{"id":8130,"date":"2023-08-21T14:26:26","date_gmt":"2023-08-21T11:26:26","guid":{"rendered":"https:\/\/cyberone.bg\/?page_id=8130"},"modified":"2023-08-21T21:28:47","modified_gmt":"2023-08-21T18:28:47","slug":"services","status":"publish","type":"page","link":"https:\/\/cyberone.bg\/it\/services","title":{"rendered":"Servizi"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"8130\" class=\"elementor elementor-8130\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ca00d56 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ca00d56\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ffdf0ac ot-flex-column-vertical\" data-id=\"ffdf0ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-75221f9 elementor-section-full_width elementor-section-content-bottom ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"75221f9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c1b831a ot-flex-column-vertical\" data-id=\"c1b831a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b26fd1 elementor-widget elementor-widget-iheading\" data-id=\"1b26fd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Cybersecurity services<\/span>\r\n\t        <h3 class=\"main-heading\">Managed cybersecurity services<\/h3>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-615e33b ot-column-items-center ot-flex-column-vertical\" data-id=\"615e33b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-83ec4ab elementor-align-right elementor-mobile-align-left elementor-widget elementor-widget-ibutton\" data-id=\"83ec4ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ibutton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-button\">\r\n\t\t\t<a href=\"https:\/\/cyberone.bg\/en\/quote\" class=\"octf-btn octf-btn-primary\">Get a Quote<\/a>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-64da2ad elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"64da2ad\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-73d21de ot-flex-column-vertical\" data-id=\"73d21de\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ae4cd7 elementor-widget elementor-widget-iiconbox1\" data-id=\"2ae4cd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-data\"><\/span>\t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/it\/services\/penetration-tests\">Penetration Test<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>I penetration test simulano scenari di attacco reale contro applicazioni Web, sistemi informatici e infrastrutture di rete interne e pubbliche.<br><br><\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-752de03 elementor-widget elementor-widget-iiconbox1\" data-id=\"752de03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-best\"><\/span>\t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/it\/services\/waf-software\">Web App Firewall<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>Il WAF protegge le applicazioni Web filtrando, monitorando e bloccando il traffico HTTP\/S malevolo. Utilizza un set di regole che determinano il traffico e quello sicuro.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d54703 elementor-widget elementor-widget-iiconbox1\" data-id=\"1d54703\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-process\"><\/span>\t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/it\/services\/dns-filtering-gateway\">DNS Filtering Gateway<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>Il servizio consente un filtraggio completo del traffico DNS in base a regole e configurazioni predefinite. Possibilit\u00e0 di monitorare e tracciare la cronologia DNS, nonch\u00e9 di creare pi\u00f9 criteri e gruppi.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-58b6f2a ot-flex-column-vertical\" data-id=\"58b6f2a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ba093c elementor-widget elementor-widget-iiconbox1\" data-id=\"2ba093c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-tablet\"><\/span>\t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/it\/services\/endpoint-protection\">Endpoint Protection<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>Un sistema basato sul cloud che offre una sicurezza completa con una visibilit\u00e0 totale di computer e server, oltre a una protezione impeccabile contro vari tipi di minacce.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e24bd09 elementor-widget elementor-widget-iiconbox1\" data-id=\"e24bd09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-report\"><\/span>\t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/it\/services\/siem-software\">Software SIEM<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>Un SIEM \u00e8 una soluzione di sicurezza che consente il monitoraggio in tempo reale di vari logs di sicurezza inviati da vari sistemi IT, computer e server che possono essere correlati ed elaborati in tempo reale.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-80b173f elementor-hidden-tablet ot-flex-column-vertical\" data-id=\"80b173f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-357b31a elementor-widget elementor-widget-iiconbox1\" data-id=\"357b31a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-code\"><\/span>\t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/it\/services\/vulnerability-assessment\">Vulnerability Assessment<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>Il servizio fornisce l'identificazione di vulnerabilit\u00e0 note nei sistemi informatici utilizzando metodologie di assessment automatizzate sulle applicazioni Web, nei sistemi informatici, nei servizi IT e sui dispositivi di rete.\n<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c55c8f elementor-widget elementor-widget-iiconbox1\" data-id=\"9c55c8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-data-1\"><\/span>\t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/it\/services\/email-security-gateway\">Email Security Gateway<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>Servizio basato sul cloud che consente il filtraggio completo del traffico in entrata e in uscita dal vostro server di posta elettronica. Garantisce il blocco di tutte le e-mail di spam, dannose e pericolose. Pu\u00f2 essere utilizzato come soluzione DLP.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a5c6849 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a5c6849\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-be0593f ot-flex-column-vertical\" data-id=\"be0593f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9c482ac elementor-section-full_width elementor-section-content-bottom ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"9c482ac\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2add393 ot-flex-column-vertical\" data-id=\"2add393\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-252a392 elementor-widget elementor-widget-iheading\" data-id=\"252a392\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Servizi di consulenza per la vostra azienda<\/span>\r\n\t        <h3 class=\"main-heading\">La competenza affidabile dei nostri esperti<\/h3>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-54b5e6b ot-column-items-center ot-flex-column-vertical\" data-id=\"54b5e6b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfef199 elementor-align-right elementor-mobile-align-left elementor-widget elementor-widget-ibutton\" data-id=\"bfef199\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ibutton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-button\">\r\n\t\t\t<a href=\"https:\/\/cyberone.bg\/it\/quote\/consulting\" class=\"octf-btn octf-btn-primary\">Ricevere un'offerta<\/a>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4173f53 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"4173f53\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-d3729e0 ot-flex-column-vertical\" data-id=\"d3729e0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d626848 elementor-widget elementor-widget-iiconbox1\" data-id=\"d626848\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"fas fa-chalkboard-teacher\"><\/i>\t\t\t    \t\t        \t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/it\/services\/security-awareness-trainings\">Formazione sulla cybersecurity<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>Lo scopo di questo tipo di formazione sulla cybersecurity \u00e8 principalmente quello di migliorare la cultura digitale dei vostri dipendenti e di fargli comprendere quali sono i pericoli del mondo digitale dai quali difendersi.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-469f2e8 elementor-widget elementor-widget-iiconbox1\" data-id=\"469f2e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"far fa-file-archive\"><\/i>\t\t\t    \t\t        \t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/it\/services\/information-security-policies\">Information Security Policies<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>La sicurezza dovrebbe essere una preoccupazione di tutti i dipendenti di un'azienda, non solo dei professionisti IT e dei top manager. Un modo efficace per educare i dipendenti all'importanza della sicurezza \u00e8 rappresentato dalle politiche di cybersecurity che spiegano le responsabilit\u00e0 di ciascun dipendente nella protezione dei sistemi informatici e dei dati.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-05ee072 ot-flex-column-vertical\" data-id=\"05ee072\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c5c1e3 elementor-widget elementor-widget-iiconbox1\" data-id=\"5c5c1e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"fas fa-network-wired\"><\/i>\t\t\t    \t\t        \t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/it\/services\/data-breach-investigation\">Indagine sulla violazione dei dati<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>Il servizio offre un approccio completo alle indagini sugli incidenti di sicurezza. In questo caso, il nostro team pu\u00f2 aiutare la vostra azienda identificando la fonte dell'accesso non autorizzato e fornendo il miglior approccio alla gestione del rischio.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b14210 elementor-widget elementor-widget-iiconbox1\" data-id=\"1b14210\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"far fa-money-bill-alt\"><\/i>\t\t\t    \t\t        \t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/it\/services\/ransomware-breach\">Incidenti Ransomware<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>Il servizio offre assistenza e supporto completo in caso di attacco ransomware contro la vostra azienda. I nostri specialisti cercheranno di recuperare il maggior numero di informazioni possibile e potranno essere un punto di comunicazione con i Threat Actors, oltre allo svolgimento di tutte le attivit\u00e0 forensi e di bonifica.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-4707596 elementor-hidden-tablet ot-flex-column-vertical\" data-id=\"4707596\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-021f15d elementor-widget elementor-widget-iiconbox1\" data-id=\"021f15d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"far fa-comments\"><\/i>\t\t\t    \t\t        \t        <\/div>\r\n\t        <h5><a href=\"https:\/\/cyberone.bg\/it\/services\/ciso-as-a-service\">CISO as a Service<\/a><\/h5>\r\n\t        <div class=\"line-box\"><\/div>\r\n\t        <p>Un servizio CISOaaS comporta l'esternalizzazione delle responsabilit\u00e0 di gestione della sicurezza a un fornitore esterno. Assumendo un vCISO per la gestione remota della sicurezza, un'azienda ottiene automaticamente l'accesso a personale e risorse di cui normalmente non  non pu\u00f2 disporre.<\/p>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73be24f ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"73be24f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-127b13e ot-flex-column-vertical\" data-id=\"127b13e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca0ae35 elementor-widget elementor-widget-heading\" data-id=\"ca0ae35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">\/\/ Avete bisogno di altri servizi?<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed367a6 elementor-widget elementor-widget-heading\" data-id=\"ed367a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CONTATTO<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f08a21a elementor-align-center elementor-widget elementor-widget-ibutton\" data-id=\"f08a21a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ibutton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-button\">\r\n\t\t\t<a href=\"https:\/\/cyberone.bg\/it\/contacts\" class=\"octf-btn octf-btn-primary\">Contatti<\/a>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ Cybersecurity services Managed cybersecurity services Get a Quote Penetration Test I penetration test simulano scenari di attacco reale contro applicazioni Web, sistemi informatici e infrastrutture di rete interne e pubbliche. Web App Firewall Il WAF protegge le applicazioni Web filtrando, monitorando e bloccando il traffico HTTP\/S malevolo. Utilizza un set di regole che determinano [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-8130","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/it\/wp-json\/wp\/v2\/pages\/8130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberone.bg\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/it\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/it\/wp-json\/wp\/v2\/comments?post=8130"}],"version-history":[{"count":15,"href":"https:\/\/cyberone.bg\/it\/wp-json\/wp\/v2\/pages\/8130\/revisions"}],"predecessor-version":[{"id":8397,"href":"https:\/\/cyberone.bg\/it\/wp-json\/wp\/v2\/pages\/8130\/revisions\/8397"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/it\/wp-json\/wp\/v2\/media?parent=8130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}