{"id":14007,"date":"2021-06-11T16:58:06","date_gmt":"2021-06-11T14:58:06","guid":{"rendered":"https:\/\/www.cyberfero.com\/?page_id=14007"},"modified":"2026-05-22T15:09:46","modified_gmt":"2026-05-22T13:09:46","slug":"servizi-di-cyber-security","status":"publish","type":"page","link":"https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/","title":{"rendered":"Panoramica servizi di Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"14007\" class=\"elementor elementor-14007\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-57178ae5 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"57178ae5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4903898e\" data-id=\"4903898e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-edd92fa elementor-button-info elementor-widget__width-auto elementor-fixed elementor-hidden-tablet elementor-hidden-phone elementor-widget elementor-widget-button\" data-id=\"edd92fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;fixed&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#breadcrumbs\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Torna all'inizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c295539 elementor-widget elementor-widget-heading\" data-id=\"4c295539\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Scopri i nostri servizi di Cyber Security<br \/><small>Troverai sicuramente quello che fa al caso tuo<\/small><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18383c56 elementor-widget elementor-widget-spacer\" data-id=\"18383c56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a09ddb7 elementor-widget elementor-widget-text-editor\" data-id=\"6a09ddb7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Se vuoi mantenere i dati della tua azienda al sicuro dai pericoli della rete, trovi la soluzione tra i nostri servizi dedicati alla cyber security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d55cb09 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3d55cb09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb0f0cf elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"cb0f0cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h1&quot;,&quot;h2&quot;],&quot;exclude_headings_by_selector&quot;:[],&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;marker_view&quot;:&quot;numbers&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<div class=\"elementor-toc__header-title\">\n\t\t\t\tTabella dei Contenuti\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__cb0f0cf\" aria-expanded=\"true\" aria-label=\"Apri l&#039;indice dei contenuti\"><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__cb0f0cf\" aria-expanded=\"true\" aria-label=\"Chiudi l&#039;indice dei contenuti\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__cb0f0cf\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-006646f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"006646f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7bd6938\" data-id=\"7bd6938\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-38cf9e3 elementor-widget elementor-widget-heading\" data-id=\"38cf9e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-xxl\">Attack<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-01cfe66 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"01cfe66\" data-element_type=\"section\" data-e-type=\"section\" id=\"hacking\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-419ffff\" data-id=\"419ffff\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8faa7bf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8faa7bf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ea664c5\" data-id=\"ea664c5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eb16115 elementor-widget elementor-widget-heading\" data-id=\"eb16115\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/\">Ethical Hacking - Vulnerability Assessment &amp; Penetration Test<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa7f49e elementor-widget elementor-widget-text-editor\" data-id=\"aa7f49e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Attraverso\u00a0 Vulnerability Assessment e Penetration Test, verifica che i tuoi sistemi siano davvero a prova di attacco!<\/strong><\/p><p>Sempre pi\u00f9 spesso si pensa alla sicurezza della propria rete solo quando \u00e8 troppo tardi. <em>Non farti cogliere impreparato!<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-340d7ef\" data-id=\"340d7ef\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a44f966 elementor-widget elementor-widget-image\" data-id=\"a44f966\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"819\" height=\"1024\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/HackerSOD-819x1024.png\" class=\"attachment-large size-large wp-image-8763\" alt=\"Hacker\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/HackerSOD-819x1024.png 819w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/HackerSOD-240x300.png 240w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/HackerSOD-768x960.png 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/HackerSOD-1229x1536.png 1229w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/HackerSOD.png 1280w\" sizes=\"(max-width: 819px) 100vw, 819px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f0597c1 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"f0597c1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-65f630e\" data-id=\"65f630e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e57f285 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"e57f285\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/hacker.png\" class=\"attachment-full size-full wp-image-8666\" alt=\"hacker\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/hacker.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/hacker-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/hacker-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/hacker-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/hacker-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Network sniffing<\/h3><p class=\"elementor-image-box-description\">Intercettazione e analisi dei pacchetti di rete inviati<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f818cf1 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"f818cf1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/026-malware-6.png\" class=\"attachment-full size-full wp-image-8672\" alt=\"026-malware-6\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/026-malware-6.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/026-malware-6-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/026-malware-6-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/026-malware-6-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/026-malware-6-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">ARP spoofing<\/h3><p class=\"elementor-image-box-description\">Attacchi di tipo man-in-the-middle ai danni della rete<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-e2fbe08\" data-id=\"e2fbe08\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-58b5a9f elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"58b5a9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/007-stalking.png\" class=\"attachment-full size-full wp-image-8668\" alt=\"007-stalking\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/007-stalking.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/007-stalking-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/007-stalking-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/007-stalking-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/007-stalking-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">IP port scanning<\/h3><p class=\"elementor-image-box-description\">Scansione della rete al fine di individuare vie di accesso<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b932cab elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"b932cab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/034-hacking.png\" class=\"attachment-full size-full wp-image-8674\" alt=\"034-hacking\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/034-hacking.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/034-hacking-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/034-hacking-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/034-hacking-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/034-hacking-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Ricerca vulnerabilit\u00e0<\/h3><p class=\"elementor-image-box-description\">Analisi delle vulnerabilit\u00e0 nello stack ISO\/OSI<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-558f478\" data-id=\"558f478\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b68736 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"7b68736\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/009-passwords.png\" class=\"attachment-full size-full wp-image-8670\" alt=\"009-passwords\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/009-passwords.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/009-passwords-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/009-passwords-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/009-passwords-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/009-passwords-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Deduzione password<\/h3><p class=\"elementor-image-box-description\">Tentativi di carpire e dedurre password di sistema<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65e156a elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"65e156a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/036-malware-1.png\" class=\"attachment-full size-full wp-image-8676\" alt=\"036-malware-1\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/036-malware-1.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/036-malware-1-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/036-malware-1-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/036-malware-1-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/036-malware-1-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Controllo dei sistemi<\/h3><p class=\"elementor-image-box-description\">Tentativo di controllo remoto dei sistemi.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fb6917 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"5fb6917\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3b56c1c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3b56c1c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9cf8e2b\" data-id=\"9cf8e2b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-418717c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"418717c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-49c7f12\" data-id=\"49c7f12\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4da4e48 elementor-widget elementor-widget-heading\" data-id=\"4da4e48\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/\"> Vulnerability Assessment Continuativo<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d58307a elementor-widget elementor-widget-text-editor\" data-id=\"d58307a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Si riferisce al processo regolare e ripetuto di identificazione, valutazione e priorit\u00e0 delle vulnerabilit\u00e0 nei sistemi informatici, al fine di garantire che le minacce emergenti siano affrontate tempestivamente e che le risorse di difesa siano allocate in modo efficiente.<\/p><p>L<b>&#8216;importanza di un assessment continuativo risiede nella natura mutevole delle minacce informatiche.<\/b> Nuove vulnerabilit\u00e0 sono scoperte ogni giorno e, in un ambiente IT dinamico, nuovi sistemi e applicazioni vengono regolarmente aggiunti alla rete, o i sistemi esistenti vengono aggiornati, il che pu\u00f2 introdurre nuove falle.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8d111a2\" data-id=\"8d111a2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f6578f5 elementor-widget elementor-widget-image\" data-id=\"f6578f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"819\" height=\"1024\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/HackerSOD-819x1024.png\" class=\"attachment-large size-large wp-image-8763\" alt=\"Hacker\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/HackerSOD-819x1024.png 819w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/HackerSOD-240x300.png 240w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/HackerSOD-768x960.png 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/HackerSOD-1229x1536.png 1229w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/HackerSOD.png 1280w\" sizes=\"(max-width: 819px) 100vw, 819px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-849d0b7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"849d0b7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c48eb80\" data-id=\"c48eb80\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-146574a elementor-widget elementor-widget-heading\" data-id=\"146574a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><b>Le fasi del processo di Vulnerability Assessment Continuativo<\/b><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4eb756d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4eb756d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-953a1bd\" data-id=\"953a1bd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-393a99c elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"393a99c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/cont-va-1024x1024.png\" class=\"attachment-large size-large wp-image-17725\" alt=\"\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/cont-va-1024x1024.png 1024w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/cont-va-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/cont-va-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/cont-va-768x768.png 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/cont-va-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/cont-va-120x120.png 120w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/cont-va.png 1181w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a38e23 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2a38e23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-continuativo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e3e66a9\" data-id=\"e3e66a9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-23a717f elementor-widget elementor-widget-spacer\" data-id=\"23a717f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f08d99 elementor-widget elementor-widget-heading\" data-id=\"0f08d99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Continuit\u00e0 a Dinamicit\u00e0<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32a3003 elementor-widget elementor-widget-text-editor\" data-id=\"32a3003\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Come suggerisce il nome, questo tipo di assessment \u00e8 <strong>continuo<\/strong> e dinamico.\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-946ca55 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"946ca55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"1000\" viewBox=\"0 0 750 749.999995\" height=\"1000\" preserveAspectRatio=\"xMidYMid meet\"><defs><clipPath id=\"69764ab4ca\"><path d=\"M 60 101.808594 L 698 101.808594 L 698 643.308594 L 60 643.308594 Z M 60 101.808594 \" clip-rule=\"nonzero\"><\/path><\/clipPath><\/defs><rect x=\"-75\" width=\"900\" fill=\"#ffffff\" y=\"-74.999999\" height=\"899.999994\" fill-opacity=\"1\"><\/rect><rect x=\"-75\" width=\"900\" fill=\"#ffffff\" y=\"-74.999999\" height=\"899.999994\" fill-opacity=\"1\"><\/rect><rect x=\"-75\" width=\"900\" fill=\"#ffffff\" y=\"-74.999999\" height=\"899.999994\" fill-opacity=\"1\"><\/rect><g clip-path=\"url(#69764ab4ca)\"><path fill=\"#10c610\" d=\"M 278.089844 643.265625 C 277.898438 643.265625 277.707031 643.257812 277.515625 643.257812 L 277.402344 643.253906 C 275.070312 643.191406 272.75 642.769531 270.519531 641.984375 C 239.886719 631.222656 218.75 613.464844 192.589844 586.433594 C 176.453125 569.746094 161.566406 553.019531 148.355469 536.699219 L 148.273438 536.597656 C 117.285156 500.628906 93.570312 469.675781 66.398438 429.71875 C 58.132812 417.566406 59.332031 402.039062 69.953125 383.554688 L 70.042969 383.40625 C 73.878906 376.230469 77.582031 370.738281 81.691406 366.117188 L 84.621094 362.816406 L 84.421875 362.511719 C 97.191406 345.75 116.292969 324.566406 138.488281 324.566406 C 141.242188 324.566406 144.023438 324.902344 146.753906 325.566406 C 155.484375 327.699219 163.9375 333.5625 169.375 341.261719 L 169.558594 341.53125 L 169.769531 341.773438 C 180.34375 353.691406 190.527344 366.519531 200.378906 378.925781 C 214.363281 396.535156 228.804688 414.726562 244.851562 431 C 245.511719 431.710938 247.632812 433.953125 249.390625 435.328125 C 254.621094 439.441406 259.464844 442.84375 265.707031 442.84375 C 272.574219 442.84375 279.589844 438.863281 291.585938 428.136719 C 321.335938 401.535156 351.148438 371.585938 379.976562 342.621094 C 401.757812 320.734375 424.28125 298.109375 446.789062 276.894531 C 475.117188 250.203125 552.367188 182.777344 582.902344 157.242188 C 607.738281 136.472656 630.28125 118.0625 654.59375 103.058594 C 655.949219 102.226562 657.699219 101.800781 659.808594 101.800781 C 667.390625 101.800781 677.515625 107.269531 682.203125 112.378906 C 688.34375 119.050781 691.425781 122.402344 693.167969 126.164062 C 694.925781 129.945312 695.597656 134.703125 696.9375 144.179688 C 697.550781 148.453125 696.160156 152.96875 693.234375 156.253906 C 662.09375 191.160156 608.332031 252.671875 560.898438 306.9375 L 560.789062 307.0625 C 536.558594 334.785156 513.679688 360.960938 497.398438 379.484375 C 456.351562 426.183594 427.019531 466.1875 393.0625 512.507812 C 376.277344 535.394531 358.921875 559.070312 338.320312 586.097656 L 338.15625 586.3125 C 323.765625 607.128906 310.3125 622.96875 297.035156 634.738281 C 294.378906 637.089844 291.464844 639.113281 288.378906 640.75 C 285.273438 642.398438 281.71875 643.265625 278.089844 643.265625 \" fill-opacity=\"1\" fill-rule=\"nonzero\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">La scansione  viene eseguita regolarmente o in tempo reale per garantire che le nuove vulnerabilit\u00e0 vengano identificate appena emergono.<br><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"1000\" viewBox=\"0 0 750 749.999995\" height=\"1000\" preserveAspectRatio=\"xMidYMid meet\"><defs><clipPath id=\"69764ab4ca\"><path d=\"M 60 101.808594 L 698 101.808594 L 698 643.308594 L 60 643.308594 Z M 60 101.808594 \" clip-rule=\"nonzero\"><\/path><\/clipPath><\/defs><rect x=\"-75\" width=\"900\" fill=\"#ffffff\" y=\"-74.999999\" height=\"899.999994\" fill-opacity=\"1\"><\/rect><rect x=\"-75\" width=\"900\" fill=\"#ffffff\" y=\"-74.999999\" height=\"899.999994\" fill-opacity=\"1\"><\/rect><rect x=\"-75\" width=\"900\" fill=\"#ffffff\" y=\"-74.999999\" height=\"899.999994\" fill-opacity=\"1\"><\/rect><g clip-path=\"url(#69764ab4ca)\"><path fill=\"#10c610\" d=\"M 278.089844 643.265625 C 277.898438 643.265625 277.707031 643.257812 277.515625 643.257812 L 277.402344 643.253906 C 275.070312 643.191406 272.75 642.769531 270.519531 641.984375 C 239.886719 631.222656 218.75 613.464844 192.589844 586.433594 C 176.453125 569.746094 161.566406 553.019531 148.355469 536.699219 L 148.273438 536.597656 C 117.285156 500.628906 93.570312 469.675781 66.398438 429.71875 C 58.132812 417.566406 59.332031 402.039062 69.953125 383.554688 L 70.042969 383.40625 C 73.878906 376.230469 77.582031 370.738281 81.691406 366.117188 L 84.621094 362.816406 L 84.421875 362.511719 C 97.191406 345.75 116.292969 324.566406 138.488281 324.566406 C 141.242188 324.566406 144.023438 324.902344 146.753906 325.566406 C 155.484375 327.699219 163.9375 333.5625 169.375 341.261719 L 169.558594 341.53125 L 169.769531 341.773438 C 180.34375 353.691406 190.527344 366.519531 200.378906 378.925781 C 214.363281 396.535156 228.804688 414.726562 244.851562 431 C 245.511719 431.710938 247.632812 433.953125 249.390625 435.328125 C 254.621094 439.441406 259.464844 442.84375 265.707031 442.84375 C 272.574219 442.84375 279.589844 438.863281 291.585938 428.136719 C 321.335938 401.535156 351.148438 371.585938 379.976562 342.621094 C 401.757812 320.734375 424.28125 298.109375 446.789062 276.894531 C 475.117188 250.203125 552.367188 182.777344 582.902344 157.242188 C 607.738281 136.472656 630.28125 118.0625 654.59375 103.058594 C 655.949219 102.226562 657.699219 101.800781 659.808594 101.800781 C 667.390625 101.800781 677.515625 107.269531 682.203125 112.378906 C 688.34375 119.050781 691.425781 122.402344 693.167969 126.164062 C 694.925781 129.945312 695.597656 134.703125 696.9375 144.179688 C 697.550781 148.453125 696.160156 152.96875 693.234375 156.253906 C 662.09375 191.160156 608.332031 252.671875 560.898438 306.9375 L 560.789062 307.0625 C 536.558594 334.785156 513.679688 360.960938 497.398438 379.484375 C 456.351562 426.183594 427.019531 466.1875 393.0625 512.507812 C 376.277344 535.394531 358.921875 559.070312 338.320312 586.097656 L 338.15625 586.3125 C 323.765625 607.128906 310.3125 622.96875 297.035156 634.738281 C 294.378906 637.089844 291.464844 639.113281 288.378906 640.75 C 285.273438 642.398438 281.71875 643.265625 278.089844 643.265625 \" fill-opacity=\"1\" fill-rule=\"nonzero\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Fornisce una visione aggiornata e in tempo reale della postura di sicurezza, permettendo all'organizzazione di reagire rapidamente alle nuove minacce.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0191c41 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0191c41\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a19fa37\" data-id=\"a19fa37\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ea53b90 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ea53b90\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-200050a\" data-id=\"200050a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54d90bc extended-height elementor-widget elementor-widget-image\" data-id=\"54d90bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"600\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/monitoring-siem-analisi-dati-1024x600.jpg\" class=\"attachment-large size-large wp-image-13245\" alt=\"Monitoring SIEM Analisi dati\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/monitoring-siem-analisi-dati-1024x600.jpg 1024w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/monitoring-siem-analisi-dati-300x176.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/monitoring-siem-analisi-dati-768x450.jpg 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/monitoring-siem-analisi-dati.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-855c9fb\" data-id=\"855c9fb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15f650e elementor-widget elementor-widget-heading\" data-id=\"15f650e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.cyberfero.com\/it\/penetration-test-automatizzato-continuativo\/\">Penetration test automatizzato continuativo dell'infrastruttura - Breach &amp; Attack Simulation (BAS)<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-402b8a3 elementor-widget elementor-widget-text-editor\" data-id=\"402b8a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dovrebbe essere una pratica ricorrente, testare quelle che potrebbero essere le debolezze del sistema e assicurarsi che non ci siano possibili brecce nel perimetro della rete aziendale.<\/p><p>Proprio in quest&#8217;ottica, entra in gioco uno strumento di grande utilit\u00e0 nel controllo della situazione: i <strong>penetration test automatizzati continuativi.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a6c43d0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a6c43d0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c80d5f6\" data-id=\"c80d5f6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9ac2a84 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"9ac2a84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/hacker.svg\" class=\"attachment-full size-full wp-image-14141\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Simulazione verosimile<\/h3><p class=\"elementor-image-box-description\">L'attacco di prova, effettuato in ambiente controllato e quindi a <i>rischio zero<\/i>, viene eseguito come avverrebbe nel mondo reale: <b>direttamente dalla rete, senza credenziali conosciute, proprio come farebbe un hacker<\/b>.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-27cfb3a\" data-id=\"27cfb3a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a76f0df elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"a76f0df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/availability.svg\" class=\"attachment-full size-full wp-image-14143\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Nessuna interruzzione di servizio<\/h3><p class=\"elementor-image-box-description\">Lo scopo \u00e8 quello di non farsi notare, per questo assicuriamo che il processo non interromper\u00e0 il servizio, simulando le tecniche che userebbe un malintenzionato. <b>L'attaccante cercherebbe di non essere notato, cos\u00ec faremo anche noi<\/b>.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c8fbcbd\" data-id=\"c8fbcbd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4cb16be elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"4cb16be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/report.svg\" class=\"attachment-full size-full wp-image-14145\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Reporting e correzione  errori<\/h3><p class=\"elementor-image-box-description\">Il servizio fornisce un rapporto dettagliato di ogni passaggio del vettore di attacco. Da questo, <b>stiliamo una lista delle vulnerabilit\u00e0 con relativa mitigazione da mettere in pratica secondo le priorit\u00e0 di rischio<\/b>.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2771af4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2771af4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c467f7d\" data-id=\"c467f7d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b3ebe2 elementor-widget elementor-widget-heading\" data-id=\"8b3ebe2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Confronto con il Pentest manuale<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d64a0aa elementor-widget elementor-widget-html\" data-id=\"d64a0aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<table class=\"tabella\">\n<thead class=\"testata\">\n    <th>Pentest<\/th>\n    <th>Manuale<\/th>\n    <th>Automatizzato<\/th>\n<\/thead>\n<tbody>\n<tr>\n<th>Durata<\/th>\n<td>Pochi giorni<\/td>\n<td>Continuato nel tempo<\/td>\n<\/tr>\n<tr>\n<th>Tecniche usate<\/th>\n<td>Limitate alla conosceza del tester<\/td>\n<td>Sempre aggiornate. Non sono implementati scenari inverosimili<\/td>\n<\/tr>\n<tr>\n<th>Copertura<\/th>\n<td>Parziale, circostanziale<\/td>\n<td>Completa<\/td>\n<\/tr>\n<tr>\n<th>Abilit\u00e0 di esecuzione<\/th>\n<td>Fluttuante<\/td>\n<td>Coerente<\/td>\n<\/tr>\n<tr>\n<th>Rischi<\/th>\n<td>Potrebbe causare downtime<\/td>\n<td>Nessun rischio<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6000705 elementor-widget elementor-widget-text-editor\" data-id=\"6000705\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Attenzione:<\/strong> Il pentest continuativo non esclude quello manuale, che invece \u00e8 buona norma pianificare regolarmente. <strong>I due servizi non si escludono ma si completano vicendevolmente.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-442ae92\" data-id=\"442ae92\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-72c2088 elementor-widget elementor-widget-image\" data-id=\"72c2088\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"756\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/05\/advanced-persistent-threat-laptop-1024x756.jpg\" class=\"attachment-large size-large wp-image-13736\" alt=\"Advanced Persistent Threat hacker\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/05\/advanced-persistent-threat-laptop-1024x756.jpg 1024w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/05\/advanced-persistent-threat-laptop-300x222.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/05\/advanced-persistent-threat-laptop-768x567.jpg 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/05\/advanced-persistent-threat-laptop.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-838c0e6 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"838c0e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/penetration-test-automatizzato-continuativo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cbe7993 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cbe7993\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-93a9ff5\" data-id=\"93a9ff5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-94f287c elementor-widget elementor-widget-heading\" data-id=\"94f287c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.cyberfero.com\/it\/web-app-continuos-penetration-testing\/\">Penetration test automatizzato continuo dell'applicazione<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8632511 elementor-widget elementor-widget-text-editor\" data-id=\"8632511\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Se richiesto, monitoriamo costantemente le vostre applicazioni web e le API per verificare che siano sempre a prova di attacco<\/strong>.<\/p><p>Ogni modifica al codice \u00e8 rapidamente testata, verificata e inviata al vostro team con SLA libero da falsi positivi.<\/p><p>Sempre incluso: <strong>Accesso illimitato 24\/7 ai nostri analisti della sicurezza per un pentesting personalizzabile e consapevole delle minacce.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6f7f91b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6f7f91b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-327a977\" data-id=\"327a977\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21c8e5b elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"21c8e5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/verified.svg\" class=\"attachment-full size-full wp-image-13902\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><span class=\"elementor-image-box-title\">Nessun falso positivo<\/span><p class=\"elementor-image-box-description\">Garanzia di rimborso per\nun solo falso positivo.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-2c4f88b\" data-id=\"2c4f88b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2573f43 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"2573f43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/analyze.svg\" class=\"attachment-full size-full wp-image-13904\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><span class=\"elementor-image-box-title\">Test approfonditi<\/span><p class=\"elementor-image-box-description\">Business logic testing, check dei top 25 errori (SANS),\ncopertura PCI DSS e OWASP.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-993988e\" data-id=\"993988e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-147a731 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"147a731\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/monitor.svg\" class=\"attachment-full size-full wp-image-13906\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><span class=\"elementor-image-box-title\">Report sempre disponibile<\/span><p class=\"elementor-image-box-description\">Linee guida specifiche per la riparazione\ne accesso 24\/7 alle analisi.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-39877b0\" data-id=\"39877b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ce0c08f elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"ce0c08f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/clock.svg\" class=\"attachment-full size-full wp-image-13908\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><span class=\"elementor-image-box-title\">Test tempestivi<\/span><p class=\"elementor-image-box-description\">Una volta che il vostro codice \u00e8 cambiato, i nostri\nesperti lo testeranno prontamente.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-0de3d7b\" data-id=\"0de3d7b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e3436d5 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"e3436d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/system2.svg\" class=\"attachment-full size-full wp-image-13910\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><span class=\"elementor-image-box-title\">Personalizzabile<\/span><p class=\"elementor-image-box-description\">Patch virtuale WAF con un solo clic,\nSDLC e integrazione CI\/CD.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4060d4 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"e4060d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/web-app-continuos-penetration-testing\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6102afc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6102afc\" data-element_type=\"section\" data-e-type=\"section\" id=\"mobile-pentest\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-09d5518\" data-id=\"09d5518\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b2fb3ef elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b2fb3ef\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-923618d\" data-id=\"923618d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ef8823c elementor-widget elementor-widget-heading\" data-id=\"ef8823c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/mobile-app-penetration-test\/\">Mobile app pentest e code review<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3368b2 elementor-widget elementor-widget-text-editor\" data-id=\"d3368b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Contribuendo a rendere la nostra vita quotidiana pi\u00f9 facile e pi\u00f9 produttiva, i dispositivi e le <em>mobile app<\/em> sono diventati indispensabili.<\/p><p>Tuttavia, <strong>la quantit\u00e0 di dati che elaborano significa che sono comunemente presi di mira dai criminali informatici<\/strong>. Se la tua azienda ha sviluppato un software che viene utilizzato dai tuoi dipendenti o clienti, \u00e8 indispensabile verificare che rispetti degli standard minimi di sicurezza. <strong>In aggiunta al nostro servizio di pentesting, da oggi \u00e8 possibile richiedere anche il mobile app penetration test<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8199137\" data-id=\"8199137\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54810a5 extended-height elementor-widget elementor-widget-image\" data-id=\"54810a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/web-app-penetration-testing-1024x683.jpg\" class=\"attachment-large size-large wp-image-13950\" alt=\"\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/web-app-penetration-testing-1024x683.jpg 1024w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/web-app-penetration-testing-300x200.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/web-app-penetration-testing-768x512.jpg 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/web-app-penetration-testing.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d48cea5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d48cea5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-e6b68c8\" data-id=\"e6b68c8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c758228 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"c758228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/security.png\" class=\"attachment-full size-full wp-image-12081\" alt=\"Mobile app penetration test\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/security.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/security-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/security-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/security-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/security-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><span class=\"elementor-image-box-title\">Riduci i rischi di <i>exploit<\/i><\/span><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-287445e\" data-id=\"287445e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e8aaaeb elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"e8aaaeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/head.png\" class=\"attachment-full size-full wp-image-12083\" alt=\"Mobile app penetration test - reverse engineering\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/head.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/head-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/head-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/head-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/head-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><span class=\"elementor-image-box-title\">Previeni il <i>reverse engineering<\/i><\/span><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-bd38d98\" data-id=\"bd38d98\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ed65952 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"ed65952\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/security-1.png\" class=\"attachment-full size-full wp-image-12085\" alt=\"Mobile app penetration test - privacy e sicurezza\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/security-1.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/security-1-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/security-1-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/security-1-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/security-1-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><span class=\"elementor-image-box-title\">Assicura privacy e sicurezza<\/span><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-fff3511 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"fff3511\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/mobile-app-penetration-test\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-00a27ce elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"00a27ce\" data-element_type=\"section\" data-e-type=\"section\" id=\"sicurezza-fisica\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3f63082\" data-id=\"3f63082\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c4b52c8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c4b52c8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5c82332\" data-id=\"5c82332\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8ba9c9b extended-height elementor-widget elementor-widget-image\" data-id=\"8ba9c9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/ingegneria-sociale-08-1024x682.jpg\" class=\"attachment-large size-large wp-image-12577\" alt=\"ingegneria sociale ufficio\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/ingegneria-sociale-08-1024x682.jpg 1024w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/ingegneria-sociale-08-300x200.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/ingegneria-sociale-08-768x511.jpg 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/ingegneria-sociale-08.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-93eb898\" data-id=\"93eb898\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-29da9df elementor-widget elementor-widget-heading\" data-id=\"29da9df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/\">Test di sicurezza fisica dell'azienda<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fdf1cb elementor-widget elementor-widget-text-editor\" data-id=\"4fdf1cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Vogliamo offrire un servizio completo per la sicurezza professionale. <strong>Per questo non possiamo trascurare gli attacchi che sfruttano tecniche di ingegneria sociale e manomissione fisica dei sistemi<\/strong>.<\/p><p>Tramite questi add on ai servizi di <a href=\"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/\">Vulnerability Assessment e Penetration Test<\/a>, mettiamo alla prova a 360\u00b0 la sicurezza della tua azienda, testando la sua resilienza agli attacchi di sicurezza fisica.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1363f82 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1363f82\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-5fb40c5\" data-id=\"5fb40c5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-74554e7 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"74554e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"#socialengineering\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/007-criminal.png\" class=\"attachment-full size-full wp-image-12361\" alt=\"Sicurezza fisica Social Engineer\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/007-criminal.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/007-criminal-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/007-criminal-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/007-criminal-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/007-criminal-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"#socialengineering\">Social Engineer<\/a><\/h3><p class=\"elementor-image-box-description\">L'arte di imbrogliare le persone tramite empatia o vere e proprie truffe potrebbe essere la debolezza fatale della tua azienda<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-4257ab5\" data-id=\"4257ab5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0f156a4 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"0f156a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"#rogueap\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/wifi.png\" class=\"attachment-full size-full wp-image-12363\" alt=\"sicurezza fisica Rogue AP\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/wifi.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/wifi-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/wifi-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/wifi-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/wifi-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"#rogueap\">Rogue AP<\/a><\/h3><p class=\"elementor-image-box-description\">Access point corrotti che vengono scambiati per legittimi. <i>A volte non basta essere collegati al wifi aziendale per potersi dire al sicuro<\/i><\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-8a62300\" data-id=\"8a62300\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5bcf9dc elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"5bcf9dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"#catturadati\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/008-password.png\" class=\"attachment-full size-full wp-image-12367\" alt=\"sicurezza fisica attacchi in loco\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/008-password.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/008-password-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/008-password-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/008-password-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/008-password-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"#catturadati\">Cattura dati dalla rete<\/a><\/h3><p class=\"elementor-image-box-description\">Le comunicazioni sulla rete sono davvero sicure? La VPN aziendale funziona correttamente? I dipendenti la usano sempre?<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-802a39e\" data-id=\"802a39e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ce19a88 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"ce19a88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"#dumpter\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/dustbin.png\" class=\"attachment-full size-full wp-image-12359\" alt=\"sicurezza fisica dumpster diving\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/dustbin.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/dustbin-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/dustbin-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/dustbin-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/01\/dustbin-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><a href=\"#dumpter\">Dumpster Diving<\/a><\/h3><p class=\"elementor-image-box-description\">Non si fa quasi mai caso a quello che viene gettato nel bidone della spazzatura, invece \u00e8 il caso di prestare attenzione a cosa e in che modo questo avviene<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d54487 elementor-widget elementor-widget-heading\" data-id=\"1d54487\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Attacchi in loco<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ce7f499 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ce7f499\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-9078150\" data-id=\"9078150\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12f7600 elementor-widget elementor-widget-image-box\" data-id=\"12f7600\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Manomissione delle rete<\/h3><p class=\"elementor-image-box-description\">Le aziende sono collegate alla rete telefonica e di internet come ogni altro edificio. Se si riesce ad avere accesso alle centraline e quindi alle <b>connessioni fisiche<\/b> dei cavi, \u00e8 possibile installare dei dispositivi di intercettazione dei dati passanti per uno specifico cavo. L'accesso al cavo pu\u00f2 avvenire per forzatura o sfruttando il <i>tailgating<\/i>.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f59df4c\" data-id=\"f59df4c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f0fbdf9 elementor-widget elementor-widget-image-box\" data-id=\"f0fbdf9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Tailgating<\/h3><p class=\"elementor-image-box-description\">Questa tecnica, usatissima nelle metropolitane di Londra e New York, consiste nell'<b>entrare in un edificio accodandosi a un dipendente<\/b> e sfruttando quel brevissimo lasso di tempo in cui la porta si sta chiudendo per evitare di usare campanelli o badge. Una volta dentro, le possibilit\u00e0 di attacco diventano molteplici. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-970aa61\" data-id=\"970aa61\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-773d8ad elementor-widget elementor-widget-image-box\" data-id=\"773d8ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\"><i>Shoulder Surfing<\/i><\/h3><p class=\"elementor-image-box-description\">Questa tecnica consiste nello spiare un utente che digita una password o un codice di accesso per poi riutilizzarlo in seguito. Per esempio: se le porte dell'azienda sono protette da un codice, potrebbe essere semplice aspettare che un dipendenti lo inserisca e guardare quali cifre compongono il codice. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-164f579 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"164f579\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/vulnerability-assessment-e-penetration-test\/sicurezza-fisica-add-on-al-servizio-vapt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-29210b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"29210b8\" data-element_type=\"section\" data-e-type=\"section\" id=\"phishing\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ba14a47\" data-id=\"ba14a47\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5e3ed7a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5e3ed7a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-289d1b1\" data-id=\"289d1b1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f483880 elementor-widget elementor-widget-image\" data-id=\"f483880\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"867\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/04\/business-email-compromise-phishing-1024x867.jpg\" class=\"attachment-large size-large wp-image-13613\" alt=\"Business email compromise\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/04\/business-email-compromise-phishing-1024x867.jpg 1024w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/04\/business-email-compromise-phishing-300x254.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/04\/business-email-compromise-phishing-768x650.jpg 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/04\/business-email-compromise-phishing.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-639fd8a\" data-id=\"639fd8a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3954c59 elementor-widget elementor-widget-heading\" data-id=\"3954c59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/\">Ethical Phishing\/Smishing<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fb3b8a elementor-widget elementor-widget-text-editor\" data-id=\"0fb3b8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Verifica la preparazione dei tuoi dipendenti contro gli attacchi phishing.<\/p>\n<p>Il personale \u00e8 preparato ad affrontare attacchi <i>progettati per ottenere informazioni sensibili<\/i>?<\/p>\n<p>Scoprilo con una campagna di <em>Phishing etico.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5cc87f1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5cc87f1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-01f55f1\" data-id=\"01f55f1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1181a29 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"1181a29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/phishing.png\" class=\"attachment-full size-full wp-image-10585\" alt=\"phishing\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/phishing.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/phishing-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/phishing-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/phishing-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/phishing-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Programma attacchi phishing simulati<\/h3><p class=\"elementor-image-box-description\">Attraverso l'uso di <em>phishing etico<\/em>, programma dei <i>test<\/i> per i tuoi dipendenti e verifica la loro preparazione in materia.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-994c778 elementor-position-right elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"994c778\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/business-report.png\" class=\"attachment-full size-full wp-image-10587\" alt=\"Risultati phishing etico\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/business-report.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/business-report-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/business-report-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/business-report-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/business-report-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Verifica e implementa<\/h3><p class=\"elementor-image-box-description\">Risultati alla mano, potrai verificare la resilienza dell'azienda a questo tipo di attacchi, permettendoti di implementare soluzioni <i>ad hoc<\/i>.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cbaa32a elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"cbaa32a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/presentation.png\" class=\"attachment-full size-full wp-image-10589\" alt=\"Presentazione Phishing\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/presentation.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/presentation-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/presentation-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/presentation-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/presentation-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Aiuta il tuo team<\/h3><p class=\"elementor-image-box-description\">Supporta i membri dello staff fornendo loro gli strumenti per individuare i tentativi <em>prima<\/em> che vadano a buon fine.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7962ef4\" data-id=\"7962ef4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0a4f444 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"0a4f444\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/shield.png\" class=\"attachment-full size-full wp-image-10602\" alt=\"Attacchi phishing\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/shield.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/shield-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/shield-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/shield-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/shield-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Testa la difesa della tua azienda<\/h3><p class=\"elementor-image-box-description\">Potrai verificare sul campo come i componenti della tua azienda reagiscono di fronte a una potenziale frode.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8926be2 elementor-position-right elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"8926be2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/server.svg\" class=\"attachment-full size-full wp-image-14042\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Identifica potenziali perdite di dati<\/h3><p class=\"elementor-image-box-description\">Dati alla mano, sapendo in quale settore la tua azienda mostra le pi\u00f9 difese umane pi\u00f9 deboli, saprai quale reparto difendere maggioramente.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e50a33 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"9e50a33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/kyc.png\" class=\"attachment-full size-full wp-image-10606\" alt=\"Debolezze nel comportamento\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/kyc.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/kyc-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/kyc-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/kyc-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/12\/kyc-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Scopri le cattive abitudini del team<\/h3><p class=\"elementor-image-box-description\">Moltissime persone mettono a rischio i dati aziendali senza pensare che un certo comportamento o software potrebbe esporre l'azienda. Aiuta i tuoi dipendenti a essere coscienziosi.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-da905f3 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"da905f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/testa-la-tua-azienda-con-attacchi-di-phishing-etico\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-497a700 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"497a700\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8216af5\" data-id=\"8216af5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ea4781 elementor-widget elementor-widget-heading\" data-id=\"3ea4781\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Posture Guard<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-169962d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"169962d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[{&quot;id&quot;:17581,&quot;url&quot;:&quot;https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/sfondo-3.png&quot;}],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b3d0c38\" data-id=\"b3d0c38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f8f992b elementor-widget elementor-widget-heading\" data-id=\"f8f992b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><span data-elementor-setting-key=\"title\" data-pen-placeholder=\"Digita qui...\" style=\"padding-bottom: 20px;line-height: 50px;clear: none;text-align: center\">IL SERVIZIO PIONIERE DELLA SIMULAZIONE DI VIOLAZIONI ED ATTACCHI<\/span><span style=\"color: var( --e-global-color-primary );font-family: var( --e-global-typography-primary-font-family ), Sans-serif;font-weight: var( --e-global-typography-primary-font-weight )\"><\/span><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8fd4f0 elementor-widget elementor-widget-text-editor\" data-id=\"c8fd4f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 style=\"color: var( --e-global-color-primary ); font-family: var( --e-global-typography-primary-font-family ), Sans-serif; font-weight: var( --e-global-typography-primary-font-weight );\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Digita qui...\">Aumentiamo la sicurezza informatica della tua azienda ottenendo informazioni utili per rafforzare la sua resilienza , 24 ore su 24, 7 giorni su 7.<\/h3><div>\u00a0<\/div><div>Offriamo una visione accentrata del rischio informatico e delle informazioni necessarie per misurare e ridurre continuamente l&#8217;esposizione alla minacce, diminuendo di conseguenza il rischio di attacchi.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8ab982a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8ab982a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-bc114d0\" data-id=\"bc114d0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cc7463f elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"cc7463f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"625\" height=\"625\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/3.png\" class=\"attachment-full size-full wp-image-17560\" alt=\"\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/3.png 625w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/3-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/3-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/3-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/3-120x120.png 120w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Protezione<\/h3><p class=\"elementor-image-box-description\">Rendiamo ancora pi\u00f9 sicuri i tuoi sistemi di sicurezza informatica riducendo cos\u00ec il rischio di attacchi.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-b718998\" data-id=\"b718998\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-22d314b elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"22d314b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"625\" height=\"625\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/4.png\" class=\"attachment-full size-full wp-image-17562\" alt=\"\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/4.png 625w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/4-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/4-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/4-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/4-120x120.png 120w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Scoperta<\/h3><p class=\"elementor-image-box-description\">Scopriamo ed eliminiamo i percorsi di attacco alle risorse critiche.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-3ad40d5\" data-id=\"3ad40d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dc99358 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"dc99358\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"625\" height=\"625\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/5.png\" class=\"attachment-full size-full wp-image-17564\" alt=\"\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/5.png 625w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/5-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/5-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/5-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/08\/5-120x120.png 120w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Ottimizzazione<\/h3><p class=\"elementor-image-box-description\">Ottimizziamo le funzionalit\u00e0 di rilevamento e risposta agli attacchi.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c29b1c4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c29b1c4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2e7a68d\" data-id=\"2e7a68d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-910bcb1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"910bcb1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-7a0b63d\" data-id=\"7a0b63d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e930b62 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"e930b62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/posture-guard\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-4655d66 elementor-widget elementor-widget-heading\" data-id=\"4655d66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-xxl\">Defence<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e3e2563 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e3e2563\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-069a310\" data-id=\"069a310\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-014661c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"014661c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-83f0230\" data-id=\"83f0230\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-263f6d4 elementor-widget elementor-widget-heading\" data-id=\"263f6d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.cyberfero.com\/it\/soc-as-a-service\/\">SOC as a Service [XDDR]<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a07e440 elementor-widget elementor-widget-text-editor\" data-id=\"a07e440\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Il servizio SOCaaS[XDDR] combina strumenti avanzati per monitorare e proteggere la tua rete aziendale e i tuoi dispositivi. Questa&nbsp;<span style=\"font-weight: bold;\">soluzione assicura che la tua azienda sia protetta da minacce informatiche, sia a livello di rete che a livello di singoli dispositivi.<\/span><\/p>\n<p>SOC as a Service [XDDR] \u00e8 una soluzione avanzata di Managed Detection &amp; Response (MDR) che offre un servizio completo e professionale per l&#8217;identificazione e la risoluzione delle problematiche di sicurezza informatica. Grazie all&#8217;integrazione di due componenti fondamentali, SOCaaS [EDR] e SOCaaS [NDR], questo servizio raggiunge livelli di protezione senza precedenti.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-93b0062\" data-id=\"93b0062\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aa6b173 extended-height elementor-widget elementor-widget-image\" data-id=\"aa6b173\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"600\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/monitoring-siem-analisi-dati-1024x600.jpg\" class=\"attachment-large size-large wp-image-13245\" alt=\"Monitoring SIEM Analisi dati\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/monitoring-siem-analisi-dati-1024x600.jpg 1024w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/monitoring-siem-analisi-dati-300x176.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/monitoring-siem-analisi-dati-768x450.jpg 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/03\/monitoring-siem-analisi-dati.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d07212 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2d07212\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-08b51a1\" data-id=\"08b51a1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2e8ea81 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"2e8ea81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"1000\" viewBox=\"0 0 750 749.999995\" height=\"1000\" preserveAspectRatio=\"xMidYMid meet\"><defs><clipPath id=\"69764ab4ca\"><path d=\"M 60 101.808594 L 698 101.808594 L 698 643.308594 L 60 643.308594 Z M 60 101.808594 \" clip-rule=\"nonzero\"><\/path><\/clipPath><\/defs><rect x=\"-75\" width=\"900\" fill=\"#ffffff\" y=\"-74.999999\" height=\"899.999994\" fill-opacity=\"1\"><\/rect><rect x=\"-75\" width=\"900\" fill=\"#ffffff\" y=\"-74.999999\" height=\"899.999994\" fill-opacity=\"1\"><\/rect><rect x=\"-75\" width=\"900\" fill=\"#ffffff\" y=\"-74.999999\" height=\"899.999994\" fill-opacity=\"1\"><\/rect><g clip-path=\"url(#69764ab4ca)\"><path fill=\"#10c610\" d=\"M 278.089844 643.265625 C 277.898438 643.265625 277.707031 643.257812 277.515625 643.257812 L 277.402344 643.253906 C 275.070312 643.191406 272.75 642.769531 270.519531 641.984375 C 239.886719 631.222656 218.75 613.464844 192.589844 586.433594 C 176.453125 569.746094 161.566406 553.019531 148.355469 536.699219 L 148.273438 536.597656 C 117.285156 500.628906 93.570312 469.675781 66.398438 429.71875 C 58.132812 417.566406 59.332031 402.039062 69.953125 383.554688 L 70.042969 383.40625 C 73.878906 376.230469 77.582031 370.738281 81.691406 366.117188 L 84.621094 362.816406 L 84.421875 362.511719 C 97.191406 345.75 116.292969 324.566406 138.488281 324.566406 C 141.242188 324.566406 144.023438 324.902344 146.753906 325.566406 C 155.484375 327.699219 163.9375 333.5625 169.375 341.261719 L 169.558594 341.53125 L 169.769531 341.773438 C 180.34375 353.691406 190.527344 366.519531 200.378906 378.925781 C 214.363281 396.535156 228.804688 414.726562 244.851562 431 C 245.511719 431.710938 247.632812 433.953125 249.390625 435.328125 C 254.621094 439.441406 259.464844 442.84375 265.707031 442.84375 C 272.574219 442.84375 279.589844 438.863281 291.585938 428.136719 C 321.335938 401.535156 351.148438 371.585938 379.976562 342.621094 C 401.757812 320.734375 424.28125 298.109375 446.789062 276.894531 C 475.117188 250.203125 552.367188 182.777344 582.902344 157.242188 C 607.738281 136.472656 630.28125 118.0625 654.59375 103.058594 C 655.949219 102.226562 657.699219 101.800781 659.808594 101.800781 C 667.390625 101.800781 677.515625 107.269531 682.203125 112.378906 C 688.34375 119.050781 691.425781 122.402344 693.167969 126.164062 C 694.925781 129.945312 695.597656 134.703125 696.9375 144.179688 C 697.550781 148.453125 696.160156 152.96875 693.234375 156.253906 C 662.09375 191.160156 608.332031 252.671875 560.898438 306.9375 L 560.789062 307.0625 C 536.558594 334.785156 513.679688 360.960938 497.398438 379.484375 C 456.351562 426.183594 427.019531 466.1875 393.0625 512.507812 C 376.277344 535.394531 358.921875 559.070312 338.320312 586.097656 L 338.15625 586.3125 C 323.765625 607.128906 310.3125 622.96875 297.035156 634.738281 C 294.378906 637.089844 291.464844 639.113281 288.378906 640.75 C 285.273438 642.398438 281.71875 643.265625 278.089844 643.265625 \" fill-opacity=\"1\" fill-rule=\"nonzero\"><\/path><\/g><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-546a90e\" data-id=\"546a90e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-04c742f elementor-widget elementor-widget-heading\" data-id=\"04c742f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.cyberfero.com\/it\/socaas-edr-autonomous-breach-protection\/\">SOCaaS [EDR] - (Endpoint Detection and Response) <\/a><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f078f74 elementor-widget elementor-widget-text-editor\" data-id=\"f078f74\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Si focalizza sulla rilevazione e la risposta alle minacce a livello di endpoint, garantendo una protezione capillare dei dispositivi aziendali.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4a9e6c4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4a9e6c4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-fa43645\" data-id=\"fa43645\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7363638 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"7363638\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"1000\" viewBox=\"0 0 750 749.999995\" height=\"1000\" preserveAspectRatio=\"xMidYMid meet\"><defs><clipPath id=\"69764ab4ca\"><path d=\"M 60 101.808594 L 698 101.808594 L 698 643.308594 L 60 643.308594 Z M 60 101.808594 \" clip-rule=\"nonzero\"><\/path><\/clipPath><\/defs><rect x=\"-75\" width=\"900\" fill=\"#ffffff\" y=\"-74.999999\" height=\"899.999994\" fill-opacity=\"1\"><\/rect><rect x=\"-75\" width=\"900\" fill=\"#ffffff\" y=\"-74.999999\" height=\"899.999994\" fill-opacity=\"1\"><\/rect><rect x=\"-75\" width=\"900\" fill=\"#ffffff\" y=\"-74.999999\" height=\"899.999994\" fill-opacity=\"1\"><\/rect><g clip-path=\"url(#69764ab4ca)\"><path fill=\"#10c610\" d=\"M 278.089844 643.265625 C 277.898438 643.265625 277.707031 643.257812 277.515625 643.257812 L 277.402344 643.253906 C 275.070312 643.191406 272.75 642.769531 270.519531 641.984375 C 239.886719 631.222656 218.75 613.464844 192.589844 586.433594 C 176.453125 569.746094 161.566406 553.019531 148.355469 536.699219 L 148.273438 536.597656 C 117.285156 500.628906 93.570312 469.675781 66.398438 429.71875 C 58.132812 417.566406 59.332031 402.039062 69.953125 383.554688 L 70.042969 383.40625 C 73.878906 376.230469 77.582031 370.738281 81.691406 366.117188 L 84.621094 362.816406 L 84.421875 362.511719 C 97.191406 345.75 116.292969 324.566406 138.488281 324.566406 C 141.242188 324.566406 144.023438 324.902344 146.753906 325.566406 C 155.484375 327.699219 163.9375 333.5625 169.375 341.261719 L 169.558594 341.53125 L 169.769531 341.773438 C 180.34375 353.691406 190.527344 366.519531 200.378906 378.925781 C 214.363281 396.535156 228.804688 414.726562 244.851562 431 C 245.511719 431.710938 247.632812 433.953125 249.390625 435.328125 C 254.621094 439.441406 259.464844 442.84375 265.707031 442.84375 C 272.574219 442.84375 279.589844 438.863281 291.585938 428.136719 C 321.335938 401.535156 351.148438 371.585938 379.976562 342.621094 C 401.757812 320.734375 424.28125 298.109375 446.789062 276.894531 C 475.117188 250.203125 552.367188 182.777344 582.902344 157.242188 C 607.738281 136.472656 630.28125 118.0625 654.59375 103.058594 C 655.949219 102.226562 657.699219 101.800781 659.808594 101.800781 C 667.390625 101.800781 677.515625 107.269531 682.203125 112.378906 C 688.34375 119.050781 691.425781 122.402344 693.167969 126.164062 C 694.925781 129.945312 695.597656 134.703125 696.9375 144.179688 C 697.550781 148.453125 696.160156 152.96875 693.234375 156.253906 C 662.09375 191.160156 608.332031 252.671875 560.898438 306.9375 L 560.789062 307.0625 C 536.558594 334.785156 513.679688 360.960938 497.398438 379.484375 C 456.351562 426.183594 427.019531 466.1875 393.0625 512.507812 C 376.277344 535.394531 358.921875 559.070312 338.320312 586.097656 L 338.15625 586.3125 C 323.765625 607.128906 310.3125 622.96875 297.035156 634.738281 C 294.378906 637.089844 291.464844 639.113281 288.378906 640.75 C 285.273438 642.398438 281.71875 643.265625 278.089844 643.265625 \" fill-opacity=\"1\" fill-rule=\"nonzero\"><\/path><\/g><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-727d87f\" data-id=\"727d87f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fb609bf elementor-widget elementor-widget-heading\" data-id=\"fb609bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.cyberfero.com\/it\/soc-as-a-service\/\">SOCaaS [NDR] -(Network Detection and Response)<\/a><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f287dcf elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"f287dcf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Monitora e analizza il traffico di rete per rilevare e rispondere alle minacce informatiche, utilizzando tecniche avanzate di analisi, fornendo visibilit\u00e0 completa sulla rete e offrendo funzionalit\u00e0 di risposta automatizzata per contenere e mitigare le minacce in modo efficiente e proattivo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-97f7686 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"97f7686\" data-element_type=\"section\" data-e-type=\"section\" id=\"cyber-threat\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-46aace5\" data-id=\"46aace5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc40edc elementor-align-center elementor-widget elementor-widget-button\" data-id=\"fc40edc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/socaasxddr\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-dddf609 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dddf609\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-277abeb\" data-id=\"277abeb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15a9365 extended-height elementor-widget elementor-widget-image\" data-id=\"15a9365\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"756\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/05\/advanced-persistent-threat-laptop-1024x756.jpg\" class=\"attachment-large size-large wp-image-13736\" alt=\"Advanced Persistent Threat hacker\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/05\/advanced-persistent-threat-laptop-1024x756.jpg 1024w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/05\/advanced-persistent-threat-laptop-300x222.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/05\/advanced-persistent-threat-laptop-768x567.jpg 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/05\/advanced-persistent-threat-laptop.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a996eb7\" data-id=\"a996eb7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-00a9d75 elementor-widget elementor-widget-heading\" data-id=\"00a9d75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/\">Cyber Threat Intelligence<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-904b6b0 elementor-widget elementor-widget-text-editor\" data-id=\"904b6b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>La <em>Cyber Threat Intelligence<\/em> \u00e8 la conoscenza<\/strong>, basata su prove, <strong>riguardo una minaccia<\/strong> emergente o un rischio per le proprie risorse. Il servizio, svolto da un <em><a href=\"#cyber-threat-hunter\">Cyber Threat Hunter<\/a>,<\/em> <strong>parte dal presupposto che una minaccia sia presente, <i>prima<\/i> di avere le prove<\/strong>. La ricerca sfrutta gli indicatori di compromissione e altre possibili evidenze della presenza di una minaccia.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f055b28 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f055b28\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-b8a7c61\" data-id=\"b8a7c61\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-87d593e elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"87d593e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/employees.png\" class=\"attachment-full size-full wp-image-12633\" alt=\"cyber threat intelligence staff\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/employees.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/employees-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/employees-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/employees-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/employees-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Efficienza del team<\/h3><p class=\"elementor-image-box-description\"><b>34% di tempo in meno<\/b> speso dal team di sicurezza nella stesura di report<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bdf4a05 elementor-widget elementor-widget-counter\" data-id=\"bdf4a05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Minacce individuate prima dell'attacco<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\">+ <\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"500\" data-to-value=\"22\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">%<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-d396184\" data-id=\"d396184\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c47d682 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"c47d682\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/security.png\" class=\"attachment-full size-full wp-image-12631\" alt=\"cyber threat intelligence velocit\u00e0 di identificazione\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/security.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/security-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/security-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/security-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/security-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Localizzazione veloce delle minacce<\/h3><p class=\"elementor-image-box-description\"><b>Fino a 10 volte pi\u00f9 veloci<\/b> nell'identificazione di una minaccia.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5260e7 elementor-widget elementor-widget-counter\" data-id=\"e5260e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Downtime imprevisto<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\">- <\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"500\" data-to-value=\"86\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">%<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-d3e6625\" data-id=\"d3e6625\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e6a909c elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"e6a909c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/quick-response.png\" class=\"attachment-full size-full wp-image-12635\" alt=\"cyber threat intelligence soluzioni pi\u00f9 veloci\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/quick-response.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/quick-response-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/quick-response-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/quick-response-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/quick-response-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Mitigazione tempestiva<\/h3><p class=\"elementor-image-box-description\">Le minacce individuate vengono <b>soppresse pi\u00f9 velocemente<\/b>.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fa96a5 elementor-widget elementor-widget-counter\" data-id=\"9fa96a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Potenziali perdite <b>per ogni attacco<\/b> individuato in tempo<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\">\u20ac<\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"500\" data-to-value=\"1\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">M<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-f004daf elementor-align-center elementor-widget elementor-widget-button\" data-id=\"f004daf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/cyber-threat-intelligence-servizio\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fd938b7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fd938b7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-24d2e18\" data-id=\"24d2e18\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-720539b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"720539b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-eb269c9\" data-id=\"eb269c9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-808aafe extended-height elementor-widget elementor-widget-image\" data-id=\"808aafe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/sicurezza-procedurale-servizi.jpg\" class=\"attachment-large size-large wp-image-14373\" alt=\"\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/sicurezza-procedurale-servizi.jpg 1000w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/sicurezza-procedurale-servizi-300x300.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/sicurezza-procedurale-servizi-150x150.jpg 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/sicurezza-procedurale-servizi-768x768.jpg 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/sicurezza-procedurale-servizi-165x165.jpg 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/sicurezza-procedurale-servizi-120x120.jpg 120w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0c22cb8\" data-id=\"0c22cb8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bb72018 elementor-widget elementor-widget-heading\" data-id=\"bb72018\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.cyberfero.com\/it\/sicurezza-procedurale-analisi\/\">Analisi di sicurezza procedurale<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c75dced elementor-widget elementor-widget-text-editor\" data-id=\"c75dced\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>I dati in possesso delle aziende, tra cui quelli dei loro clienti, ricadono sotto <strong>norme obbligatorie<\/strong> che definiscono le procedure con cui questi dati debbano essere trattati.\u00a0<\/p><p><strong>Cyberfero<\/strong>\u00a0offre un servizio di analisi di sicurezza procedurale che verifica che le norme siano rispettate e tutti le procedure collegate siano adeguate e rispondano alle richieste imposte per legge.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8dd746e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8dd746e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-96c707c\" data-id=\"96c707c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-825f255 elementor-widget elementor-widget-image\" data-id=\"825f255\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"533\" height=\"800\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/Sicurezza-procedurale-colloquio.jpg\" class=\"attachment-large size-large wp-image-12760\" alt=\"Sicurezza procedurale colloquio\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/Sicurezza-procedurale-colloquio.jpg 533w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/Sicurezza-procedurale-colloquio-200x300.jpg 200w\" sizes=\"(max-width: 533px) 100vw, 533px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0384de0\" data-id=\"0384de0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a59fc8 elementor-widget elementor-widget-text-editor\" data-id=\"9a59fc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>L\u2019attivit\u00e0 di analisi viene svolta tramite interviste e colloqui, <\/strong>in sede o in remoto. Viene poi redatto un report e, se richiesti, vengono proposti degli interventi per l&#8217;adesione alle norme.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41bb9bb elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"41bb9bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/consultation.png\" class=\"attachment-full size-full wp-image-12752\" alt=\"sicurezza procedurale consulenze\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/consultation.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/consultation-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/consultation-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/consultation-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/consultation-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Consulenza personalizzata<\/h3><p class=\"elementor-image-box-description\">Analisi dell\u2019organizzazione della sicurezza in termini di procedure e strumenti.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b5841d elementor-position-right elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"6b5841d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/risks.png\" class=\"attachment-full size-full wp-image-12754\" alt=\"Sicurezza procedurale Rischi\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/risks.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/risks-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/risks-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/risks-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/risks-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Analisi dei rischi<\/h3><p class=\"elementor-image-box-description\">Vengono individuate le tipologie e quantit\u00e0 dei dati, di conseguenza i potenziali rischi.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44a7e92 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"44a7e92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/statistics.png\" class=\"attachment-full size-full wp-image-12758\" alt=\"Sicurezza procedurale analisi\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/statistics.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/statistics-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/statistics-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/statistics-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/statistics-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Individuazione dei punti critici<\/h3><p class=\"elementor-image-box-description\">A seguito delle analisi, si valuta quali sono i punti critici del processo di gestione dei dati.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64bc053 elementor-position-right elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"64bc053\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/file-type.png\" class=\"attachment-full size-full wp-image-12756\" alt=\"Sicurezza procedurale adeguamento\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/file-type.png 512w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/file-type-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/file-type-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/file-type-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/02\/file-type-120x120.png 120w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Adeguamento alle norme<\/h3><p class=\"elementor-image-box-description\">Vengono verificate le procedure in uso e proposte modifiche per l'adeguamento.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-95691a1 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"95691a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/sicurezza-procedurale-analisi\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-13dc48e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"13dc48e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0b69ffa\" data-id=\"0b69ffa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8bedd04 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8bedd04\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ae4deac\" data-id=\"ae4deac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-62f1443 elementor-widget elementor-widget-heading\" data-id=\"62f1443\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.cyberfero.com\/it\/servizio-security-awareness\/\">Security Awareness<\/a><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b33fef elementor-widget elementor-widget-text-editor\" data-id=\"3b33fef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Attraverso un <strong>corso interattivo di Security<\/strong> <strong>Awareness<\/strong> progettato per il <strong>personale non specialistico<\/strong> delle organizzazioni pubbliche e private, siamo in grado di sviluppare un elevato grado di <strong>consapevolezza<\/strong> nell\u2019interazione con le tecnologie digitali e con il web.<\/p><p>Una maggiore consapevolezza \u00e8 senza dubbio <strong>lo strumento principale<\/strong> per alzare il livello di sicurezza delle organizzazioni dalle minacce che arrivano dalle rete.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-afdd97b\" data-id=\"afdd97b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-86b6e67 extended-height elementor-widget elementor-widget-image\" data-id=\"86b6e67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/security-awareness-1024x683.jpg\" class=\"attachment-large size-large wp-image-14325\" alt=\"Security Awareness lessons\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/security-awareness-1024x683.jpg 1024w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/security-awareness-300x200.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/security-awareness-768x512.jpg 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/security-awareness.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5f3001c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5f3001c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-46eaabf\" data-id=\"46eaabf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-09fee9c elementor-widget elementor-widget-heading\" data-id=\"09fee9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Come si svolge il servizio<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-db0983f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"db0983f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-b8e32b4\" data-id=\"b8e32b4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e007406 elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"e007406\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"_x33_0\" height=\"512\" viewBox=\"0 0 62 62\" width=\"512\"><g><g><g><path d=\"m24 41c4.12.59 7.32 3.89 7.78 8.03l.22 1.97h-4l-1.29-6.47c-.41-2.05-2.22-3.53-4.31-3.53z\" fill=\"#b4dd7f\"><\/path><\/g><g><path d=\"m18.14 51.41c.65 3.19 3.47 5.59 6.86 5.59h10 2v4h-17l-2.37-9.46z\" fill=\"#b4dd7f\"><\/path><\/g><g><path d=\"m28 51h4 3v6h-10c-3.39 0-6.21-2.4-6.86-5.59-.09-.45-.14-.93-.14-1.41v-4.6c0-1.22.49-2.32 1.29-3.11.79-.8 1.89-1.29 3.11-1.29 2.09 0 3.9 1.48 4.31 3.53z\" fill=\"#b4dd7f\"><\/path><\/g><g><path d=\"m17.63 51.54 2.37 9.46h-5l-3.96-17.81c-.03-.13-.04-.26-.04-.39 0-.99.81-1.8 1.8-1.8h.79c.83 0 1.55.56 1.75 1.37z\" fill=\"#838f9b\"><\/path><\/g><g><path d=\"m61 5v10c0 1.1-.9 2-2 2h-7l-.76 3.03c-.14.57-.65.97-1.24.97s-1.1-.4-1.24-.97l-.76-3.03h-7c-1.1 0-2-.9-2-2v-10c0-1.1.9-2 2-2h18c1.1 0 2 .9 2 2z\" fill=\"#e6e9ed\"><\/path><\/g><g><path d=\"m48.11 8.55c.54.28.89.84.89 1.45s-.35 1.17-.89 1.45l-2.77 1.38c-.22.11-.47.17-.72.17-.9 0-1.62-.72-1.62-1.62v-2.76c0-.9.72-1.62 1.62-1.62.25 0 .5.06.72.17z\" fill=\"#ff826e\"><\/path><\/g><g><path d=\"m38 57h8c.55 0 1 .45 1 1v2c0 .55-.45 1-1 1h-9v-4z\" fill=\"#aab2bd\"><\/path><\/g><g><path d=\"m61 58v2c0 .55-.45 1-1 1h-8c-.55 0-1-.45-1-1v-2c0-.55.45-1 1-1h3 4 1c.55 0 1 .45 1 1z\" fill=\"#969faa\"><\/path><\/g><g><path d=\"m54.52 38.17 4.48 18.83h-4l-2.89-12.5c.73-.46 1.27-1.19 1.46-2.07z\" fill=\"#aab2bd\"><\/path><\/g><g><path d=\"m55 35.64c0 .24-.03.48-.08.71l-.4 1.82-.95 4.26c-.19.88-.73 1.61-1.46 2.07-.5.32-1.1.5-1.74.5h-2.28l3.66-13.43 1.94 1.45c.82.62 1.31 1.59 1.31 2.62z\" fill=\"#aab2bd\"><\/path><\/g><g><path d=\"m53 26.76c0 .16-.02.32-.06.47l-1.19 4.34-3.66 13.43-.74 2.7c-.2.77-.9 1.3-1.7 1.3h-.89c-.97 0-1.76-.79-1.76-1.76 0-.16.02-.32.06-.47l5.59-20.47c.2-.77.9-1.3 1.7-1.3h.89c.97 0 1.76.79 1.76 1.76z\" fill=\"#ccd1d9\"><\/path><\/g><g><path d=\"m37 51h1c.83 0 1.58.34 2.12.88s.88 1.29.88 2.12c0 1.66-1.34 3-3 3h-1-2v-6z\" fill=\"#f0d0b4\"><\/path><\/g><g><path d=\"m28.76 33.24c1.08 1.09 2.58 1.76 4.24 1.76h2c0 2.21-1.79 4-4 4 0-.55-.22-1.05-.59-1.41-.36-.37-.86-.59-1.41-.59-1.18 0-2.2.8-2.49 1.94l-.51 2.06h-2-1.6-.4c-2.57 0-4.82-1.38-6.03-3.45-.62-1.04-.97-2.25-.97-3.55v-1h1c.55 0 1-.45 1-1v-3.25c3.45-.89 6-4.02 6-7.75 0-2.39-1.05-4.54-2.71-6h7.71c2.18 0 4.13-.99 5.41-2.56 1.02 1.23 1.59 2.78 1.59 4.39v12.17h-8c0 1.66.67 3.16 1.76 4.24z\" fill=\"#f0d0b4\"><\/path><\/g><g><path d=\"m35 29v6h-2c-1.66 0-3.16-.67-4.24-1.76-1.09-1.08-1.76-2.58-1.76-4.24z\" fill=\"#ff826e\"><\/path><\/g><g><circle cx=\"29\" cy=\"23\" fill=\"#d3a06c\" r=\"2\"><\/circle><\/g><g><path d=\"m35 2v6c0 1.69-.59 3.23-1.59 4.44-1.28 1.57-3.23 2.56-5.41 2.56h-7.71c-.93-.82-2.05-1.43-3.29-1.75v-10.22c.31-.02.62-.03.93-.03h6.97c3.39 0 6.77-.33 10.1-1z\" fill=\"#b27946\"><\/path><\/g><g><path d=\"m15 34c0 1.3.35 2.51.97 3.55h-.01l-4.82-2.11c-3.08-1.35-5.62-3.55-7.38-6.25s-2.76-5.9-2.76-9.26c0-7.64 5.05-14.09 12-16.2v9.52c-3.45.89-6 4.02-6 7.75s2.55 6.86 6 7.75v3.25c0 .55.45 1 1 1h1z\" fill=\"#b27946\"><\/path><\/g><g><path d=\"m17 3.03v10.22c-.64-.16-1.31-.25-2-.25s-1.36.09-2 .25v-9.52-1.73c0-.55.45-1 1-1h2c.55 0 1 .45 1 1z\" fill=\"#aab2bd\"><\/path><\/g><g><path d=\"m17 28.75v3.25c0 .55-.45 1-1 1h-1-1c-.55 0-1-.45-1-1v-3.25c.64.16 1.31.25 2 .25s1.36-.09 2-.25z\" fill=\"#aab2bd\"><\/path><\/g><g><path d=\"m30.41 37.59c.37.36.59.86.59 1.41 0 1.1-.9 2-2 2h-3l.51-2.06c.29-1.14 1.31-1.94 2.49-1.94.55 0 1.05.22 1.41.59z\" fill=\"#aab2bd\"><\/path><\/g><g><path d=\"m20.29 15c1.66 1.46 2.71 3.61 2.71 6 0 3.73-2.55 6.86-6 7.75-.64.16-1.31.25-2 .25s-1.36-.09-2-.25c-3.45-.89-6-4.02-6-7.75s2.55-6.86 6-7.75c.64-.16 1.31-.25 2-.25s1.36.09 2 .25c1.24.32 2.36.93 3.29 1.75z\" fill=\"#fcd770\"><\/path><\/g><g><circle cx=\"15\" cy=\"21\" fill=\"#ffeaa7\" r=\"4\"><\/circle><\/g><\/g><g><path d=\"m15 16c-2.757 0-5 2.243-5 5s2.243 5 5 5 5-2.243 5-5-2.243-5-5-5zm0 8c-1.654 0-3-1.346-3-3s1.346-3 3-3 3 1.346 3 3-1.346 3-3 3z\"><\/path><path d=\"m29 26c1.654 0 3-1.346 3-3s-1.346-3-3-3-3 1.346-3 3 1.346 3 3 3zm0-4c.551 0 1 .449 1 1s-.449 1-1 1-1-.449-1-1 .449-1 1-1z\"><\/path><path d=\"m48.553 7.658-2.764-1.382c-.362-.18-.767-.276-1.171-.276-1.444 0-2.618 1.174-2.618 2.618v2.764c0 1.444 1.174 2.618 2.618 2.618.404 0 .809-.096 1.171-.276l2.763-1.382c.893-.446 1.448-1.343 1.448-2.342s-.555-1.896-1.447-2.342zm-.895 2.895-2.764 1.382c-.391.197-.894-.117-.894-.553v-2.764c0-.341.277-.618.618-.618.095 0 .191.022.276.065l2.764 1.382c.211.106.342.317.342.553s-.131.447-.342.553z\"><\/path><path d=\"m52 10h2v2h-2z\"><\/path><path d=\"m56 10h2v2h-2z\"><\/path><path d=\"m59 2h-18c-1.654 0-3 1.346-3 3v10c0 1.654 1.346 3 3 3h6.219l.568 2.272c.255 1.018 1.165 1.728 2.213 1.728s1.958-.71 2.213-1.728l.568-2.272h6.219c1.654 0 3-1.346 3-3v-10c0-1.654-1.346-3-3-3zm1 13c0 .551-.449 1-1 1h-7.781l-.947 3.787c-.063.251-.482.251-.545 0l-.946-3.787h-7.781c-.551 0-1-.449-1-1v-10c0-.551.449-1 1-1h18c.551 0 1 .449 1 1z\"><\/path><path d=\"m46 56h-4.556c.344-.591.556-1.268.556-2 0-2.206-1.794-4-4-4h-.246l-1.793-6.275-1.923.55 1.636 5.725h-2.78l-.12-1.083c-.313-2.817-1.773-5.28-3.909-6.917h.135c1.333 0 2.453-.88 2.842-2.085 2.356-.403 4.158-2.447 4.158-4.915v-18.171c0-1.568-.477-3.098-1.35-4.388.851-1.272 1.35-2.799 1.35-4.441v-7.22l-1.196.24c-3.253.65-6.585.98-9.903.98h-6.901c0-1.103-.897-2-2-2h-2c-1.103 0-2 .897-2 2v1.019c-7.204 2.515-12 9.21-12 16.91 0 7.123 4.217 13.57 10.742 16.425l4.549 1.99c.861 1.325 2.099 2.382 3.566 3.011-1.04.912-1.719 2.207-1.82 3.671l-.726-2.904c-.312-1.249-1.43-2.122-2.718-2.122h-.791c-1.545 0-2.802 1.257-2.802 2.802 0 .206.022.411.067.608l4.131 18.59h31.802c1.103 0 2-.897 2-2v-2c0-1.103-.897-2-2-2zm-20.274-11.27 1.188 5.942-1.621 1.621 1.414 1.414 1.707-1.707h5.586v4h-9c-3.309 0-6-2.691-6-6v-4.604c0-1.873 1.523-3.396 3.396-3.396 1.613 0 3.014 1.148 3.33 2.73zm14.274 9.27c0 1.103-.897 2-2 2h-2v-4h2c1.103 0 2 .897 2 2zm-9.213-4.862.096.862h-2.063l-1.133-5.662c-.064-.321-.157-.629-.275-.925 1.843 1.31 3.113 3.362 3.375 5.725zm-1.787-9.138h-1.719l.205-.817c.173-.697.796-1.183 1.514-1.183.551 0 1 .449 1 1s-.449 1-1 1zm4-6c-2.415 0-4.435-1.721-4.899-4h5.899v4zm-8.099-30c3.044 0 6.099-.267 9.099-.795v4.795c0 3.309-2.691 6-6 6h-7.356c-.784-.633-1.677-1.131-2.644-1.475v-8.525zm-10.901 28v-2.059c.329.037.662.059 1 .059s.671-.022 1-.059v2.059zm1-4c-3.86 0-7-3.14-7-7s3.14-7 7-7 7 3.14 7 7-3.14 7-7 7zm1-26v10.059c-.329-.037-.662-.059-1-.059s-.671.022-1 .059v-10.059zm-4.456 32.521c-5.798-2.536-9.544-8.264-9.544-14.592 0-6.605 3.966-12.387 10-14.789v7.385c-3.49 1.24-6 4.566-6 8.475s2.51 7.235 6 8.475v2.525c0 1.103.897 2 2 2 0 .574.064 1.134.179 1.674zm10.456 5.479c-3.309 0-6-2.691-6-6 1.103 0 2-.897 2-2v-2.525c3.49-1.24 6-4.565 6-8.475 0-1.849-.562-3.569-1.522-5h5.522c2.016 0 3.855-.756 5.264-1.991.475.859.736 1.828.736 2.82v11.171h-8v1c0 3.86 3.14 7 7 7h.816c-.328.919-1.086 1.627-2.036 1.884-.444-1.102-1.521-1.884-2.78-1.884-1.638 0-3.059 1.109-3.455 2.698l-.326 1.302zm-6.198 20-3.784-17.025c-.012-.056-.018-.114-.018-.173 0-.442.36-.802.802-.802h.791c.369 0 .689.25.778.608l4.348 17.392zm3.995-3.936c1.4 1.203 3.216 1.936 5.203 1.936h11v2h-15.219zm26.203 3.936h-8v-2h8z\"><\/path><path d=\"m60 56h-.21l-4.246-17.834.355-1.598c.067-.305.101-.617.101-.928 0-1.341-.64-2.621-1.712-3.424l-1.39-1.042 1.005-3.684c.064-.238.097-.482.097-.726 0-1.524-1.24-2.764-2.764-2.764h-.889c-1.243 0-2.339.837-2.667 2.037l-5.583 20.473c-.064.238-.097.482-.097.726 0 1.524 1.24 2.764 2.764 2.764h.889c1.243 0 2.339-.837 2.667-2.037l.535-1.963h1.514c.358 0 .7-.057 1.034-.139l2.34 10.139h-1.743c-1.103 0-2 .897-2 2v2c0 1.103.897 2 2 2h8c1.103 0 2-.897 2-2v-2c0-1.103-.897-2-2-2zm-13.61-8.563c-.091.332-.394.563-.737.563h-.889c-.421 0-.764-.343-.764-.764 0-.068.009-.136.027-.201l5.583-20.472c.091-.332.394-.563.737-.563h.889c.421 0 .764.343.764.764 0 .068-.009.136-.027.201zm3.01-3.437 2.932-10.751.756.567c.571.428.912 1.11.912 1.824 0 .165-.019.332-.054.495l-1.351 6.08c-.234 1.051-1.149 1.785-2.226 1.785zm3.832.893c.64-.578 1.115-1.344 1.314-2.244l.004-.018 3.184 13.369h-1.938zm-1.232 15.107v-2h8l.001 2z\"><\/path><\/g><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tFacile fruizione\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tI moduli hanno <b>cadenza mensile<\/b> e prevedono un test di valutazione finale.<br>\nSi possono fruire in formato <b>video o testo<\/b>.<br>\nSono disponibili in <b>diverse lingue<\/b>.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c091199 elementor-position-inline-end elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"c091199\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_5\" height=\"512\" viewBox=\"0 0 64 64\" width=\"512\"><g><g><g><path d=\"m2 2h60v50h-60z\" fill=\"#e6e9ed\"><\/path><\/g><g><path d=\"m40 6h18v5h-18z\" fill=\"#fcd770\"><\/path><\/g><g><path d=\"m29 22v11c0 1.46-.39 2.82-1.07 4h-5.93l-.79-3.15c2.18-.54 3.79-2.51 3.79-4.85v-8h-3.53c-2.94 0-5.84-.68-8.47-2-1.23.61-2 1.87-2 3.24v6.76c0 2.34 1.61 4.31 3.79 4.85l-.79 3.15c-1.78 0-3.42.58-4.75 1.56-1.39-1.44-2.25-3.4-2.25-5.56v-11c0-3.04 1.23-5.79 3.22-7.78s4.74-3.22 7.78-3.22c6.08 0 11 4.92 11 11z\" fill=\"#656d78\"><\/path><\/g><g><path d=\"m29 37v5.46c-4.06 1.28-7 5.07-7 9.54h-10v-4h-6v-3c0-2.64 1.28-4.98 3.25-6.44 1.33-.98 2.97-1.56 4.75-1.56l4 4 4-4h5.93z\" fill=\"#ff826e\"><\/path><\/g><g><path d=\"m33.21 42.08c4.95.59 8.79 4.81 8.79 9.92 0 5.52-4.48 10-10 10s-10-4.48-10-10c0-4.47 2.94-8.26 7-9.54.95-.3 1.95-.46 3-.46.41 0 .81.02 1.2.08z\" fill=\"#ffeaa7\"><\/path><\/g><g><path d=\"m35.11 50.55c.54.28.89.84.89 1.45s-.35 1.17-.89 1.45l-4.77 2.38c-.22.11-.47.17-.72.17-.9 0-1.62-.72-1.62-1.62v-4.76c0-.9.72-1.62 1.62-1.62.25 0 .5.06.72.17z\" fill=\"#ff826e\"><\/path><\/g><g><path d=\"m39 31v2c0 4.02-2.37 7.48-5.79 9.08h-.01c-.39-.06-.79-.08-1.2-.08-1.05 0-2.05.16-3 .46v-5.46h.88c2.42 0 4.53-1.65 5.12-4l-1.17-1.17c-.53-.53-.83-1.25-.83-2 0-.78.32-1.49.83-2s1.22-.83 2-.83h.17.17c1.56 0 2.83 1.27 2.83 2.83z\" fill=\"#f0d0b4\"><\/path><\/g><g><path d=\"m6 48h6v4h-6z\" fill=\"#f0d0b4\"><\/path><\/g><g><path d=\"m21.21 33.85.79 3.15-4 4-4-4 .79-3.15c.39.1.79.15 1.21.15h4c.42 0 .82-.05 1.21-.15z\" fill=\"#f0d0b4\"><\/path><\/g><g><path d=\"m21.47 21h3.53v8c0 2.34-1.61 4.31-3.79 4.85-.39.1-.79.15-1.21.15h-4c-.42 0-.82-.05-1.21-.15-2.18-.54-3.79-2.51-3.79-4.85v-6.76c0-1.37.77-2.63 2-3.24 2.63 1.32 5.53 2 8.47 2z\" fill=\"#f0d0b4\"><\/path><\/g><\/g><g><path d=\"m35.553 49.658-4.764-2.382c-.361-.18-.767-.276-1.171-.276-1.443 0-2.618 1.175-2.618 2.618v4.764c0 1.443 1.175 2.618 2.618 2.618.404 0 .81-.096 1.171-.276l4.765-2.382c.891-.447 1.446-1.345 1.446-2.342s-.555-1.895-1.447-2.342zm-.895 2.895-4.764 2.382c-.386.197-.894-.117-.894-.553v-4.764c0-.341.277-.618.618-.618.096 0 .191.022.276.065l4.763 2.382c.212.106.343.318.343.553s-.131.447-.342.553z\"><\/path><path d=\"m63 1h-62v52h20.051c.507 5.598 5.221 10 10.949 10s10.442-4.402 10.949-10h20.051zm-55 32v-11c0-5.514 4.486-10 10-10s10 4.486 10 10v11c0 1.043-.246 2.066-.69 3h-4.529l-.377-1.506c2.114-.929 3.596-3.041 3.596-5.494v-9h-4.528c-2.771 0-5.546-.655-8.024-1.895l-.448-.223-.447.224c-1.574.788-2.553 2.371-2.553 4.13v6.764c0 2.454 1.482 4.565 3.596 5.494l-.385 1.54c-1.367.119-2.644.552-3.768 1.215-.933-1.216-1.443-2.696-1.443-4.249zm26.535-1.879c-.34-.34-.535-.811-.535-1.293 0-1.008.82-1.828 1.828-1.828h.344c1.008 0 1.828.82 1.828 1.828v3.172c0 3.41-1.961 6.536-5.003 8.05-.329-.029-.661-.05-.997-.05-.684 0-1.35.071-2 .191v-3.201c2.834-.056 5.28-1.986 5.97-4.747l.138-.549zm-14.535 1.879h-4c-2.206 0-4-1.794-4-4v-6.764c0-.842.395-1.611 1.054-2.101 2.625 1.221 5.523 1.865 8.418 1.865h2.528v7c0 2.206-1.794 4-4 4zm-4.464 1.977c.154.011.307.023.464.023h4c.157 0 .31-.012.464-.023l.429 1.717-2.893 2.892-2.893-2.893zm-1.93 3.043 4.394 4.394 4.414-4.414h5.586v3.764c-3.794 1.488-6.567 5.018-6.949 9.236h-8.051v-9h-2v5h-4v-2c0-3.726 2.93-6.774 6.606-6.98zm-6.606 10.98h4v2h-4zm25 12c-4.963 0-9-4.037-9-9s4.037-9 9-9 9 4.037 9 9-4.037 9-9 9zm29-10h-18.051c-.391-4.307-3.275-7.895-7.193-9.325 2.634-2.06 4.244-5.254 4.244-8.675v-3.172c0-1.825-1.287-3.352-3-3.732v-10.096h-2v10.096c-1.713.38-3 1.907-3 3.732 0 1.022.398 1.984 1.121 2.707l.743.743c-.634 1.627-2.204 2.722-3.987 2.722h-.41c.339-.96.533-1.972.533-3v-11c0-6.617-5.383-12-12-12s-12 5.383-12 12v11c0 1.991.653 3.888 1.844 5.449-1.747 1.642-2.844 3.969-2.844 6.551v6h-2v-48h58z\"><\/path><circle cx=\"15\" cy=\"24\" r=\"1\"><\/circle><circle cx=\"21\" cy=\"24\" r=\"1\"><\/circle><path d=\"m19 29h-3v2h3c1.654 0 3-1.346 3-3h-2c0 .552-.448 1-1 1z\"><\/path><path d=\"m59 5h-20v7h20zm-2 5h-16v-3h16z\"><\/path><path d=\"m39 14h20v2h-20z\"><\/path><path d=\"m57 18h2v2h-2z\"><\/path><path d=\"m39 18h16v2h-16z\"><\/path><path d=\"m39 22h20v2h-20z\"><\/path><path d=\"m42 26h17v2h-17z\"><\/path><path d=\"m42 30h17v2h-17z\"><\/path><path d=\"m57 38h-2v9h-2v-11h-2v11h-2v-13h-2v13h-2v2h14v-2h-2z\"><\/path><\/g><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSemplici da seguire\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tLe lezioni sono realizzate con un <b>linguaggio semplice,<\/b> e facile da assimilare.<br>\nSono pensate per un pubblico di non esperti e quindi <b>progettate per una massima resa<\/b>.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26b9f28 elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"26b9f28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_5\" height=\"512\" viewBox=\"0 0 64 64\" width=\"512\"><g><g><g><path d=\"m2 2h60v50h-60z\" fill=\"#e6e9ed\"><\/path><\/g><g><path d=\"m40 6h18v5h-18z\" fill=\"#fcd770\"><\/path><\/g><g><path d=\"m29 22v11c0 1.46-.39 2.82-1.07 4h-5.93l-.79-3.15c2.18-.54 3.79-2.51 3.79-4.85v-8h-3.53c-2.94 0-5.84-.68-8.47-2-1.23.61-2 1.87-2 3.24v6.76c0 2.34 1.61 4.31 3.79 4.85l-.79 3.15c-1.78 0-3.42.58-4.75 1.56-1.39-1.44-2.25-3.4-2.25-5.56v-11c0-3.04 1.23-5.79 3.22-7.78s4.74-3.22 7.78-3.22c6.08 0 11 4.92 11 11z\" fill=\"#656d78\"><\/path><\/g><g><path d=\"m29 37v5.46c-4.06 1.28-7 5.07-7 9.54h-10v-4h-6v-3c0-2.64 1.28-4.98 3.25-6.44 1.33-.98 2.97-1.56 4.75-1.56l4 4 4-4h5.93z\" fill=\"#ff826e\"><\/path><\/g><g><path d=\"m33.21 42.08c4.95.59 8.79 4.81 8.79 9.92 0 5.52-4.48 10-10 10s-10-4.48-10-10c0-4.47 2.94-8.26 7-9.54.95-.3 1.95-.46 3-.46.41 0 .81.02 1.2.08z\" fill=\"#ffeaa7\"><\/path><\/g><g><path d=\"m35.11 50.55c.54.28.89.84.89 1.45s-.35 1.17-.89 1.45l-4.77 2.38c-.22.11-.47.17-.72.17-.9 0-1.62-.72-1.62-1.62v-4.76c0-.9.72-1.62 1.62-1.62.25 0 .5.06.72.17z\" fill=\"#ff826e\"><\/path><\/g><g><path d=\"m39 31v2c0 4.02-2.37 7.48-5.79 9.08h-.01c-.39-.06-.79-.08-1.2-.08-1.05 0-2.05.16-3 .46v-5.46h.88c2.42 0 4.53-1.65 5.12-4l-1.17-1.17c-.53-.53-.83-1.25-.83-2 0-.78.32-1.49.83-2s1.22-.83 2-.83h.17.17c1.56 0 2.83 1.27 2.83 2.83z\" fill=\"#f0d0b4\"><\/path><\/g><g><path d=\"m6 48h6v4h-6z\" fill=\"#f0d0b4\"><\/path><\/g><g><path d=\"m21.21 33.85.79 3.15-4 4-4-4 .79-3.15c.39.1.79.15 1.21.15h4c.42 0 .82-.05 1.21-.15z\" fill=\"#f0d0b4\"><\/path><\/g><g><path d=\"m21.47 21h3.53v8c0 2.34-1.61 4.31-3.79 4.85-.39.1-.79.15-1.21.15h-4c-.42 0-.82-.05-1.21-.15-2.18-.54-3.79-2.51-3.79-4.85v-6.76c0-1.37.77-2.63 2-3.24 2.63 1.32 5.53 2 8.47 2z\" fill=\"#f0d0b4\"><\/path><\/g><\/g><g><path d=\"m35.553 49.658-4.764-2.382c-.361-.18-.767-.276-1.171-.276-1.443 0-2.618 1.175-2.618 2.618v4.764c0 1.443 1.175 2.618 2.618 2.618.404 0 .81-.096 1.171-.276l4.765-2.382c.891-.447 1.446-1.345 1.446-2.342s-.555-1.895-1.447-2.342zm-.895 2.895-4.764 2.382c-.386.197-.894-.117-.894-.553v-4.764c0-.341.277-.618.618-.618.096 0 .191.022.276.065l4.763 2.382c.212.106.343.318.343.553s-.131.447-.342.553z\"><\/path><path d=\"m63 1h-62v52h20.051c.507 5.598 5.221 10 10.949 10s10.442-4.402 10.949-10h20.051zm-55 32v-11c0-5.514 4.486-10 10-10s10 4.486 10 10v11c0 1.043-.246 2.066-.69 3h-4.529l-.377-1.506c2.114-.929 3.596-3.041 3.596-5.494v-9h-4.528c-2.771 0-5.546-.655-8.024-1.895l-.448-.223-.447.224c-1.574.788-2.553 2.371-2.553 4.13v6.764c0 2.454 1.482 4.565 3.596 5.494l-.385 1.54c-1.367.119-2.644.552-3.768 1.215-.933-1.216-1.443-2.696-1.443-4.249zm26.535-1.879c-.34-.34-.535-.811-.535-1.293 0-1.008.82-1.828 1.828-1.828h.344c1.008 0 1.828.82 1.828 1.828v3.172c0 3.41-1.961 6.536-5.003 8.05-.329-.029-.661-.05-.997-.05-.684 0-1.35.071-2 .191v-3.201c2.834-.056 5.28-1.986 5.97-4.747l.138-.549zm-14.535 1.879h-4c-2.206 0-4-1.794-4-4v-6.764c0-.842.395-1.611 1.054-2.101 2.625 1.221 5.523 1.865 8.418 1.865h2.528v7c0 2.206-1.794 4-4 4zm-4.464 1.977c.154.011.307.023.464.023h4c.157 0 .31-.012.464-.023l.429 1.717-2.893 2.892-2.893-2.893zm-1.93 3.043 4.394 4.394 4.414-4.414h5.586v3.764c-3.794 1.488-6.567 5.018-6.949 9.236h-8.051v-9h-2v5h-4v-2c0-3.726 2.93-6.774 6.606-6.98zm-6.606 10.98h4v2h-4zm25 12c-4.963 0-9-4.037-9-9s4.037-9 9-9 9 4.037 9 9-4.037 9-9 9zm29-10h-18.051c-.391-4.307-3.275-7.895-7.193-9.325 2.634-2.06 4.244-5.254 4.244-8.675v-3.172c0-1.825-1.287-3.352-3-3.732v-10.096h-2v10.096c-1.713.38-3 1.907-3 3.732 0 1.022.398 1.984 1.121 2.707l.743.743c-.634 1.627-2.204 2.722-3.987 2.722h-.41c.339-.96.533-1.972.533-3v-11c0-6.617-5.383-12-12-12s-12 5.383-12 12v11c0 1.991.653 3.888 1.844 5.449-1.747 1.642-2.844 3.969-2.844 6.551v6h-2v-48h58z\"><\/path><circle cx=\"15\" cy=\"24\" r=\"1\"><\/circle><circle cx=\"21\" cy=\"24\" r=\"1\"><\/circle><path d=\"m19 29h-3v2h3c1.654 0 3-1.346 3-3h-2c0 .552-.448 1-1 1z\"><\/path><path d=\"m59 5h-20v7h20zm-2 5h-16v-3h16z\"><\/path><path d=\"m39 14h20v2h-20z\"><\/path><path d=\"m57 18h2v2h-2z\"><\/path><path d=\"m39 18h16v2h-16z\"><\/path><path d=\"m39 22h20v2h-20z\"><\/path><path d=\"m42 26h17v2h-17z\"><\/path><path d=\"m42 30h17v2h-17z\"><\/path><path d=\"m57 38h-2v9h-2v-11h-2v11h-2v-13h-2v13h-2v2h14v-2h-2z\"><\/path><\/g><\/g><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCoinvolgenti\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tTramite tecniche di <b>gamification<\/b> \u00e8 possibile creare una competizione virtuosa e <b>aumentare il coinvolgimento dei partecipanti<\/b>, tramite la creazione di diversi team che si sfideranno tra loro.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-589d14f\" data-id=\"589d14f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7af672e elementor-widget elementor-widget-image\" data-id=\"7af672e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/security-awareness-1024x683.jpg\" class=\"attachment-large size-large wp-image-14325\" alt=\"Security Awareness lessons\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/security-awareness-1024x683.jpg 1024w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/security-awareness-300x200.jpg 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/security-awareness-768x512.jpg 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2021\/06\/security-awareness.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea0aae5 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"ea0aae5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/servizio-security-awareness\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-27282f0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"27282f0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fbcb66f\" data-id=\"fbcb66f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dbfd300 elementor-widget elementor-widget-heading\" data-id=\"dbfd300\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Active Defense Deception<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3cb07ff elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3cb07ff\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4305b22\" data-id=\"4305b22\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d20942 elementor-widget elementor-widget-video\" data-id=\"6d20942\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;hosted&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;play_on_mobile&quot;:&quot;yes&quot;,&quot;mute&quot;:&quot;yes&quot;,&quot;loop&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-hosted-video elementor-wrapper elementor-open-inline\">\n\t\t\t\t\t<video class=\"elementor-video\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/DECEPTION-1.mp4\" autoplay=\"\" loop=\"\" muted=\"muted\" playsinline=\"\" controlsList=\"nodownload\" poster=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/deception-video-poster-kill-chain.png\"><\/video>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-585218e\" data-id=\"585218e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f3820e elementor-widget elementor-widget-heading\" data-id=\"9f3820e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Cyber Kill Chain<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e520ee elementor-widget elementor-widget-heading\" data-id=\"5e520ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Descrive le varie fasi che gli attaccanti informatici attraversano durante un attacco, dal momento in cui cercano di ottenere informazioni sul bersaglio fino al completamento dell'attacco, la Deception interviene nella prima fase.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-778c516 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"778c516\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8516bb5 elementor-widget elementor-widget-heading\" data-id=\"8516bb5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Tipologie di difesa<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13113dc elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"13113dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"1240\" height=\"1240\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/preventiva.png\" class=\"attachment-full size-full wp-image-17120\" alt=\"\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/preventiva.png 1240w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/preventiva-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/preventiva-1024x1024.png 1024w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/preventiva-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/preventiva-768x768.png 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/preventiva-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/preventiva-120x120.png 120w\" sizes=\"(max-width: 1240px) 100vw, 1240px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Difesa Preventiva<\/h3><p class=\"elementor-image-box-description\"><b>Far credere al malware iniettato di trovarsi in un ambiente poco attraente\/pericoloso, affinch\u00e9 il codice malevolo non trovi i presupposti per andare nella fase successiva dell\u2019attacco.<\/b><\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e7e13f elementor-widget-divider--view-line_icon elementor-view-default elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"6e7e13f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"1024\" viewBox=\"0 0 768 767.999994\" height=\"1024\" preserveAspectRatio=\"xMidYMid meet\"><defs><clipPath id=\"1b059e7d21\"><path d=\"M 66 101.378906 L 729.75 101.378906 L 729.75 690.878906 L 66 690.878906 Z M 66 101.378906 \" clip-rule=\"nonzero\"><\/path><\/clipPath><\/defs><g clip-path=\"url(#1b059e7d21)\"><path fill=\"#578c19\" d=\"M 401.808594 690.878906 C 102.921875 507.480469 66.214844 227.140625 66.214844 227.140625 L 133.492188 159.882812 L 191.957031 101.378906 L 608.828125 101.378906 L 729.539062 232.378906 C 729.539062 232.378906 713.804688 504.859375 401.808594 690.878906 \" fill-opacity=\"1\" fill-rule=\"nonzero\"><\/path><\/g><path fill=\"#7fcb27\" d=\"M 401.074219 635.414062 C 158.425781 486.546875 128.617188 258.917969 128.617188 258.917969 L 183.226562 204.320312 L 230.710938 156.84375 L 569.160156 156.84375 L 667.136719 263.191406 C 667.136719 263.191406 654.371094 484.398438 401.074219 635.414062 \" fill-opacity=\"1\" fill-rule=\"nonzero\"><\/path><path fill=\"#9ad31f\" d=\"M 401.679688 617.074219 C 389.566406 609.632812 378.03125 601.984375 366.992188 594.175781 C 458.335938 534.335938 524.640625 423.429688 549.757812 321.800781 C 562.316406 271.023438 566.617188 216.398438 556.417969 164.703125 L 560.5625 164.703125 L 653.191406 265.234375 C 653.191406 265.234375 641.128906 474.335938 401.679688 617.074219 \" fill-opacity=\"1\" fill-rule=\"nonzero\"><\/path><path fill=\"#87ad14\" d=\"M 405.296875 657.917969 C 405.035156 657.917969 404.773438 657.761719 404.640625 657.550781 C 404.429688 657.1875 404.535156 656.742188 404.878906 656.503906 C 413.921875 650.609375 423.074219 644.871094 432.011719 638.847656 L 445.226562 629.570312 C 449.65625 626.480469 454.089844 623.441406 458.308594 620.113281 C 466.855469 613.589844 475.5625 607.25 483.769531 600.28125 L 496.195312 590.007812 L 514.234375 573.921875 C 516.226562 572.113281 518.113281 570.203125 520.054688 568.367188 L 531.640625 557.179688 C 535.46875 553.40625 539.113281 549.453125 542.863281 545.625 C 546.585938 541.773438 550.335938 537.949219 553.847656 533.886719 L 564.574219 521.914062 L 574.824219 509.546875 C 576.527344 507.480469 578.285156 505.433594 579.9375 503.339844 L 584.785156 496.972656 C 588.011719 492.675781 591.421875 488.535156 594.460938 484.136719 L 603.742188 471.0625 C 606.757812 466.632812 609.617188 462.125 612.550781 457.671875 C 615.566406 453.246094 618.242188 448.609375 621.019531 444.050781 L 625.1875 437.210938 L 629.121094 430.242188 C 634.417969 420.992188 639.292969 411.480469 644.015625 401.894531 C 646.269531 397.070312 648.628906 392.304688 650.777344 387.429688 C 652.875 382.53125 655.105469 377.683594 657.097656 372.757812 C 661.054688 362.882812 664.855469 352.925781 668.214844 342.839844 C 669.890625 337.808594 671.648438 332.777344 673.140625 327.695312 C 674.769531 322.636719 676.183594 317.527344 677.625 312.394531 C 680.300781 302.148438 683.027344 291.90625 685.125 281.554688 C 686.226562 276.367188 687.222656 271.207031 688.113281 266.019531 C 688.769531 261.878906 689.421875 257.609375 689.921875 253.574219 C 681.925781 244.5625 673.851562 235.601562 665.957031 226.511719 L 652.929688 211.601562 L 640.003906 196.589844 C 635.703125 191.585938 631.402344 186.582031 627.15625 181.523438 L 614.441406 166.355469 C 605.996094 156.1875 597.582031 145.996094 589.375 135.597656 C 589.140625 135.28125 589.191406 134.808594 589.507812 134.546875 C 589.664062 134.417969 589.820312 134.390625 589.976562 134.390625 C 590.1875 134.390625 590.371094 134.445312 590.503906 134.574219 C 600.253906 143.535156 609.773438 152.679688 619.289062 161.847656 L 633.449219 175.683594 C 638.191406 180.292969 642.859375 184.957031 647.527344 189.621094 L 661.527344 203.613281 L 675.421875 217.707031 C 684.730469 227.085938 693.828125 236.625 703.003906 246.109375 C 704.421875 247.550781 705.074219 249.460938 704.972656 251.347656 L 704.972656 251.53125 C 704.605469 257.480469 704 262.796875 703.242188 268.324219 C 702.453125 273.800781 701.511719 279.226562 700.488281 284.648438 C 698.363281 295.46875 695.792969 306.132812 692.675781 316.664062 C 691.101562 321.929688 689.527344 327.171875 687.746094 332.359375 C 686.066406 337.570312 684.207031 342.734375 682.292969 347.867188 C 678.4375 358.113281 674.191406 368.199219 669.707031 378.183594 C 667.480469 383.160156 665.066406 388.058594 662.757812 393.011719 C 660.398438 397.9375 657.804688 402.757812 655.339844 407.632812 C 650.226562 417.273438 644.957031 426.835938 639.292969 436.136719 L 635.074219 443.15625 L 630.640625 450.046875 C 627.679688 454.609375 624.820312 459.246094 621.648438 463.671875 C 618.503906 468.152344 615.460938 472.632812 612.289062 477.0625 L 602.484375 490.132812 C 599.257812 494.535156 595.695312 498.648438 592.3125 502.894531 L 587.171875 509.234375 C 585.441406 511.332031 583.605469 513.347656 581.851562 515.417969 L 571.074219 527.679688 L 559.90625 539.546875 C 556.234375 543.554688 552.328125 547.328125 548.449219 551.128906 C 544.542969 554.902344 540.738281 558.777344 536.753906 562.445312 L 524.640625 573.347656 C 522.625 575.152344 520.65625 577.015625 518.585938 578.769531 L 512.320312 583.957031 L 499.8125 594.359375 L 486.914062 604.261719 C 478.445312 611.023438 469.453125 617.101562 460.644531 623.363281 C 456.292969 626.558594 451.703125 629.464844 447.140625 632.425781 L 433.535156 641.230469 C 424.332031 646.914062 414.945312 652.261719 405.691406 657.816406 C 405.558594 657.867188 405.429688 657.917969 405.296875 657.917969 \" fill-opacity=\"1\" fill-rule=\"nonzero\"><\/path><path fill=\"#ffffff\" d=\"M 377.191406 538.550781 C 371.632812 538.550781 365.996094 536.953125 361.039062 533.601562 L 253.675781 461.289062 C 240.410156 452.355469 236.898438 434.382812 245.835938 421.125 C 254.777344 407.894531 272.789062 404.382812 286.03125 413.316406 L 369.613281 469.621094 L 545.144531 214.773438 C 554.214844 201.621094 572.253906 198.292969 585.414062 207.359375 C 598.605469 216.421875 601.933594 234.421875 592.863281 247.574219 L 401.074219 526.027344 C 395.464844 534.175781 386.394531 538.550781 377.191406 538.550781 \" fill-opacity=\"1\" fill-rule=\"nonzero\"><\/path><\/svg><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88f445e elementor-position-right elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"88f445e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"1240\" height=\"1240\" src=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/proattiva-1.png\" class=\"attachment-full size-full wp-image-17124\" alt=\"\" srcset=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/proattiva-1.png 1240w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/proattiva-1-300x300.png 300w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/proattiva-1-1024x1024.png 1024w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/proattiva-1-150x150.png 150w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/proattiva-1-768x768.png 768w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/proattiva-1-165x165.png 165w, https:\/\/www.cyberfero.com\/wp-content\/uploads\/2023\/07\/proattiva-1-120x120.png 120w\" sizes=\"(max-width: 1240px) 100vw, 1240px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Difesa Proattiva<\/h3><p class=\"elementor-image-box-description\"><b>Rispondere dinamicamente alle minacce man mano che si evolvono, in base allo stadio di compromissione istantaneamente rilevato e modificando l'esito dell\u2019attacco stesso.<\/b><\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17d239e elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"17d239e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"#contatti\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Richiedi maggiori informazioni<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d606b66 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d606b66\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4c0358e\" data-id=\"4c0358e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-babd5d8 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"babd5d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/deception\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-60df58f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"60df58f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d012bf9\" data-id=\"d012bf9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e1346aa elementor-widget elementor-widget-heading\" data-id=\"e1346aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">vCISO <br>Virtual Chief Information Security Officer<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10e2de4 elementor-widget elementor-widget-spacer\" data-id=\"10e2de4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9d72b6b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9d72b6b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[{&quot;id&quot;:18024,&quot;url&quot;:&quot;https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/sfondo-lucchetto-1.png&quot;}],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-96d21db\" data-id=\"96d21db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0d2a160 elementor-widget elementor-widget-spacer\" data-id=\"0d2a160\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eca972e elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"eca972e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Esternalizza la gestione della tua sicurezza informatica.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c82f305 elementor-widget elementor-widget-spacer\" data-id=\"c82f305\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aaa6951 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"aaa6951\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Garantiamo una gestione esperta e proattiva, proteggendo la tua azienda <i>da minacce<\/i> e v<i>ulnerabilit\u00e0<\/i>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1d5ef4 elementor-widget elementor-widget-spacer\" data-id=\"c1d5ef4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-485db84 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"485db84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6ODg0NSwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Richiedi maggiori informazioni<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40b9dd9 elementor-widget elementor-widget-spacer\" data-id=\"40b9dd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-263ece5 elementor-align-center elementor-widget__width-initial elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"263ece5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Layer_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 507.2 507.2\" style=\"enable-background:new 0 0 507.2 507.2;\" xml:space=\"preserve\"><circle style=\"fill:#32BA7C;\" cx=\"253.6\" cy=\"253.6\" r=\"253.6\"><\/circle><path style=\"fill:#0AA06E;\" d=\"M188.8,368l130.4,130.4c108-28.8,188-127.2,188-244.8c0-2.4,0-4.8,0-7.2L404.8,152L188.8,368z\"><\/path><g>\t<path style=\"fill:#FFFFFF;\" d=\"M260,310.4c11.2,11.2,11.2,30.4,0,41.6l-23.2,23.2c-11.2,11.2-30.4,11.2-41.6,0L93.6,272.8   c-11.2-11.2-11.2-30.4,0-41.6l23.2-23.2c11.2-11.2,30.4-11.2,41.6,0L260,310.4z\"><\/path>\t<path style=\"fill:#FFFFFF;\" d=\"M348.8,133.6c11.2-11.2,30.4-11.2,41.6,0l23.2,23.2c11.2,11.2,11.2,30.4,0,41.6l-176,175.2   c-11.2,11.2-30.4,11.2-41.6,0l-23.2-23.2c-11.2-11.2-11.2-30.4,0-41.6L348.8,133.6z\"><\/path><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Accesso a Conoscenze Specializzate<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Layer_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 507.2 507.2\" style=\"enable-background:new 0 0 507.2 507.2;\" xml:space=\"preserve\"><circle style=\"fill:#32BA7C;\" cx=\"253.6\" cy=\"253.6\" r=\"253.6\"><\/circle><path style=\"fill:#0AA06E;\" d=\"M188.8,368l130.4,130.4c108-28.8,188-127.2,188-244.8c0-2.4,0-4.8,0-7.2L404.8,152L188.8,368z\"><\/path><g>\t<path style=\"fill:#FFFFFF;\" d=\"M260,310.4c11.2,11.2,11.2,30.4,0,41.6l-23.2,23.2c-11.2,11.2-30.4,11.2-41.6,0L93.6,272.8   c-11.2-11.2-11.2-30.4,0-41.6l23.2-23.2c11.2-11.2,30.4-11.2,41.6,0L260,310.4z\"><\/path>\t<path style=\"fill:#FFFFFF;\" d=\"M348.8,133.6c11.2-11.2,30.4-11.2,41.6,0l23.2,23.2c11.2,11.2,11.2,30.4,0,41.6l-176,175.2   c-11.2,11.2-30.4,11.2-41.6,0l-23.2-23.2c-11.2-11.2-11.2-30.4,0-41.6L348.8,133.6z\"><\/path><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Visione Esterna ed Obiettiva<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Layer_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 507.2 507.2\" style=\"enable-background:new 0 0 507.2 507.2;\" xml:space=\"preserve\"><circle style=\"fill:#32BA7C;\" cx=\"253.6\" cy=\"253.6\" r=\"253.6\"><\/circle><path style=\"fill:#0AA06E;\" d=\"M188.8,368l130.4,130.4c108-28.8,188-127.2,188-244.8c0-2.4,0-4.8,0-7.2L404.8,152L188.8,368z\"><\/path><g>\t<path style=\"fill:#FFFFFF;\" d=\"M260,310.4c11.2,11.2,11.2,30.4,0,41.6l-23.2,23.2c-11.2,11.2-30.4,11.2-41.6,0L93.6,272.8   c-11.2-11.2-11.2-30.4,0-41.6l23.2-23.2c11.2-11.2,30.4-11.2,41.6,0L260,310.4z\"><\/path>\t<path style=\"fill:#FFFFFF;\" d=\"M348.8,133.6c11.2-11.2,30.4-11.2,41.6,0l23.2,23.2c11.2,11.2,11.2,30.4,0,41.6l-176,175.2   c-11.2,11.2-30.4,11.2-41.6,0l-23.2-23.2c-11.2-11.2-11.2-30.4,0-41.6L348.8,133.6z\"><\/path><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Agilit\u00e0 e Velocit\u00e0 di Implementazione<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Layer_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 507.2 507.2\" style=\"enable-background:new 0 0 507.2 507.2;\" xml:space=\"preserve\"><circle style=\"fill:#32BA7C;\" cx=\"253.6\" cy=\"253.6\" r=\"253.6\"><\/circle><path style=\"fill:#0AA06E;\" d=\"M188.8,368l130.4,130.4c108-28.8,188-127.2,188-244.8c0-2.4,0-4.8,0-7.2L404.8,152L188.8,368z\"><\/path><g>\t<path style=\"fill:#FFFFFF;\" d=\"M260,310.4c11.2,11.2,11.2,30.4,0,41.6l-23.2,23.2c-11.2,11.2-30.4,11.2-41.6,0L93.6,272.8   c-11.2-11.2-11.2-30.4,0-41.6l23.2-23.2c11.2-11.2,30.4-11.2,41.6,0L260,310.4z\"><\/path>\t<path style=\"fill:#FFFFFF;\" d=\"M348.8,133.6c11.2-11.2,30.4-11.2,41.6,0l23.2,23.2c11.2,11.2,11.2,30.4,0,41.6l-176,175.2   c-11.2,11.2-30.4,11.2-41.6,0l-23.2-23.2c-11.2-11.2-11.2-30.4,0-41.6L348.8,133.6z\"><\/path><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Costi Inferiori<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af18799 elementor-widget elementor-widget-spacer\" data-id=\"af18799\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f5a747d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f5a747d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c1835f3\" data-id=\"c1835f3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7907e69 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"7907e69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/vciso\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ba86982 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ba86982\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a6138b4\" data-id=\"a6138b4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8bf2b52 elementor-widget elementor-widget-heading\" data-id=\"8bf2b52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Netwrix Auditor<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8e66159 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8e66159\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[{&quot;id&quot;:18238,&quot;url&quot;:&quot;https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/audit-1.png&quot;}],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d773abb\" data-id=\"d773abb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f622315 elementor-widget elementor-widget-spacer\" data-id=\"f622315\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88cf155 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"88cf155\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">RIDUCI IL PESO <br>ASSOCIATO <br>ALL'AUDITING IT<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c87e936 elementor-widget elementor-widget-spacer\" data-id=\"c87e936\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bb8361 elementor-widget elementor-widget-spacer\" data-id=\"4bb8361\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9fb989 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"c9fb989\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"page\" title=\"Page 2\"><div class=\"layoutArea\"><div class=\"column\"><p>Il servizio che consente di ridurre al minimo il rischio di violazione dei dati e garantisce la conformita\u0300 normativa<i> riducendo proattivamente l\u2019esposizione di dati sensibili\u00a0e rilevando tempestivamente violazioni delle policy e comportamenti sospetti degli utenti.<\/i><\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1e154a elementor-widget elementor-widget-spacer\" data-id=\"d1e154a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87bd2f3 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"87bd2f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6ODg0NSwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Richiedi maggiori informazioni<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-161d848 elementor-widget elementor-widget-spacer\" data-id=\"161d848\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0e247b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0e247b8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5343521\" data-id=\"5343521\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51564e1 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"51564e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/netwrix\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5984f30 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5984f30\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b286027\" data-id=\"b286027\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e224f53 elementor-widget elementor-widget-heading\" data-id=\"e224f53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Classification (Netwrix Data Classification)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3fc163c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3fc163c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-30d07e9\" data-id=\"30d07e9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-605f441 elementor-widget elementor-widget-spacer\" data-id=\"605f441\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6718dd4 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"6718dd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">IDENTIFICA E CLASSIFICA I DATI SENSIBILI AZIENDALI<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b01dcd elementor-widget elementor-widget-spacer\" data-id=\"8b01dcd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13dce39 elementor-widget elementor-widget-spacer\" data-id=\"13dce39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac6c4db elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ac6c4db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tDiscovery automatica dei contenuti, evidenza delle aree a rischio di sovraesposizione e riduzione del ROT (dati inutili, vecchi, duplicati). Il servizio fornisce report chiari e un piano di remediation operativo: dove sono i dati sensibili, chi pu\u00f2 accedervi e come sono protetti. Powered by Netwrix Data Classification.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33517ce elementor-widget elementor-widget-spacer\" data-id=\"33517ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e73ca3 elementor-align-left elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"1e73ca3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6ODg0NSwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Richiedi maggiori informazioni<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0787ab elementor-widget elementor-widget-spacer\" data-id=\"b0787ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4148f3b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4148f3b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dc02266\" data-id=\"dc02266\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0a70840 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"0a70840\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/data-classification-netwrix-data-classification\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-939342b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"939342b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c329508\" data-id=\"c329508\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-251de5e elementor-widget elementor-widget-heading\" data-id=\"251de5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Document Encryption &amp; Access Control<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d4f241 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d4f241\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a4af934\" data-id=\"a4af934\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-249ba92 elementor-widget elementor-widget-spacer\" data-id=\"249ba92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-034f726 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"034f726\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">PROTEGGI I DOCUMENTI, NON SOLO I SISTEMI<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9558643 elementor-widget elementor-widget-spacer\" data-id=\"9558643\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18703d8 elementor-widget elementor-widget-spacer\" data-id=\"18703d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a739a1e elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"a739a1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCifratura persistente applicata al documento: la protezione resta attiva ovunque il file venga copiato \u2014 rete interna, cloud, partner, fornitori. Permessi granulari (lettura, modifica, stampa), revoca accesso da remoto in qualsiasi momento, integrazione con Active Directory e audit completo su chi ha aperto cosa e quando.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0cb1c47 elementor-widget elementor-widget-spacer\" data-id=\"0cb1c47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee69eff elementor-align-left elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"ee69eff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6ODg0NSwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Richiedi maggiori informazioni<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c3b7d1 elementor-widget elementor-widget-spacer\" data-id=\"8c3b7d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-56a6b9d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"56a6b9d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4b01a6b\" data-id=\"4b01a6b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-109e729 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"109e729\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/document-encryption-access-control\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ew_svc_h elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ew_svc_h\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ew_svc_h_col\" data-id=\"ew_svc_h_col\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ew_svc_h_hdg elementor-widget elementor-widget-heading\" data-id=\"ew_svc_h_hdg\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Servizio di Early Warning &amp; Advisory Monitoring<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ew_svc_c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ew_svc_c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ew_svc_c_col\" data-id=\"ew_svc_c_col\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ew_svc_sp1 elementor-widget elementor-widget-spacer\" data-id=\"ew_svc_sp1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ew_svc_c_h elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"ew_svc_c_h\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">MONITORA LE MINACCE, ANTICIPA GLI ATTACCHI<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ew_svc_sp2 elementor-widget elementor-widget-spacer\" data-id=\"ew_svc_sp2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ew_svc_sp3 elementor-widget elementor-widget-spacer\" data-id=\"ew_svc_sp3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ew_svc_txt elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ew_svc_txt\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Il Servizio di Early Warning &amp; Advisory Monitoring di Cyberfero offre un monitoraggio proattivo e continuativo delle fonti OSINT, del dark web e dei feed di threat intelligence, per individuare minacce specifiche verso la tua organizzazione prima che si concretizzino in un attacco. Un team di analisti dedicati produce advisory mirati e notifiche immediate, fornendo al tuo team IT e agli organi di gestione le informazioni necessarie per agire tempestivamente e rispettare gli obblighi normativi NIS2.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ew_svc_sp4 elementor-widget elementor-widget-spacer\" data-id=\"ew_svc_sp4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ew_svc_btn_i elementor-align-left elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"ew_svc_btn_i\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6ODg0NSwidG9nZ2xlIjpmYWxzZX0%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Richiedi maggiori informazioni<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ew_svc_sp5 elementor-widget elementor-widget-spacer\" data-id=\"ew_svc_sp5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ew_svc_btn elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ew_svc_btn\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ew_svc_btn_col\" data-id=\"ew_svc_btn_col\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ew_svc_btn_w elementor-align-center elementor-widget elementor-widget-button\" data-id=\"ew_svc_btn_w\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg elementor-animation-grow\" href=\"https:\/\/www.cyberfero.com\/it\/early-warning-advisory-monitoring\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Scopri il servizio<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7e19f4c0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7e19f4c0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5b00e946\" data-id=\"5b00e946\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ae7113a elementor-widget-divider--view-line_icon elementor-view-default elementor-widget-divider--element-align-center elementor-widget elementor-widget-divider\" data-id=\"ae7113a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon elementor-divider__element\">\n\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-user-shield\"><\/i><\/div>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a1cea5 elementor-widget elementor-widget-menu-anchor\" data-id=\"7a1cea5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"contatti\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7778eff9 elementor-widget elementor-widget-heading\" data-id=\"7778eff9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Contattaci per maggiori informazioni<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-667674fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"667674fd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2a38b2aa\" data-id=\"2a38b2aa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43895425 elementor-widget elementor-widget-text-editor\" data-id=\"43895425\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Siamo a disposizione per rispondere alle tue domande e valutare insieme la tua situazione per offrirti i servizi migliori.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47673965 elementor-button-align-center elementor-widget elementor-widget-form\" data-id=\"47673965\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Successivo&quot;,&quot;step_previous_label&quot;:&quot;Precedente&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Modulo Ethical Phishing\" aria-label=\"Modulo Ethical Phishing\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"14007\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"47673965\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Panoramica servizi di Cyber Security\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"14007\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tNome\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_59dadd9 elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_59dadd9\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tTelefono\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_59dadd9]\" id=\"form-field-field_59dadd9\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Sono accettati solo numeri e caratteri telefonici (#, -, *, ecc.).\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tMessaggio\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"4\" required=\"required\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_5dab288 elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_5dab288]\" id=\"form-field-field_5dab288\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\" checked=\"checked\">\n\t\t\t\t<label for=\"form-field-field_5dab288\">Con il presente modulo accetto i termini della <a href=\"https:\/\/www.cyberfero.com\/privacy-policy\/\" target=\"_blank\">privacy policy<\/a><\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_b808c3d elementor-col-100 recaptcha_v3-bottomleft\">\n\t\t\t\t\t<div class=\"elementor-field\" id=\"form-field-field_b808c3d\"><div class=\"elementor-g-recaptcha\" data-sitekey=\"6Lc76NApAAAAAPlpHmqDBJPueP6IEqBWw3m9wdyl\" data-type=\"v3\" data-action=\"Form\" data-badge=\"bottomleft\" data-size=\"invisible\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-md elementor-animation-grow\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contattaci<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Torna all&#8217;inizio Scopri i nostri servizi di Cyber SecurityTroverai sicuramente quello che fa al caso tuo Se vuoi mantenere i dati della tua azienda al sicuro dai pericoli della rete, trovi la soluzione tra i nostri servizi dedicati alla cyber security. Tabella dei Contenuti Attack Ethical Hacking &#8211; Vulnerability Assessment &amp; Penetration Test Attraverso\u00a0 Vulnerability Assessment e Penetration Test, verifica&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-14007","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.2 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Panoramica servizi di Cyber Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Panoramica servizi di Cyber Security\" \/>\n<meta property=\"og:description\" content=\"Torna all&#8217;inizio Scopri i nostri servizi di Cyber SecurityTroverai sicuramente quello che fa al caso tuo Se vuoi mantenere i dati della tua azienda al sicuro dai pericoli della rete, trovi la soluzione tra i nostri servizi dedicati alla cyber security. Tabella dei Contenuti Attack Ethical Hacking &#8211; Vulnerability Assessment &amp; Penetration Test Attraverso\u00a0 Vulnerability Assessment e Penetration Test, verifica...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberfero\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyberfero\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-22T13:09:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/HackerSOD.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@secureod\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"23 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/servizi-di-cyber-security\\\/\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/servizi-di-cyber-security\\\/\",\"name\":\"Panoramica servizi di Cyber Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/servizi-di-cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/servizi-di-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/HackerSOD-819x1024.png\",\"datePublished\":\"2021-06-11T14:58:06+00:00\",\"dateModified\":\"2026-05-22T13:09:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/servizi-di-cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/servizi-di-cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/servizi-di-cyber-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/HackerSOD-819x1024.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/HackerSOD-819x1024.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/servizi-di-cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Panoramica servizi di Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\",\"name\":\"Cyberfero\",\"description\":\"Managed Security Service Provider\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":[\"Organization\",\"Place\",\"ProfessionalService\"],\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/#organization\",\"name\":\"Cyberfero s.r.l.\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/servizi-di-cyber-security\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/servizi-di-cyber-security\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Cyberfero\",\"https:\\\/\\\/x.com\\\/secureod\",\"https:\\\/\\\/www.instagram.com\\\/cyber_fero\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cyberfero\",\"http:\\\/\\\/www.pinterest.com\\\/cyberfero\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/secureod\"],\"address\":{\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/servizi-di-cyber-security\\\/#local-main-place-address\"},\"telephone\":[\"+39 0522 1685330\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"18:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"email\":\"info@cyberfero.com\",\"faxNumber\":\"+39 0522 015371\",\"areaServed\":\"Italia\",\"vatID\":\"03058120357\",\"taxID\":\"03058120357\",\"priceRange\":\"$$$\",\"currenciesAccepted\":\"\u20ac\",\"paymentAccepted\":\"paypal, bonifico bancario\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/servizi-di-cyber-security\\\/#local-main-place-address\",\"streetAddress\":\"Via Statuto, 3\",\"addressLocality\":\"Reggio Emilia\",\"postalCode\":\"42121\",\"addressRegion\":\"Italia\",\"addressCountry\":\"IT\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.cyberfero.com\\\/it\\\/servizi-di-cyber-security\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Color-logo-no-background.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberfero.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Color-logo-no-background.png\",\"width\":3163,\"height\":922,\"caption\":\"Cyberfero s.r.l.\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Reggio Emilia\" \/>\n<meta name=\"geo.region\" content=\"Italia\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Panoramica servizi di Cyber Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/","og_locale":"it_IT","og_type":"article","og_title":"Panoramica servizi di Cyber Security","og_description":"Torna all&#8217;inizio Scopri i nostri servizi di Cyber SecurityTroverai sicuramente quello che fa al caso tuo Se vuoi mantenere i dati della tua azienda al sicuro dai pericoli della rete, trovi la soluzione tra i nostri servizi dedicati alla cyber security. Tabella dei Contenuti Attack Ethical Hacking &#8211; Vulnerability Assessment &amp; Penetration Test Attraverso\u00a0 Vulnerability Assessment e Penetration Test, verifica...","og_url":"https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/","og_site_name":"Cyberfero","article_publisher":"https:\/\/www.facebook.com\/Cyberfero","article_modified_time":"2026-05-22T13:09:46+00:00","og_image":[{"width":1280,"height":1600,"url":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/HackerSOD.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@secureod","twitter_misc":{"Tempo di lettura stimato":"23 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/","url":"https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/","name":"Panoramica servizi di Cyber Security","isPartOf":{"@id":"https:\/\/www.cyberfero.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/HackerSOD-819x1024.png","datePublished":"2021-06-11T14:58:06+00:00","dateModified":"2026-05-22T13:09:46+00:00","breadcrumb":{"@id":"https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/#primaryimage","url":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/HackerSOD-819x1024.png","contentUrl":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2020\/06\/HackerSOD-819x1024.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberfero.com\/it\/"},{"@type":"ListItem","position":2,"name":"Panoramica servizi di Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberfero.com\/it\/#website","url":"https:\/\/www.cyberfero.com\/it\/","name":"Cyberfero","description":"Managed Security Service Provider","publisher":{"@id":"https:\/\/www.cyberfero.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberfero.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":["Organization","Place","ProfessionalService"],"@id":"https:\/\/www.cyberfero.com\/it\/#organization","name":"Cyberfero s.r.l.","url":"https:\/\/www.cyberfero.com\/it\/","logo":{"@id":"https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/#local-main-organization-logo"},"image":{"@id":"https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/Cyberfero","https:\/\/x.com\/secureod","https:\/\/www.instagram.com\/cyber_fero\/","https:\/\/www.linkedin.com\/company\/cyberfero","http:\/\/www.pinterest.com\/cyberfero","https:\/\/www.youtube.com\/user\/secureod"],"address":{"@id":"https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/#local-main-place-address"},"telephone":["+39 0522 1685330"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday"],"opens":"09:00","closes":"18:30"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Saturday","Sunday"],"opens":"00:00","closes":"00:00"}],"email":"info@cyberfero.com","faxNumber":"+39 0522 015371","areaServed":"Italia","vatID":"03058120357","taxID":"03058120357","priceRange":"$$$","currenciesAccepted":"\u20ac","paymentAccepted":"paypal, bonifico bancario"},{"@type":"PostalAddress","@id":"https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/#local-main-place-address","streetAddress":"Via Statuto, 3","addressLocality":"Reggio Emilia","postalCode":"42121","addressRegion":"Italia","addressCountry":"IT"},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberfero.com\/it\/servizi-di-cyber-security\/#local-main-organization-logo","url":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2024\/05\/Color-logo-no-background.png","contentUrl":"https:\/\/www.cyberfero.com\/wp-content\/uploads\/2024\/05\/Color-logo-no-background.png","width":3163,"height":922,"caption":"Cyberfero s.r.l."}]},"geo.placename":"Reggio Emilia","geo.region":"Italia"},"_links":{"self":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages\/14007","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/comments?post=14007"}],"version-history":[{"count":4,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages\/14007\/revisions"}],"predecessor-version":[{"id":20215,"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/pages\/14007\/revisions\/20215"}],"wp:attachment":[{"href":"https:\/\/www.cyberfero.com\/it\/wp-json\/wp\/v2\/media?parent=14007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}