{"id":817,"date":"2025-06-16T14:13:04","date_gmt":"2025-06-16T14:13:04","guid":{"rendered":"https:\/\/inomis.lt\/?page_id=817"},"modified":"2025-06-24T12:21:04","modified_gmt":"2025-06-24T12:21:04","slug":"lean-cybersecurity","status":"publish","type":"page","link":"https:\/\/inomis.lt\/lt\/lean-cybersecurity\/","title":{"rendered":"OPTIMIZUOTAS KIBERNETINIS SAUGUMAS"},"content":{"rendered":"<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-b19e7c9 stk-block-background stk--has-background-overlay\" data-block-id=\"b19e7c9\"><style>.stk-b19e7c9 {background-color:#1d2233 !important;background-image:url(http:\/\/inomis.lt\/wp-content\/uploads\/2022\/05\/lines-background-2.svg) !important;padding-top:120px !important;padding-bottom:0px !important;margin-bottom:0px !important;overflow:visible !important;}.stk-b19e7c9:before{background-color:#1d2233 !important;opacity:0.8 !important;}.stk-b19e7c9 .stk-container{overflow:visible !important;}@media screen and (max-width:999px){.stk-b19e7c9 {padding-top:80px !important;}}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-b19e7c9-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-da68494\" data-v=\"4\" data-block-id=\"da68494\"><style>.stk-da68494-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-da68494-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-da68494-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-e10f9ca\" id=\"lean-cybersecurity\" data-block-id=\"e10f9ca\"><style>.stk-e10f9ca {margin-bottom:0px !important;}.stk-e10f9ca .stk-block-heading__text{font-size:75px !important;color:var(u002du002dtheme-palette-color-8, #ffffff) !important;line-height:1.3em !important;}@media screen and (max-width:999px){.stk-e10f9ca .stk-block-heading__text{font-size:50px !important;}}<\/style><h2 class=\"stk-block-heading__text has-text-color has-palette-color-8-color has-text-align-center\">OPTIMIZUOTAS KIBERNETINIS SAUGUMAS<\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-241a537\" data-block-id=\"241a537\"><style>.stk-241a537 {height:50px !important;}<\/style><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-0faee6d\" data-block-id=\"0faee6d\"><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-0ae063a\" data-block-id=\"0ae063a\"><style>.stk-0ae063a {height:69px !important;}@media screen and (max-width:999px){.stk-0ae063a {height:100px !important;}}<\/style><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">J\u016bs tai \u017einote taip pat gerai kaip ir mes  - dauguma kibernetinio saugumo sprendim\u0173 veikia lyg <strong>statytum sm\u0117lio pil\u012f su buldozeriu<\/strong> apsaugo, bet <strong>per daug sud\u0117tingai<\/strong>Tradiciniai b\u016bdai diegti ISO 27001 standarto reikalavimus apima begalin\u0119 dokumentacij\u0105, persidengian\u010dius procesus bei kontrol\u0117s priemones, kurios labiau apkrauna, nei teikia naudos. <strong>M\u016bs\u0173 tikslas jums parodyti, kad kibernetinio saugumo priemon\u0117s gali pagerinti j\u016bs\u0173 veiklos procesus, o ne jiems trukdyti.<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">M\u016bs\u0173 optimizuota metodika, taikant j\u0105 ISO 27001 pagrindu veikian\u010di\u0173 informacijos saugumo valdymo sistem\u0173 diegime, siekia pakeisti organizacijos po\u017ei\u016br\u012f \u012f kibernetin\u012f saugum\u0105. Naudodami <strong>metodik\u0105 j\u016bs\u0173 veiklos proces\u0173 analizei<\/strong>bei vertindami j\u0173 atitikim\u0105 teis\u0117s aktams ir gerosioms praktikoms, nustatome<strong> kokios kontrol\u0117s priemon\u0117s jums b\u016btinos ir naudingos<\/strong> bei atsisakome to, kas yra perteklu. Tokiu b\u016bdu gaunate j\u016bs\u0173 veiklai ir poreikiams pritaikyt\u0105, eleganti\u0161k\u0105 kibernetinio saugumo sprendim\u0105, kuris u\u017etikrina reikaling\u0105 apsaug\u0105 ta\u010diau yra gerokai pigesnis ir paprastesnis naudoti, lyginant su tipiniais sprendimais.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Kas problemi\u0161ka kibernetinio saugumo valdyme<\/h3>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-8a6f39c\" data-block-id=\"8a6f39c\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-8a6f39c-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-df0e711\" data-v=\"4\" data-block-id=\"df0e711\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-df0e711-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-df0e711-inner-blocks\">\n<ul class=\"wp-block-list\">\n<li><strong>Per didelis dokumentacijos kiekis: <\/strong> \u0161imt\u0173 puslapi\u0173 politikos guli nenaudojamos. Teko sutikti organizacij\u0173, kurios tur\u0117jo vir\u0161 300 puslapi\u0173 dokumentacijos, apie kurios egzistavim\u0105 darbuotojai ne\u017einojo.<\/li>\n\n\n\n<li><strong>Tipiniai sprendimai neveikia:<\/strong> bet kuris veiklos procesas, \u012fskaitant ir kibernetin\u012f saugum\u0105, vis\u0173 pirma turi tarnauti organizacijos veiklai, o ne prie\u0161ingai. Tipiniai procesai, nors dokumentaliai ir padengia reikalingas kontrol\u0117s priemones, ta\u010diau n\u0117ra pritaikomi organizacijos poreikiams.<\/li>\n\n\n\n<li><strong>Dokumentavimas d\u0117l atitikties:<\/strong> organizacijos susitelkimas tur\u0117ti kuo i\u0161samesn\u0119 dokumentacij\u0105 tam, kad audito metu kilt\u0173 kuo ma\u017eiau klausim\u0173 neb\u016btinai rei\u0161kia, kad ta dokumentacija yra tinkamai naudojama.<\/li>\n\n\n\n<li><strong>I\u0161tekli\u0173 sekinimas:<\/strong> pertekliniai procesai eikvoja ne tik laik\u0105 ir pinigus, bet ir \u017emogi\u0161kuosius i\u0161teklius, nekurdami prid\u0117tin\u0117s vert\u0117s organizacijai.<\/li>\n<\/ul>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-62f0263\" data-v=\"4\" data-block-id=\"62f0263\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-62f0263-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-62f0263-inner-blocks\">\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"http:\/\/inomis.lt\/wp-content\/uploads\/2025\/06\/image.png\" alt=\"\" class=\"wp-image-825\" style=\"width:269px;height:auto\" srcset=\"https:\/\/inomis.lt\/wp-content\/uploads\/2025\/06\/image.png 1024w, https:\/\/inomis.lt\/wp-content\/uploads\/2025\/06\/image-300x300.png 300w, https:\/\/inomis.lt\/wp-content\/uploads\/2025\/06\/image-150x150.png 150w, https:\/\/inomis.lt\/wp-content\/uploads\/2025\/06\/image-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Optimizuotas kibernetinis saugumas<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Veiklos proces\u0173 analiz\u0117<\/strong>: prad\u017eioje siekiame suprasti kaip veikia j\u016bs\u0173 organizacija ir jos procesai. Tai mums svarbiau nei konsultant\u0173 sudaryti teoriniai veiklos modeliai. Kiekviena projektuojama kontrol\u0117s priemon\u0117 turi pelnyti jos diegim\u0105 - t.y. ji turi teikti reali\u0105 naud\u0105 siekiant veiklos tiksl\u0173.<\/li>\n\n\n\n<li><strong>Tikslumas<\/strong>: sudarome kibernetinio saugumo modelius b\u016btent taip, kaip reikalinga j\u016bs\u0173 veiklai. Nei perteklini\u0173 dokument\u0173, nei saugumo sprag\u0173 nepaliekame.<\/li>\n\n\n\n<li><strong>Praktinis diegimas<\/strong>: diegiame saugumo procesus \u012f jau esamus veiklos procesus tam, kad darbuotojai juos lengviau priimt\u0173 ir naudot\u0173.<\/li>\n\n\n\n<li><strong>Nuolatinis tobulinimas:<\/strong>: reguliariai per\u017ei\u016brime ir optimizuojame procesus, atsi\u017evelgdami \u012f bendr\u0105j\u0105 situacij\u0105, teisinius reikalavimus ir rizikos vertinimo rezultatus.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-3fb1ffe\" data-block-id=\"3fb1ffe\"><style>.stk-3fb1ffe {height:70px !important;}<\/style><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-5b0d21f\" data-block-id=\"5b0d21f\"><style>.stk-5b0d21f .stk--block-align-5b0d21f{align-items:center !important;}.stk-5b0d21f {margin-bottom:0px !important;}.stk-5b0d21f-column{--stk-column-gap:200px !important;row-gap:50px !important;}<\/style><div class=\"stk-row stk-inner-blocks stk--block-align-5b0d21f stk-block-content stk-content-align stk-5b0d21f-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-7e96063\" data-v=\"4\" data-block-id=\"7e96063\"><style>.stk-7e96063-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}@media screen and (min-width:690px) and (max-width:999px){.stk-7e96063 {flex:var(--stk-flex-grow, 1) 1 calc(100% - var(--stk-column-gap, 0px) * 0 \/ 1 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-7e96063-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-7e96063-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-11cfca1\" id=\"live-in-action\" data-block-id=\"11cfca1\"><style>.stk-11cfca1 {margin-bottom:15px !important;}<\/style><h5 class=\"stk-block-heading__text has-text-align-center-tablet stk-block-heading--use-theme-margins\">Pavyzdys<\/h5><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-f19ffa8\" data-block-id=\"f19ffa8\"><p class=\"stk-block-text__text has-text-align-center-tablet\">Vienas m\u016bs\u0173 klient\u0173 s\u0117kmingai <strong>suma\u017eino savo kibernetinio saugumo dokumentacij\u0105 70%<\/strong> tuo pa\u010diu <strong>sustiprindamas savo organizacijos apsaug\u0105 ir u\u017etikrindamas atitikt\u012f<\/strong>Kliento saugumo valdymo komanda per\u0117jo nuo dokument\u0173 pildymo prie reali\u0173 gr\u0117smi\u0173 prevencijos ir veiklos proces\u0173 u\u017etikrinimo.<\/p><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-2b62231\" data-v=\"4\" data-block-id=\"2b62231\"><style>.stk-2b62231-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}@media screen and (min-width:690px) and (max-width:999px){.stk-2b62231 {flex:var(--stk-flex-grow, 1) 1 calc(100% - var(--stk-column-gap, 0px) * 0 \/ 1 ) !important;}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-2b62231-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-2b62231-inner-blocks\">\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-19141a7 stk-block-background stk--has-background-overlay\" data-block-id=\"19141a7\"><style>.stk-19141a7 {background-color:#1d2233 !important;background-image:url(http:\/\/inomis.lt\/wp-content\/uploads\/2022\/05\/lines-background-2.svg) !important;padding-top:120px !important;padding-bottom:120px !important;margin-bottom:0px !important;}.stk-19141a7:before{background-color:#1d2233 !important;opacity:0.8 !important;}@media screen and (max-width:999px){.stk-19141a7 {padding-top:80px !important;padding-bottom:80px !important;}}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-19141a7-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-a2fa1d3\" data-v=\"4\" data-block-id=\"a2fa1d3\"><style>.stk-a2fa1d3-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-a2fa1d3-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-a2fa1d3-inner-blocks\">\n<p class=\"wp-block-paragraph\"><strong>Optimizuoto kibernetinio saugumo diegimas tipi\u0161kai per 4-6 m\u0117nesius leid\u017eia organizacijai pasiekti brandos lyg\u012f, reikaling\u0105 sertifikuojantis pagal ISO 27001. Tai yra beveik tris kartus grei\u010diau, nei darant tai \u012fprastai.<\/strong><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-df0502b\" data-block-id=\"df0502b\"><style>.stk-df0502b {height:70px !important;}<\/style><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Pakeiskite savo santyk\u012f su kibernetiniu saugumu<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Jums nebereikia \u017ei\u016br\u0117ti \u012f kibernetin\u012f saugum\u0105 kaip \u012f b\u016btin\u0105 sve\u010di\u0105, kurio niekas nenori. Optimizuodami savo kibernetinio saugumo procesus gausite eleganti\u0161k\u0105 proces\u0105, kuriuo yra patogu naudotis realioje veikloje.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Ar esate pasiruo\u0161\u0119 poky\u010diui? Kartu kurkime paprastus bet i\u0161samius sprendimus, kuriais b\u016bt\u0173 malonu naudotis.<\/p>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-233c743\" data-block-id=\"233c743\"><style>.stk-233c743 {height:70px !important;}<\/style><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-c0be13e stk-block-background stk--has-background-overlay\" data-block-id=\"c0be13e\"><style>.stk-c0be13e {background-color:#1d2233 !important;background-image:url(http:\/\/inomis.lt\/wp-content\/uploads\/2022\/05\/lines-background-2.svg) !important;padding-top:120px !important;padding-bottom:120px !important;margin-bottom:0px !important;}.stk-c0be13e:before{background-color:#1d2233 !important;opacity:0.8 !important;}@media screen and (max-width:999px){.stk-c0be13e {padding-top:80px !important;padding-bottom:80px !important;}}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-c0be13e-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-2addae5\" data-v=\"4\" data-block-id=\"2addae5\"><style>.stk-2addae5-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important;}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-2addae5-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-2addae5-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-c2ec6f9\" id=\"why-it-works\" data-block-id=\"c2ec6f9\"><style>.stk-c2ec6f9 {margin-bottom:30px !important;}.stk-c2ec6f9 .stk-block-heading__text{font-size:40px !important;color:var(u002du002dtheme-palette-color-8, #ffffff) !important;}@media screen and (max-width:999px){.stk-c2ec6f9 .stk-block-heading__text{font-size:40px !important;}}<\/style><h2 class=\"stk-block-heading__text has-text-color has-palette-color-8-color has-text-align-center\">Kod\u0117l tai veikia<\/h2><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Per daugiau nei de\u0161imt s\u0117kming\u0173 projekt\u0173<\/strong> priva\u010diam ir vie\u0161ajam sektoriui \u012frod\u0117me sau ir klientams, kad m\u016bs\u0173 taikomi sprendimai u\u017etikrina auk\u0161\u010diausi\u0105 kokyb\u0119:<\/li>\n\n\n\n<li><strong>60% greitesnis diegimas<\/strong>: M\u016bs\u0173 b\u016bdas leid\u017eia pasiekti ISO 27001 atitikt\u012f per 4-6 m\u0117nesius, kuomet \u012fprastai tai trunka iki 18 m\u0117nesi\u0173.<\/li>\n\n\n\n<li><strong>40% ma\u017eesni ka\u0161tai<\/strong>: Kadangi nediegiame pertekliniai procesai ir kontrol\u0117s priemon\u0117s, tiek diegimo tiek palaikymo ka\u0161tai \u017eenkliai suma\u017e\u0117ja.<\/li>\n\n\n\n<li><strong>Darbuotoj\u0173 priimamumas<\/strong>: Kai procesai yra suprantami, darbuotojai juos lengviau priima ir j\u0173 laikosi nebandydami j\u0173 apeiti.<\/li>\n\n\n\n<li><strong>Stipresn\u0117 apsauga<\/strong>: susitelkimas \u012f praktines kontrol\u0117s priemones ir darbuotoj\u0173 s\u0105moningum\u0105 rei\u0161kia, kad lieka ma\u017eiau galimybi\u0173 pa\u017eeisti saugum\u0105.<\/li>\n<\/ul>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-6a5417b\" data-block-id=\"6a5417b\"><style>.stk-6a5417b {height:70px !important;}<\/style><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Koks viso to rezultatas<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Strateginis ai\u0161kumas<\/strong>: Optimali, sutelkta saugumo strategija, kuri\u0105 vadovyb\u0117 gali suprasti ir panaudoti.<\/li>\n\n\n\n<li><strong>Veiklos efektyvumas<\/strong>: Saugumo procesai, kurie padeda veiklos vykdymui ir jos nel\u0117tina.<\/li>\n\n\n\n<li><strong>Konkurencinis prana\u0161umas<\/strong>: Greitesn\u0117 atitiktis, ma\u017eesni ka\u0161tai ir greitas atsakas \u012f saugumo incidentus.<\/li>\n\n\n\n<li><strong>Sistemos parengtos ateities i\u0161\u0161\u016bkiams<\/strong>: Optimizuotos strukt\u016bros lengviau prisitaiko prie nauj\u0173 reikalavim\u0173, kintan\u010di\u0173 veiklos proces\u0173 ir kylan\u010di\u0173 nauj\u0173 gr\u0117smi\u0173.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-stackable-spacer stk-block-spacer stk--no-padding stk-block stk-7df5ad5\" data-block-id=\"7df5ad5\"><style>.stk-7df5ad5 {height:100px !important;}<\/style><\/div>","protected":false},"excerpt":{"rendered":"<p>Lean Cybersecurity You know it and we know it &#8211; most cybersecurity implementations feel like wearing a suit of armor to a business meeting \u2013 protective but unnecessarily cumbersome. Traditional ISO 27001 implementations burden organizations with excessive documentation, redundant processes, and controls that add complexity without adding value. We believe cybersecurity should enhance your business, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-817","page","type-page","status-publish","hentry"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6},"page_title_panel":"","has_hero_section":"disabled","cdffe435dcab9bc0ccfb8b8286615cd0":"","hero_section":"type-1","hero_elements":[{"id":"custom_title","enabled":true,"heading_tag":"h1","title":"PAGRINDINIS"},{"id":"custom_description","enabled":true,"description_visibility":{"desktop":true,"tablet":true,"mobile":false}},{"id":"custom_meta","enabled":false,"meta_elements":[{"id":"author","enabled":true,"label":"By","has_author_avatar":"yes","avatar_size":25},{"id":"post_date","enabled":true,"label":"On","date_format_source":"default","date_format":"M j, Y"},{"id":"updated_date","enabled":false,"label":"On","date_format_source":"default","date_format":"M j, Y"},{"id":"categories","enabled":false,"label":"In","style":"simple"},{"id":"comments","enabled":true}],"page_meta_elements":{"joined":true,"articles_count":true,"comments":true}},{"id":"breadcrumbs","enabled":false}],"aa3e71982d0f17b8fe2bfbbbb3812215":"","hero_alignment1":"CT_CSS_SKIP_RULE","hero_margin":40,"hero_alignment2":"center","hero_vertical_alignment":"center","e60ee0ea9b28fd15f57bf213bf429eae":"","hero_structure":"narrow","91f1b2d6092ab8cac63a7d09191e2915":"","page_title_bg_type":"featured_image","custom_hero_background":{"attachment_id":null},"page_title_image_size":"full","parallax":{"desktop":false,"tablet":false,"mobile":false},"3b731d17b6531211b1472abeefaae46a":"","hero_height":"250px","pageTitleFont":{"family":"Default","variation":"Default","size":"30px","line-height":"CT_CSS_SKIP_RULE","letter-spacing":"CT_CSS_SKIP_RULE","text-transform":"CT_CSS_SKIP_RULE","text-decoration":"CT_CSS_SKIP_RULE"},"pageTitleFontColor":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"pageMetaFont":{"family":"Default","variation":"n6","size":"12px","line-height":"1.3","letter-spacing":"CT_CSS_SKIP_RULE","text-transform":"uppercase","text-decoration":"CT_CSS_SKIP_RULE"},"pageMetaFontColor":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"},"hover":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"page_meta_button_type_font_colors":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"},"hover":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"page_meta_button_type_background_colors":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"},"hover":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"pageExcerptFont":{"family":"Default","variation":"Default","size":"CT_CSS_SKIP_RULE","line-height":"CT_CSS_SKIP_RULE","letter-spacing":"CT_CSS_SKIP_RULE","text-transform":"CT_CSS_SKIP_RULE","text-decoration":"CT_CSS_SKIP_RULE"},"pageExcerptColor":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"breadcrumbsFont":{"family":"Default","variation":"Default","size":"CT_CSS_SKIP_RULE","line-height":"CT_CSS_SKIP_RULE","letter-spacing":"CT_CSS_SKIP_RULE","text-transform":"CT_CSS_SKIP_RULE","text-decoration":"CT_CSS_SKIP_RULE"},"breadcrumbsFontColor":{"default":{"color":"CT_CSS_SKIP_RULEDEFAULT"},"initial":{"color":"CT_CSS_SKIP_RULEDEFAULT"},"hover":{"color":"CT_CSS_SKIP_RULEDEFAULT"}},"pageTitleOverlay":{"background_type":"color","background_pattern":"type-1","background_image":{"attachment_id":null,"x":0,"y":0},"gradient":"linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%)","background_repeat":"repeat","background_size":"auto","background_attachment":"scroll","patternColor":{"default":{"color":"#e5e7ea"}},"overlayColor":{"default":{"color":"CT_CSS_SKIP_RULE"}},"backgroundColor":{"default":{"color":"CT_CSS_SKIP_RULE"}}},"pageTitleBackground":{"background_type":"color","background_pattern":"type-1","background_image":{"attachment_id":null,"x":0,"y":0},"gradient":"linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%)","background_repeat":"repeat","background_size":"auto","background_attachment":"scroll","patternColor":{"default":{"color":"#e5e7ea"}},"overlayColor":{"default":{"color":"CT_CSS_SKIP_RULE"}},"backgroundColor":{"default":{"color":"var(--theme-palette-color-6)"}}},"pageTitlePadding":{"top":"50px","bottom":"50px","left":"auto","right":"auto","linked":true},"dc538ce9b4da84cfb0fa32d6a20988f8":"","page_structure_type":"default","24b6769498b19f76af1dd253e1cc607f":"","content_style_source":"inherit","content_style":"wide","vertical_spacing_source":"custom","content_area_spacing":"none","background":{"background_type":"color","background_pattern":"type-1","background_image":{"attachment_id":null,"x":0,"y":0},"gradient":"linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%)","background_repeat":"repeat","background_size":"auto","background_attachment":"scroll","patternColor":{"default":{"color":"#e5e7ea"}},"overlayColor":{"default":{"color":"CT_CSS_SKIP_RULE"}},"backgroundColor":{"default":{"color":"CT_CSS_SKIP_RULE"}}},"content_background":{"background_type":"color","background_pattern":"type-1","background_image":{"attachment_id":null,"x":0,"y":0},"gradient":"linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%)","background_repeat":"repeat","background_size":"auto","background_attachment":"scroll","patternColor":{"default":{"color":"#e5e7ea"}},"overlayColor":{"default":{"color":"CT_CSS_SKIP_RULE"}},"backgroundColor":{"default":{"color":"var(--theme-palette-color-8)"}}},"content_boxed_shadow":{"inherit":false,"blur":18,"spread":-6,"v_offset":12,"h_offset":0,"inset":false,"enable":true,"color":{"color":"rgba(34, 56, 101, 0.04)"}},"content_boxed_border":{"width":1,"style":"none","color":{"color":"rgba(44,62,80,0.2)"}},"content_boxed_radius":{"top":"3px","bottom":"3px","left":"3px","right":"3px","linked":true},"boxed_content_spacing":{"desktop":{"top":"40px","bottom":"40px","left":"40px","right":"40px","linked":true},"tablet":{"top":"35px","bottom":"35px","left":"35px","right":"35px","linked":true},"mobile":{"top":"20px","bottom":"20px","left":"20px","right":"20px","linked":true}},"ac93a16d09c08770d93e1a1ae1cdc52e":"","disable_featured_image":"no","disable_share_box":"no","disable_header":"no","disable_footer":"no"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/inomis.lt\/lt\/wp-json\/wp\/v2\/pages\/817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inomis.lt\/lt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/inomis.lt\/lt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/inomis.lt\/lt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inomis.lt\/lt\/wp-json\/wp\/v2\/comments?post=817"}],"version-history":[{"count":30,"href":"https:\/\/inomis.lt\/lt\/wp-json\/wp\/v2\/pages\/817\/revisions"}],"predecessor-version":[{"id":922,"href":"https:\/\/inomis.lt\/lt\/wp-json\/wp\/v2\/pages\/817\/revisions\/922"}],"wp:attachment":[{"href":"https:\/\/inomis.lt\/lt\/wp-json\/wp\/v2\/media?parent=817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}