wp-content\/uploads\/2015\/07\/ihls-logo.jpg\",\"contentUrl\":\"https:\/\/i-hls.com\/wp-content\/uploads\/2015\/07\/ihls-logo.jpg\",\"width\":872,\"height\":322,\"caption\":\"iHLS Israel Homeland Security\"},\"image\":{\"@id\":\"https:\/\/i-hls.com\/he#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/israelhls\/\",\"https:\/\/x.com\/ihls1\",\"https:\/\/www.instagram.com\/israelhomelandsecurity\/\",\"https:\/\/www.linkedin.com\/groups\/5176448\",\"https:\/\/pl.pinterest.com\/israelhls\/\",\"https:\/\/www.youtube.com\/channel\/UC1iOIybOg7fiHCbacRjc18w\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/i-hls.com\/he#\/schema\/person\/afe479eb2ba3961f167eab61c6c55021\",\"name\":\"iHLS News Desk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"he-IL\",\"@id\":\"https:\/\/i-hls.com\/he#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0836346088ebcc8fbc53f860db55b00c?s=96&d=mm&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0836346088ebcc8fbc53f860db55b00c?s=96&d=mm&r=pg\",\"caption\":\"iHLS News Desk\"},\"sameAs\":[\"https:\/\/i-hls.com\",\"https:\/\/www.facebook.com\/israelhls\",\"https:\/\/www.linkedin.com\/groups\/iHLS-Israel-Homeland-Security-iHLS-5176448\",\"https:\/\/www.pinterest.com\/illhls\/\",\"https:\/\/x.com\/@ihls1\",\"https:\/\/www.youtube.com\/israelhls\",\"https:\/\/www.tumblr.com\/blog\/i-hls\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"i-HLS ISrael Homeland Security RSA Analytics Leverages Big Data","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/i-hls.com\/he\/archives\/50019","og_locale":"he_IL","og_type":"article","og_title":"i-HLS ISrael Homeland Security RSA Analytics Leverages Big Data","og_description":"RSA, \u05d7\u05d8\u05d9\u05d1\u05ea \u05d0\u05d1\u05d8\u05d7\u05ea \u05d4\u05de\u05d9\u05d3\u05e2 \u05e9\u05dc EMC Corporation, \u05d4\u05db\u05e8\u05d9\u05d6\u05d4 \u05d4\u05d9\u05d5\u05dd \u05e2\u05dc \u05d4\u05e9\u05e7\u05ea RSA Security Analytics \u2013 \u05e4\u05ea\u05e8\u05d5\u05df \u05e4\u05d5\u05e8\u05e5 \u05d3\u05e8\u05da \u05dc\u05e0\u05d9\u05d8\u05d5\u05e8 \u05d5\u05ea\u05d7\u05e7\u05d5\u05e8 \u05dc\u05e6\u05e8\u05db\u05d9 \u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2,\u00a0 \u05d4\u05de\u05d9\u05d5\u05e2\u05d3 \u05dc\u05e1\u05d9\u05d9\u05e2 \u05dc\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05d1\u05d4\u05d2\u05e0\u05d4 \u05e2\u05dc \u05d4\u05e0\u05db\u05e1\u05d9\u05dd \u05d4\u05d3\u05d9\u05d2\u05d9\u05d8\u05dc\u05d9\u05d9\u05dd \u05e9\u05dc\u05d4\u05dd \u05db\u05e0\u05d2\u05d3 \u05d4\u05d0\u05d9\u05d5\u05de\u05d9\u05dd \u05d4\u05e4\u05e0\u05d9\u05de\u05d9\u05d9\u05dd \u05d5\u05d4\u05d7\u05d9\u05e6\u05d5\u05e0\u05d9\u05d9\u05dd \u05d4\u05de\u05ea\u05d5\u05d7\u05db\u05de\u05d9\u05dd \u05d1\u05d9\u05d5\u05ea\u05e8 \u05d4\u05e7\u05d9\u05d9\u05de\u05d9\u05dd \u05db\u05d9\u05d5\u05dd. RSA Security Analytics, \u05d4\u05de\u05d1\u05d5\u05e1\u05e1 \u05e2\u05dc \u05d4\u05d0\u05e8\u05db\u05d9\u05d8\u05e7\u05d8\u05d5\u05e8\u05d4 \u05d4\u05de\u05d5\u05db\u05d7\u05ea \u05e9\u05dc \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05d9\u05ea RSA NetWitness\u00ae, \u05de\u05d0\u05d7\u05d3 \u05d0\u05ea \u05db\u05dc\u05d9 \u05d4- SIEM, […]","og_url":"https:\/\/i-hls.com\/he\/archives\/50019","og_site_name":"iHLS","article_publisher":"https:\/\/www.facebook.com\/israelhls\/","article_author":"https:\/\/www.facebook.com\/israelhls","article_published_time":"2013-02-17T05:00:02+00:00","og_image":[{"width":400,"height":264,"url":"https:\/\/i-hls.com\/wp-content\/uploads\/2013\/02\/7101474_s.jpg","type":"image\/jpeg"}],"author":"iHLS News Desk","twitter_card":"summary_large_image","twitter_creator":"@ihls1","twitter_site":"@ihls1","twitter_misc":{"\u05e0\u05db\u05ea\u05d1 \u05e2\u05dc \u05d9\u05d3":"iHLS News Desk"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/i-hls.com\/he\/archives\/50019#article","isPartOf":{"@id":"https:\/\/i-hls.com\/he\/archives\/50019"},"author":{"name":"iHLS News Desk","@id":"https:\/\/i-hls.com\/he#\/schema\/person\/afe479eb2ba3961f167eab61c6c55021"},"headline":"\u05e4\u05dc\u05d8\u05e4\u05d5\u05e8\u05de\u05ea \u05e0\u05d9\u05d8\u05d5\u05e8 \u05dc\u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2","datePublished":"2013-02-17T05:00:02+00:00","dateModified":"2013-02-17T05:00:02+00:00","mainEntityOfPage":{"@id":"https:\/\/i-hls.com\/he\/archives\/50019"},"wordCount":52,"commentCount":0,"publisher":{"@id":"https:\/\/i-hls.com\/he#organization"},"image":{"@id":"https:\/\/i-hls.com\/he\/archives\/50019#primaryimage"},"thumbnailUrl":"https:\/\/i-hls.com\/wp-content\/uploads\/2013\/02\/7101474_s.jpg","articleSection":["\u05d0\u05d1\u05d8\u05d7\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8","\u05d7\u05d3\u05e9\u05d5\u05ea"],"inLanguage":"he-IL"},{"@type":"WebPage","@id":"https:\/\/i-hls.com\/he\/archives\/50019","url":"https:\/\/i-hls.com\/he\/archives\/50019","name":"i-HLS ISrael Homeland Security RSA Analytics Leverages Big Data","isPartOf":{"@id":"https:\/\/i-hls.com\/he#website"},"primaryImageOfPage":{"@id":"https:\/\/i-hls.com\/he\/archives\/50019#primaryimage"},"image":{"@id":"https:\/\/i-hls.com\/he\/archives\/50019#primaryimage"},"thumbnailUrl":"https:\/\/i-hls.com\/wp-content\/uploads\/2013\/02\/7101474_s.jpg","datePublished":"2013-02-17T05:00:02+00:00","dateModified":"2013-02-17T05:00:02+00:00","breadcrumb":{"@id":"https:\/\/i-hls.com\/he\/archives\/50019#breadcrumb"},"inLanguage":"he-IL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/i-hls.com\/he\/archives\/50019"]}]},{"@type":"ImageObject","inLanguage":"he-IL","@id":"https:\/\/i-hls.com\/he\/archives\/50019#primaryimage","url":"https:\/\/i-hls.com\/wp-content\/uploads\/2013\/02\/7101474_s.jpg","contentUrl":"https:\/\/i-hls.com\/wp-content\/uploads\/2013\/02\/7101474_s.jpg","width":400,"height":264},{"@type":"BreadcrumbList","@id":"https:\/\/i-hls.com\/he\/archives\/50019#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/i-hls.com\/he"},{"@type":"ListItem","position":2,"name":"\u05e4\u05dc\u05d8\u05e4\u05d5\u05e8\u05de\u05ea \u05e0\u05d9\u05d8\u05d5\u05e8 \u05dc\u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05e1\u05d9\u05d9\u05d1\u05e8 \u05d5\u05d0\u05d1\u05d8\u05d7\u05ea \u05de\u05d9\u05d3\u05e2"}]},{"@type":"WebSite","@id":"https:\/\/i-hls.com\/he#website","url":"https:\/\/i-hls.com\/he","name":"iHLS","description":"Israel Homeland Security Home ( i-HLS )","publisher":{"@id":"https:\/\/i-hls.com\/he#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/i-hls.com\/he?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"he-IL"},{"@type":"Organization","@id":"https:\/\/i-hls.com\/he#organization","name":"iHLS Israel Homeland Security","url":"https:\/\/i-hls.com\/he","logo":{"@type":"ImageObject","inLanguage":"he-IL","@id":"https:\/\/i-hls.com\/he#\/schema\/logo\/image\/","url":"https:\/\/i-hls.com\/wp-content\/uploads\/2015\/07\/ihls-logo.jpg","contentUrl":"https:\/\/i-hls.com\/wp-content\/uploads\/2015\/07\/ihls-logo.jpg","width":872,"height":322,"caption":"iHLS Israel Homeland Security"},"image":{"@id":"https:\/\/i-hls.com\/he#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/israelhls\/","https:\/\/x.com\/ihls1","https:\/\/www.instagram.com\/israelhomelandsecurity\/","https:\/\/www.linkedin.com\/groups\/5176448","https:\/\/pl.pinterest.com\/israelhls\/","https:\/\/www.youtube.com\/channel\/UC1iOIybOg7fiHCbacRjc18w"]},{"@type":"Person","@id":"https:\/\/i-hls.com\/he#\/schema\/person\/afe479eb2ba3961f167eab61c6c55021","name":"iHLS News Desk","image":{"@type":"ImageObject","inLanguage":"he-IL","@id":"https:\/\/i-hls.com\/he#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0836346088ebcc8fbc53f860db55b00c?s=96&d=mm&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0836346088ebcc8fbc53f860db55b00c?s=96&d=mm&r=pg","caption":"iHLS News Desk"},"sameAs":["https:\/\/i-hls.com","https:\/\/www.facebook.com\/israelhls","https:\/\/www.linkedin.com\/groups\/iHLS-Israel-Homeland-Security-iHLS-5176448","https:\/\/www.pinterest.com\/illhls\/","https:\/\/x.com\/@ihls1","https:\/\/www.youtube.com\/israelhls","https:\/\/www.tumblr.com\/blog\/i-hls"]}]}},"_links":{"self":[{"href":"https:\/\/i-hls.com\/he\/wp-json\/wp\/v2\/posts\/50019"}],"collection":[{"href":"https:\/\/i-hls.com\/he\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/i-hls.com\/he\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/i-hls.com\/he\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/i-hls.com\/he\/wp-json\/wp\/v2\/comments?post=50019"}],"version-history":[{"count":0,"href":"https:\/\/i-hls.com\/he\/wp-json\/wp\/v2\/posts\/50019\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/i-hls.com\/he\/wp-json\/wp\/v2\/media\/5274"}],"wp:attachment":[{"href":"https:\/\/i-hls.com\/he\/wp-json\/wp\/v2\/media?parent=50019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/i-hls.com\/he\/wp-json\/wp\/v2\/categories?post=50019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/i-hls.com\/he\/wp-json\/wp\/v2\/tags?post=50019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}