{"id":8049,"date":"2023-08-21T12:02:07","date_gmt":"2023-08-21T09:02:07","guid":{"rendered":"https:\/\/cyberone.bg\/?page_id=8049"},"modified":"2023-08-21T16:34:07","modified_gmt":"2023-08-21T13:34:07","slug":"email-security-gateway","status":"publish","type":"page","link":"https:\/\/cyberone.bg\/it\/email-security-gateway","title":{"rendered":"Email Security Gateway"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"8049\" class=\"elementor elementor-8049\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7e65689 elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"7e65689\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f75231a ot-flex-column-vertical\" data-id=\"f75231a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-40114b9 elementor-widget elementor-widget-iheading\" data-id=\"40114b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ SICUREZZA INNOVATIVA PER IL TUO SERVER EMAIL <\/span>\r\n\t        <h2 class=\"main-heading\">Email Security Gateway (ESG)<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02fa3ee elementor-widget elementor-widget-text-editor\" data-id=\"02fa3ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Oggi i server di posta elettronica rappresentano uno dei sistemi aziendali pi\u00f9 critici, considerando la produttivit\u00e0, l'efficienza e il risparmio sui costi. Sfortunatamente, insieme ai suoi numerosi vantaggi, esistono minacce significative che hanno la capacit\u00e0 di compromettere la tua infrastruttura IT e infliggere gravi conseguenze da un punto di vista legale e finanziario a te ed alla tua azienda.&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:11201,&quot;3&quot;:{&quot;1&quot;:0},&quot;9&quot;:0,&quot;10&quot;:1,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;16&quot;:10}\">Oggi i server di posta elettronica rappresentano uno dei sistemi aziendali pi\u00f9 critici, considerando la produttivit\u00e0, l&#8217;efficienza e il risparmio sui costi. Sfortunatamente, insieme ai suoi numerosi vantaggi, esistono minacce significative che hanno la capacit\u00e0 di compromettere la tua infrastruttura IT e infliggere gravi conseguenze da un punto di vista legale e finanziario a te ed alla tua azienda.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82206cf elementor-widget elementor-widget-text-editor\" data-id=\"82206cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Il semplice atto di apertura di un'e-mail o il clic su un collegamento pu\u00f2 compromettere una workstation e, oltre a rappresentare un enorme rischio per la rete interna della tua azienda, pu\u00f2 anche avere conseguenze devastanti per i tuoi clienti e partner.&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:11201,&quot;3&quot;:{&quot;1&quot;:0},&quot;9&quot;:0,&quot;10&quot;:1,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;16&quot;:10}\">Il semplice atto di apertura di un&#8217;e-mail o il clic su un collegamento pu\u00f2 compromettere una workstation e, oltre a rappresentare un enorme rischio per la rete interna della tua azienda, pu\u00f2 anche avere conseguenze devastanti per i tuoi clienti e partner.<\/span><\/p><p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;I sistemi di sicurezza del server di posta elettronica (SEG) sono un software utilizzato per monitorare le e-mail inviate e ricevute. Il software SEG \u00e8 progettato per prevenire le e-mail di spam e per l'invio di e-mail valide senza problemi. I messaggi indesiderati, inclusi spam, attacchi di phishing, malware o contenuti fraudolenti, vengono automaticamente bloccati, impedendo loro di raggiungere i dipendenti della tua azienda.&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:11201,&quot;3&quot;:{&quot;1&quot;:0},&quot;9&quot;:0,&quot;10&quot;:1,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;16&quot;:10}\">I sistemi di sicurezza del server di posta elettronica (SEG) sono un software utilizzato per monitorare le e-mail inviate e ricevute. Il software SEG \u00e8 progettato per prevenire le e-mail di spam e per l&#8217;invio di e-mail valide senza problemi. I messaggi indesiderati, inclusi spam, attacchi di phishing, malware o contenuti fraudolenti, vengono automaticamente bloccati, impedendo loro di raggiungere i dipendenti della tua azienda.<\/span><\/p><p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Un altro livello di protezione fornito dal sistema \u00e8 il monitoraggio e il blocco di domini, indirizzi IP e mittenti dannosi comprovati.&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:11201,&quot;3&quot;:{&quot;1&quot;:0},&quot;9&quot;:0,&quot;10&quot;:1,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;16&quot;:10}\">Un altro livello di protezione fornito dal sistema \u00e8 il monitoraggio e il blocco di domini, indirizzi IP e mittenti dannosi comprovati.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-fe3f83d ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fe3f83d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9ef70d3 ot-flex-column-vertical\" data-id=\"9ef70d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6a93621 elementor-widget elementor-widget-image\" data-id=\"6a93621\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"436\" height=\"116\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/spamtitan.png\" class=\"attachment-full size-full wp-image-6640\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/spamtitan.png 436w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/spamtitan-300x80.png 300w\" sizes=\"(max-width: 436px) 100vw, 436px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bee9ea9 ot-flex-column-vertical\" data-id=\"bee9ea9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-fb444f5 ot-flex-column-vertical\" data-id=\"fb444f5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ffe22f8 elementor-widget elementor-widget-image\" data-id=\"ffe22f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"719\" height=\"719\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/email_gateway.png\" class=\"attachment-full size-full wp-image-6653\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/email_gateway.png 719w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/email_gateway-300x300.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/email_gateway-150x150.png 150w\" sizes=\"(max-width: 719px) 100vw, 719px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-76e7529 elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"76e7529\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-100665b ot-flex-column-vertical\" data-id=\"100665b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-82cc2fc elementor-widget elementor-widget-iheading\" data-id=\"82cc2fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Protezione e -mail senza compromessi<\/span>\r\n\t        <h2 class=\"main-heading\">TitanHQ SpamTitan<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6364887 elementor-widget elementor-widget-text-editor\" data-id=\"6364887\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Il Gateway SpamTitan \u00e8 in grado di bloccare qualsiasi tipo di spam, fornendo agli amministratori di sistema strumenti estesi per controllare il flusso di posta e proteggere da spam e malware. SpamTitan protegge la tua azienda dalle minacce gestendo il traffico e-mail e regolando le e-mail ricevute dai dipendenti, bloccando e-mail di spam, virus, tentativi di phishing, malware e ransomware.&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:897,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:1,&quot;11&quot;:4,&quot;12&quot;:0}\">Il Gateway SpamTitan \u00e8 in grado di bloccare qualsiasi tipo di spam, fornendo agli amministratori di sistema strumenti estesi per controllare il flusso di posta e proteggere da spam e malware. SpamTitan protegge la tua azienda dalle minacce gestendo il traffico e-mail e regolando le e-mail ricevute dai dipendenti, bloccando e-mail di spam, virus, tentativi di phishing, malware e ransomware.<\/span><\/p><p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;SpamTitan \u00e8 una soluzione di sicurezza e-mail che protegge la tua azienda, i tuoi dipendenti e i tuoi clienti. La soluzione \u00e8 facile da configurare e gestire e offre, tra le sue numerose funzionalit\u00e0, il rilevamento dello spam al 99%, il blocco di virus e malware, il controllo dell'autenticazione, la scansione in uscita, e strutture solide di reporting e reporting. La soluzione garantisce il rilevamento dello spam attraverso l'analisi dello spam a pi\u00f9 livelli, tra cui: blacklist in tempo reale (RBL), elenchi di domini e link trovati nelle e-mail di spam (SURBL), sender policy frameworks e Bayesian analysis. Questo, insieme a un basso tasso di errore, ti d\u00e0 la tranquillit\u00e0 di sapere che i tuoi utenti non perderanno mai una e-mail legittima e allo stesso tempo saranno protetti da e-mail di spam, phishing e allegati dannosi.&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:11201,&quot;3&quot;:{&quot;1&quot;:0},&quot;9&quot;:0,&quot;10&quot;:1,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;16&quot;:10}\">SpamTitan \u00e8 una soluzione di sicurezza e-mail che protegge la tua azienda, i tuoi dipendenti e i tuoi clienti. La soluzione \u00e8 facile da configurare e gestire e offre, tra le sue numerose funzionalit\u00e0, il rilevamento dello spam al 99%, il blocco di virus e malware, il controllo dell&#8217;autenticazione, la scansione in uscita, e strutture solide di reporting e reporting. La soluzione garantisce il rilevamento dello spam attraverso l&#8217;analisi dello spam a pi\u00f9 livelli, tra cui: blacklist in tempo reale (RBL), elenchi di domini e link trovati nelle e-mail di spam (SURBL), sender policy frameworks e Bayesian analysis. Questo, insieme a un basso tasso di errore, ti d\u00e0 la tranquillit\u00e0 di sapere che i tuoi utenti non perderanno mai una e-mail legittima e allo stesso tempo saranno protetti da e-mail di spam, phishing e allegati dannosi.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7aeab75 ot-flex-column-vertical\" data-id=\"7aeab75\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-60330ed elementor-widget elementor-widget-image\" data-id=\"60330ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"872\" height=\"872\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/email_gateway2.png\" class=\"attachment-full size-full wp-image-6652\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/email_gateway2.png 872w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/email_gateway2-300x300.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/email_gateway2-150x150.png 150w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/email_gateway2-768x768.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/email_gateway2-720x720.png 720w\" sizes=\"(max-width: 872px) 100vw, 872px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6bf82ef elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"6bf82ef\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a170c9d ot-flex-column-vertical\" data-id=\"a170c9d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b76d3ef elementor-widget elementor-widget-iheading\" data-id=\"b76d3ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ vantaggi e valore aggiunto per la tua azienda<\/span>\r\n\t        <h2 class=\"main-heading\">Vantaggi e opportunit\u00e0<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4e52fb7 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"4e52fb7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e3cded5 ot-flex-column-vertical\" data-id=\"e3cded5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-67f4267 elementor-section-full_width ot-layout_block elementor-section-height-default elementor-section-height-default\" data-id=\"67f4267\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-ad7564e ot-flex-column-vertical\" data-id=\"ad7564e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65a23d5 elementor-widget elementor-widget-iiconbox2\" data-id=\"65a23d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Protezione Email<\/h5>\r\n\t            <p>La protezione antispam avanzata di SpamTitan protegge la tua azienda bloccando spam, virus, malware, ransomware e collegamenti a siti Web dannosi nelle tue e-mail.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-311d37f ot-flex-column-vertical\" data-id=\"311d37f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dc15691 elementor-widget elementor-widget-iiconbox2\" data-id=\"dc15691\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Soluzione anti-spam consolidata<\/h5>\r\n\t            <p>Semplicemente una soluzione di filtro spam avanzato, con un tasso del 99% di cattura dello spam, ed un tasso di falsi positivi molto basso<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-852c92d ot-flex-column-vertical\" data-id=\"852c92d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eaa8e96 elementor-widget elementor-widget-iiconbox2\" data-id=\"eaa8e96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Protezione e-mail semplificata<\/h5>\r\n\t            <p>Il setup \u00e8 semplice ed intuitivo e la tua azienda vedr\u00e0 subito i risultati. I nostri specialisti si occuperanno di tutto, dall'installazione alla gestione, manutenzione e reporting giornaliero\/settimanale.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-84ecf38 elementor-section-full_width ot-layout_block elementor-section-height-default elementor-section-height-default\" data-id=\"84ecf38\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-796c083 ot-flex-column-vertical\" data-id=\"796c083\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-53f26d5 elementor-widget elementor-widget-iiconbox2\" data-id=\"53f26d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Protezione dal phishing<\/h5>\r\n\t            <p>Pu\u00f2 prevenire attacchi di tipo phishing e whaling, scansionando tutte le e-mail in arrivo in tempo reale. Vengono utilizzate decine di migliaia di regole, nonch\u00e9 informazioni di threat intelligence in tempo reale.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7a5378a ot-flex-column-vertical\" data-id=\"7a5378a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-01d4425 elementor-widget elementor-widget-iiconbox2\" data-id=\"01d4425\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Whitelist e Blacklist<\/h5>\r\n\t            <p>Dispone di funzionalit\u00e0 di whitelisting, blacklisting, reporting avanzato, verifica del destinatario e scansione della posta in uscita. Possiblit\u00e0 di bloccare o sbloccare facilmente liste email e domini<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6d0fc82 ot-flex-column-vertical\" data-id=\"6d0fc82\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b96f4ba elementor-widget elementor-widget-iiconbox2\" data-id=\"b96f4ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Doppia protezione Antivirus<\/h5>\r\n\t            <p>Doppia protezione Antivirus per proteggere i tuoi dipendenti dagli allegati malevoli. SpamTitan utilizza 2 diversi provider AV per la scansione in tempo reale di tutti i file.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-029a987 elementor-section-full_width ot-layout_block elementor-section-height-default elementor-section-height-default\" data-id=\"029a987\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c49eb82 ot-flex-column-vertical\" data-id=\"c49eb82\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2d7317d elementor-widget elementor-widget-iiconbox2\" data-id=\"2d7317d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Protezione dagli attacchi 0day<\/h5>\r\n\t            <p>SpamTitan integra dei sistemi di Threat Intelligence in tempo reale per proteggerti dalle campagne e-mail pi\u00f9 recenti di phishing e malware . Il database dei sistemi di intelligence viene aggiornato ogni ora.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-eeaaec0 ot-flex-column-vertical\" data-id=\"eeaaec0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3f5627f elementor-widget elementor-widget-iiconbox2\" data-id=\"3f5627f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Scansione della posta in uscita<\/h5>\r\n\t            <p>SpamTitan esegue la scansione di tutte le e-mail in uscita, ricercando spam e malware, e bloccando tutti i mittenti che potrebbero comportare l'inserimento degli indirizzi IP della tua azienda nelle blacklist.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-97cbec8 ot-flex-column-vertical\" data-id=\"97cbec8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-18ded76 elementor-widget elementor-widget-iiconbox2\" data-id=\"18ded76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Leak di informazioni<\/h5>\r\n\t            <p>Il sistema dispone di potenti regole di prevenzione rispetto ai data leaks per prevenire uso scorretto dei dati da parte dei dipendenti. \u00c8 possibile definire i trigger secondo keywords, domini ed altri filtri in base al cliente.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d1bdcaa elementor-section-full_width ot-layout_block elementor-section-height-default elementor-section-height-default\" data-id=\"d1bdcaa\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6085ce1 ot-flex-column-vertical\" data-id=\"6085ce1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-34c62b0 elementor-widget elementor-widget-iiconbox2\" data-id=\"34c62b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Quarantena<\/h5>\r\n\t            <p>Ogni allegato flaggato come potenzialmente malevolo o pericoloso viene eseguito in una sandbox per ulteriori analisi e conferma. Ogni e-mail problematica viene messa in quarantena.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f8298f5 ot-flex-column-vertical\" data-id=\"f8298f5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c031421 elementor-widget elementor-widget-iiconbox2\" data-id=\"c031421\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Policy personalizzabili<\/h5>\r\n\t            <p>Ogni utente, dominio, gruppo domini, e tutta l'azienda ha le proprie blacklist o whitelist, oltre alle policy. Policy multiple possono essere definite per domini, utenti, o gruppo di utenti<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-337d261 ot-flex-column-vertical\" data-id=\"337d261\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4041e76 elementor-widget elementor-widget-iiconbox2\" data-id=\"4041e76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Report automatici<\/h5>\r\n\t            <p>Report completi dettagliati permettono ai clienti di guadagnare visibilit\u00e0 rispetto alle loro comunicazioni tramite e-mail. I report possono essere automatizzati e organizzati con cadenza giornaliera, settimanale o mensile in base a configurazioni e necessit\u00e0 specifiche.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-de6f569 elementor-section-full_width ot-layout_block elementor-section-height-default elementor-section-height-default\" data-id=\"de6f569\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-dd198dd ot-flex-column-vertical\" data-id=\"dd198dd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-005bb20 elementor-widget elementor-widget-iiconbox2\" data-id=\"005bb20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>APT Protezione<\/h5>\r\n\t            <p>La protezione dagli APT di SpamTitan utilizza la tecnologia integrata di Bayesian Machine Learning e dei set di regole per proteggere dalle Advanced Threats e dagli nuove tecniche di attacchi emergenti in tempo reale.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-e019f07 ot-flex-column-vertical\" data-id=\"e019f07\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c569cd elementor-widget elementor-widget-iiconbox2\" data-id=\"8c569cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Protezione da file pericolosi<\/h5>\r\n\t            <p>Consente il blocco di allegati, filtrandoli per tipologia (basandosi sulle policy), ad esempio i file ZIP. Controllo e configurazione dettagliati sono possibili sulla base delle policy interne del cliente.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-ee6fef0 ot-flex-column-vertical\" data-id=\"ee6fef0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0a5c1ad elementor-widget elementor-widget-iiconbox2\" data-id=\"0a5c1ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>RBL Personalizzabili<\/h5>\r\n\t            <p>SpamTitan include le top 6 Blacklists per bloccare le minacce in tempo reale, assicurando che tutti i domini o gli URL presenti in elenco vengano rifiutati o messi in quarantena. \u00c8 possibile aggiungere RBL personalizzate.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3b2c914 elementor-section-full_width ot-layout_block elementor-section-height-default elementor-section-height-default\" data-id=\"3b2c914\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f54c760 ot-flex-column-vertical\" data-id=\"f54c760\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2e2d21c elementor-widget elementor-widget-iiconbox2\" data-id=\"2e2d21c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>REST API<\/h5>\r\n\t            <p>La nostra soluzione ha un API estensibile che ne permette l'integrazione con altri prodotti di sicurezza come SIEM, SOAR o sistemi custom di Threat Intelligence<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-51ccab1 ot-flex-column-vertical\" data-id=\"51ccab1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-08e55ce elementor-widget elementor-widget-iiconbox2\" data-id=\"08e55ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Verifica del mittente<\/h5>\r\n\t            <p>SpamTItan utilizza varie regole di sicurezza per la verifica del mittente. Su tutte le mail in arrivo vengono effettuate scansioni di DNS, SPF, DKIM, DMARC e tutti gli altri headers e flag di sicurezza secondo le best practices.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-cf52d32 ot-flex-column-vertical\" data-id=\"cf52d32\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-74b25d6 elementor-widget elementor-widget-iiconbox2\" data-id=\"74b25d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Scalabilit\u00e0<\/h5>\r\n\t            <p>SpamTitan scala insieme alla crescita del tuo business. SpamTitan pu\u00f2 utilizzare utenti e domini illimitati e consente l'utilizzo di amministrazione multi-livello, inclusi utenti, domini e gruppi di domini<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1438efc elementor-section-full_width ot-layout_block elementor-section-height-default elementor-section-height-default\" data-id=\"1438efc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-0f0281a ot-flex-column-vertical\" data-id=\"0f0281a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a1f4437 elementor-widget elementor-widget-iiconbox2\" data-id=\"a1f4437\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Verifica dei destinatari<\/h5>\r\n\t            <p>SpamTitan offre varie tecniche di verifica dei destinatari, ad esempio verifica dinamica del destinatario (DRV), LDAP list-based o tramite espressioni regolari (Regex). La configurazione avviene attraverso cambi del DNS<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-0749335 ot-flex-column-vertical\" data-id=\"0749335\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30279d2 elementor-widget elementor-widget-iiconbox2\" data-id=\"30279d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Quarantena semplificata<\/h5>\r\n\t            <p>SpamTitan offre una gestione semplice delle email in quarantena tramite azioni intuitive come Blocca, Autorizza, Whitelist per ogni email bloccata.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-e4686fa ot-flex-column-vertical\" data-id=\"e4686fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c2cb942 elementor-widget elementor-widget-iiconbox2\" data-id=\"c2cb942\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>GUI multitenant<\/h5>\r\n\t            <p>SpamTitan offre la possibilita di gestione progetti multi-compagnia dove ad esempio ci sono pi\u00f9 aziende sussidiarie rispetto alla holding, ed ogni dominio\/server email viene protetto in modo indipendente.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cf0f26c elementor-section-full_width ot-layout_block elementor-section-height-default elementor-section-height-default\" data-id=\"cf0f26c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5b547d1 ot-flex-column-vertical\" data-id=\"5b547d1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-97ed500 elementor-widget elementor-widget-iiconbox2\" data-id=\"97ed500\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Tante possibilit\u00e0<\/h5>\r\n\t            <p>Le configurazioni per l'autenticazione web permettono il controllo del metodo di autenticazione per ogni dominio quando un utente effettua il login. Sono supportate password, LDAP, SQL, POP3 o IMAP.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-721cb77 ot-flex-column-vertical\" data-id=\"721cb77\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6f31991 elementor-widget elementor-widget-iiconbox2\" data-id=\"6f31991\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Ci prendiamo cura di ogni cosa<\/h5>\r\n\t            <p>Utilizzando la protezione avanzata di SpamTItan, completamente gestita d noi, i reparti IT spendono meno tempo con la sicurezza delle email e riescono a focalizzarsi sulle priorit\u00e0 strategiche per portare avanti il business<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-01919a3 ot-flex-column-vertical\" data-id=\"01919a3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4810ae4 elementor-widget elementor-widget-iiconbox2\" data-id=\"4810ae4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Fatturazione mensile conveniente<\/h5>\r\n\t            <p>La soluzione \u00e8 conveniente, efficacee semplice da utilizzare, una volta configurata non dovrai fare nient'altro. \u00c8 possibile definire dei pagamenti con cadenza mensile invece che annuale, in modo da gestire le licenze in modo pi\u00f9 efficiente<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9511ec3 elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"9511ec3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e6a59d7 ot-flex-column-vertical\" data-id=\"e6a59d7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8a739df elementor-widget elementor-widget-iheading\" data-id=\"8a739df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ GESTIONE E DISTRIBUZIONE ESTREMAMENTE SEMPLICE<\/span>\r\n\t        <h2 class=\"main-heading\">Come funziona il sistema?<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c2ee957 elementor-widget elementor-widget-image\" data-id=\"c2ee957\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1768\" height=\"705\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/seg_works.png\" class=\"attachment-full size-full wp-image-6715\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/seg_works.png 1768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/seg_works-300x120.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/seg_works-1024x408.png 1024w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/seg_works-768x306.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/seg_works-1536x612.png 1536w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/seg_works-720x287.png 720w\" sizes=\"(max-width: 1768px) 100vw, 1768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-183113e elementor-widget elementor-widget-iheading\" data-id=\"183113e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        <h2 class=\"main-heading\">Processo di implementazione SEG<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f222a6 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"8f222a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ci fornisci il numero di licenze richieste<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ti mandiamo una proposta con tutti i dettagli tecnici ed economici<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Viene firmato il contratto e il NDA (Accordo di riservatezza) per 1 anno.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ci fornisci l'accesso alla configurazione DNS per i\/il tuo(i) dominio\/i o aggiungi 1 record MX e 2 records TXT al DNS del tuo dominio.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Applichiamo le policy e le configurazioni secondo le tue preferenze.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ti forniamo l'accesso alla tua dashboard personale all'interno del sistema, insieme all'helpdesk online 24\/7 ed un numero di telefono di emergenza<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ SICUREZZA INNOVATIVA PER IL TUO SERVER EMAIL Email Security Gateway (ESG) Oggi i server di posta elettronica rappresentano uno dei sistemi aziendali pi\u00f9 critici, considerando la produttivit\u00e0, l&#8217;efficienza e il risparmio sui costi. Sfortunatamente, insieme ai suoi numerosi vantaggi, esistono minacce significative che hanno la capacit\u00e0 di compromettere la tua infrastruttura IT e infliggere [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-8049","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/it\/wp-json\/wp\/v2\/pages\/8049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberone.bg\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/it\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/it\/wp-json\/wp\/v2\/comments?post=8049"}],"version-history":[{"count":6,"href":"https:\/\/cyberone.bg\/it\/wp-json\/wp\/v2\/pages\/8049\/revisions"}],"predecessor-version":[{"id":8336,"href":"https:\/\/cyberone.bg\/it\/wp-json\/wp\/v2\/pages\/8049\/revisions\/8336"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/it\/wp-json\/wp\/v2\/media?parent=8049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}