{"id":5886,"date":"2020-09-08T16:11:13","date_gmt":"2020-09-08T14:11:13","guid":{"rendered":"https:\/\/www.axitea.com\/casi-studio\/la-sicurezza-informatica-nello-sfidante-mondo-della-formula-1\/"},"modified":"2021-08-26T14:26:45","modified_gmt":"2021-08-26T12:26:45","slug":"cyber-security-in-the-challenging-world-of-formula-1","status":"publish","type":"casi_di_studio","link":"https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/","title":{"rendered":"Cyber security in the challenging world of Formula 1"},"content":{"rendered":"\n\t<p>Case Study<\/p>\n<h1>\n\t\tCyber security in the challenging world of Formula 1\n\t<\/h1>\n\t\t\t\t<a href=\"https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/&#038;title=Cyber+security+in+the+challenging+world+of+Formula+1\">\n\t\t\t\t\t\t\t\t\t\t\t\tShare on Facebook\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<a href=\"https:\/\/twitter.com\/intent\/tweet?url=https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/&#038;text=Cyber+security+in+the+challenging+world+of+Formula+1\">\n\t\t\t\t\t\t\t\t\t\t\t\tShare on Twitter\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/&#038;title=Cyber+security+in+the+challenging+world+of+Formula+1\">\n\t\t\t\t\t\t\t\t\t\t\t\tShare on Linkedin\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<a href=\"mailto:?body=https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/\">\n\t\t\t\t\t\t\t\t\t\t\t\tShare on Email\n\t\t\t\t\t\t\t\t\t<\/a>\n<h2>\n\t\tMarket\n\t<\/h2>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/markets\/other-markets\/\" content=\"Other Markets\" \/><meta itemprop=\"datePublished\" content=\"2021-02-22\" \/><meta itemprop=\"dateModified\" content=\"2021-02-22\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/luca-robustelli\/\" \/><meta itemprop=\"name\" content=\"Luca Robustelli\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/altri.png\" \/><meta itemprop=\"width\" content=\"586\" \/><meta itemprop=\"height\" content=\"330\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/markets\/other-markets\/' title='Other Markets'>Other Markets<\/a><\/h3>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/markets\/other-markets\/' title='Other Markets'>Other Markets<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t\t<!-- .pp-content-posts -->\n\t\t<h4>\n\t\t\tContext\n\t\t<\/h4>\n\t\t\t<p>Computer management in the world of Formula 1 is a particularly <strong>challenging<\/strong> aspect.<br \/>In addition to the regular issues any company has to face, this sector faces some specific challenges, such as:<ul><li>intrinsic accessibility of equipment, installed in a garage rather than in a protected Data Center;<\/li><li>lare number of technologies: audio, video, telemetry and back office applications;<\/li><li>entities involved: not only team members, but also third parties;<\/li><li>speed of decision-making processes and complexity of the systems that power the dashboards.<\/li><\/ul>Therefore, all-round cyber security protection is required, relying on an external company to ensure it.<\/p>\t\t\n\t<iframe allowfullscreen allow=\"autoplay\" data-src=\"https:\/\/www.youtube.com\/embed\/JCR2cBfxPs4?feature=oembed&amp;start&amp;end&amp;wmode=opaque&amp;loop=0&amp;controls=1&amp;mute=0&amp;rel=0&amp;modestbranding=0\"><\/iframe>\t\t\n\t\t\t\t\tPlay Video\n<h2>\n\t\tThe collaboration with Axitea\n\t<\/h2>\n\t<p>Alfa Romeo Racing is a Swiss <strong>Formula 1<\/strong> team.<\/p>\n<p>Today&#8217;s Alfa Romeo Racing team takes up the legacy of the historic &#8220;Sauber F1 Team&#8221;, founded in Hinwil in 1970 by Peter Sauber, a Swiss entrepreneur.<\/p>\n<p>An F1 company generates a truly significant amount of data both at headquarters and during tests and races: from the racing car to the pits and from here to the headquarters.<\/p>\n<p>A racing car has over <strong>100 sensors<\/strong> (temperature, pressure, vibrations, etc..) that generate different data to understand the operation of all its parts, while a test car can have over 200 sensors.<\/p>\n<p>The collaboration with Axitea was fundamental for the definition and implementation of an <strong>all-encompassing<\/strong> <strong>cyber security<\/strong> solution that would help protect Alfa Romeo Racing against any <strong>unauthorized intrusions<\/strong>, <strong>espionage activities<\/strong>, and <strong>cyber attacks<\/strong>.<\/p>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Pattugliamento-1.png\" alt=\"Ico-pos-Pattugliamento\" \/>\n\t\t\t<p><\/p>\n\t\t\t\t\t<h4>Targets achieved<\/h4>\n\t\t\t\t\t<p>The collaboration between Axitea and Alfa Romeo Racing was both <strong>strategic<\/strong> and <strong>crucial<\/strong>: with its data finally safe, the Swiss team can pursue its mission, which is competing at top level in the most important racing championship in the world.<\/p>\t\t\t\t\n\t\t<h2>\n\t\t\tThe project\n\t\t<\/h2>\n\t\t\t<p>Over the two-year period of 2018-19, Axitea became a reference partner for Alfa Romeo Racing&#8217;s cyber security systems in order to protect <strong>resources<\/strong>, <strong>people<\/strong>, <strong>data<\/strong> and <strong>infrastructures<\/strong>.Thanks to <strong>advanced technologies<\/strong> and <strong>specialized consulting<\/strong>, Axitea performs holistic and integrated analysis to mitigate <strong>multifaceted risks<\/strong> and <strong>face integrated threats<\/strong>.<\/p>\t\t\n\t\t\t\t<a href=\"https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/&#038;title=Cyber+security+in+the+challenging+world+of+Formula+1\">\n\t\t\t\t\t\t\t\t\t\t\t\tShare on Facebook\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<a href=\"https:\/\/twitter.com\/intent\/tweet?url=https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/&#038;text=Cyber+security+in+the+challenging+world+of+Formula+1\">\n\t\t\t\t\t\t\t\t\t\t\t\tShare on Twitter\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/&#038;title=Cyber+security+in+the+challenging+world+of+Formula+1\">\n\t\t\t\t\t\t\t\t\t\t\t\tShare on Linkedin\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<a href=\"mailto:?body=https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/\">\n\t\t\t\t\t\t\t\t\t\t\t\tShare on Email\n\t\t\t\t\t\t\t\t\t<\/a>\n<h2>\n\t\tGovernance and Security\n\t<\/h2>\n\t<p>To ensure proper <strong>governance and security management<\/strong>, the systems designed by Axitea for Alfa Romeo Racing are based on 3 fundamental aspects:<\/p>\n<ul>\n<li><strong>Data usability<\/strong>: to ensure the continuity of networks and infrastructures;<\/li>\n<li><strong>Information content integrity<\/strong>: to ensure that content is not tampered with or deleted by mistake or voluntary action;<\/li>\n<li><strong>Confidentiality<\/strong>: to avoid data being displayed in a confidential and therefore unauthorized manner.<\/li>\n<\/ul>\n<h2>\n\t\tServices provided\n\t<\/h2>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/cyber-security\/cryptography-and-data-encryption\/\" content=\"Cryptography and Data Encryption\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2021-03-08\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/cryptography-and-data-encryption\/' title='Cryptography and Data Encryption'>Cryptography and Data Encryption<\/a><\/h3>\n        \t<p>Hard disk encryption to prevent the free reading of sensitive data in the event of PC theft.<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/cryptography-and-data-encryption\/' title='Cryptography and Data Encryption'>Cryptography and Data Encryption<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/cyber-security\/log-retention\/\" content=\"Log Retention\" \/><meta itemprop=\"datePublished\" content=\"2020-09-08\" \/><meta itemprop=\"dateModified\" content=\"2021-03-08\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/log-retention\/' title='Log Retention'>Log Retention<\/a><\/h3>\n        \t<p>Solution that allows the collection of critical events that occurred in the network, to verify causes and&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/log-retention\/' title='Log Retention'>Log Retention<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/\" content=\"Managed Endpoint Detection and Response\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2021-03-08\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/' title='Managed Endpoint Detection and Response'>Managed Endpoint Detection and Response<\/a><\/h3>\n        \t<p>Advanced network protection (PCs, Servers, mobile) from malware and network traffic control.<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/' title='Managed Endpoint Detection and Response'>Managed Endpoint Detection and Response<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/security-consulting\/risk-analysis-management\/\" content=\"Risk Analysis &#038; Management\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/security-consulting\/risk-analysis-management\/' title='Risk Analysis &#038; Management'>Risk Analysis &#038; Management<\/a><\/h3>\n        \t<p>Risk Analysis &#038; Management Assessment of the likelihood of occurrence and magnitude of potential Cyber and ICT&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/security-consulting\/risk-analysis-management\/' title='Risk Analysis &#038; Management'>Risk Analysis &#038; Management<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/cyber-security\/soc-as-a-service\/\" content=\"SOC as a Service\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2021-03-08\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/soc-as-a-service\/' title='SOC as a Service'>SOC as a Service<\/a><\/h3>\n        \t<p>Real-time monitoring of events generated by applications and corporate information systems 24\/7, as a proactive tool to&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/soc-as-a-service\/' title='SOC as a Service'>SOC as a Service<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/cyber-security\/vulnerability-analysis-and-penetration-test\/\" content=\"Vulnerability Analysis and Penetration Test\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2021-03-08\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/vulnerability-analysis-and-penetration-test\/' title='Vulnerability Analysis and Penetration Test'>Vulnerability Analysis and Penetration Test<\/a><\/h3>\n        \t<p>Test for measuring the level of protection of the IT network and digital infrastructure, in order to&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/vulnerability-analysis-and-penetration-test\/' title='Vulnerability Analysis and Penetration Test'>Vulnerability Analysis and Penetration Test<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t\t<!-- .pp-content-posts -->\n<h2>\n\t\tOther case studies\n\t<\/h2>\n\t\t\t<a href=\"https:\/\/www.axitea.com\/en\/case-studies\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\tALL CASE STUDIES\n\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/case-studies\/cold-chain-and-security-for-the-bomi-group\/\" content=\"Cold chain and security for the BOMI Group\" \/><meta itemprop=\"datePublished\" content=\"2021-03-29\" \/><meta itemprop=\"dateModified\" content=\"2021-08-26\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/valeria-deidda\/\" \/><meta itemprop=\"name\" content=\"Valeria Deidda\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs.jpeg\" \/><meta itemprop=\"width\" content=\"1700\" \/><meta itemprop=\"height\" content=\"1134\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/en\/case-studies\/cold-chain-and-security-for-the-bomi-group\/' title='Cold chain and security for the BOMI Group'><img decoding=\"async\" width=\"1700\" height=\"1134\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs.jpeg\" alt=\"\" loading=\"lazy\" itemprop=\"image\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs.jpeg 1700w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs-300x200.jpeg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs-1024x683.jpeg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs-768x512.jpeg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs.jpeg 1536w\" sizes=\"auto, (max-width: 1700px) 100vw, 1700px\" \/><\/a>\n        \t<a href=\"https:\/\/www.axitea.com\/en\/mercati-relativi\/transport\/\" rel=\"tag\">Transport<\/a>\n        <h5><a href='https:\/\/www.axitea.com\/en\/case-studies\/cold-chain-and-security-for-the-bomi-group\/' title='Cold chain and security for the BOMI Group'>Cold chain and security for the BOMI Group<\/a><\/h5>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/case-studies\/advanced-security-of-natural-gas-storage-for-ital-gas-storage\/\" content=\"Advanced security of natural gas storage for Ital Gas Storage\" \/><meta itemprop=\"datePublished\" content=\"2021-01-14\" \/><meta itemprop=\"dateModified\" content=\"2021-04-13\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/valeria-deidda\/\" \/><meta itemprop=\"name\" content=\"Valeria Deidda\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea.jpeg\" \/><meta itemprop=\"width\" content=\"1700\" \/><meta itemprop=\"height\" content=\"1134\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/en\/case-studies\/advanced-security-of-natural-gas-storage-for-ital-gas-storage\/' title='Advanced security of natural gas storage for Ital Gas Storage'><img decoding=\"async\" width=\"1700\" height=\"1134\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea.jpeg\" alt=\"\" loading=\"lazy\" itemprop=\"image\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea.jpeg 1700w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea-300x200.jpeg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea-1024x683.jpeg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea-768x513.jpeg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea.jpeg 1536w\" sizes=\"auto, (max-width: 1700px) 100vw, 1700px\" \/><\/a>\n        \t<a href=\"https:\/\/www.axitea.com\/en\/mercati-relativi\/other-markets\/\" rel=\"tag\">Other Markets<\/a>\n        <h5><a href='https:\/\/www.axitea.com\/en\/case-studies\/advanced-security-of-natural-gas-storage-for-ital-gas-storage\/' title='Advanced security of natural gas storage for Ital Gas Storage'>Advanced security of natural gas storage for Ital Gas Storage<\/a><\/h5>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/case-studies\/ensuring-store-security-in-vf-italy-retail-multibrand-stores\/\" content=\"Ensuring store security in VF Italy Retail multibrand stores\" \/><meta itemprop=\"datePublished\" content=\"2021-01-07\" \/><meta itemprop=\"dateModified\" content=\"2021-04-13\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/valeria-deidda\/\" \/><meta itemprop=\"name\" content=\"Valeria Deidda\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura.jpeg\" \/><meta itemprop=\"width\" content=\"1700\" \/><meta itemprop=\"height\" content=\"1134\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/en\/case-studies\/ensuring-store-security-in-vf-italy-retail-multibrand-stores\/' title='Ensuring store security in VF Italy Retail multibrand stores'><img decoding=\"async\" width=\"1700\" height=\"1134\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura.jpeg\" alt=\"\" loading=\"lazy\" itemprop=\"image\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura.jpeg 1700w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura-300x200.jpeg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura-1024x683.jpeg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura-768x512.jpeg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura.jpeg 1536w\" sizes=\"auto, (max-width: 1700px) 100vw, 1700px\" \/><\/a>\n        \t<a href=\"https:\/\/www.axitea.com\/en\/mercati-relativi\/retail-and-large-scale-retail-channels\/\" rel=\"tag\">Retail &amp; Large-scale retail channels<\/a>\n        <h5><a href='https:\/\/www.axitea.com\/en\/case-studies\/ensuring-store-security-in-vf-italy-retail-multibrand-stores\/' title='Ensuring store security in VF Italy Retail multibrand stores'>Ensuring store security in VF Italy Retail multibrand stores<\/a><\/h5>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/case-studies\/play-safe-at-the-casino-de-la-vallee\/\" content=\"Play safe at the Casin\u00f2 de la Vall\u00e9e\" \/><meta itemprop=\"datePublished\" content=\"2020-12-04\" \/><meta itemprop=\"dateModified\" content=\"2021-04-13\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/valeria-deidda\/\" \/><meta itemprop=\"name\" content=\"Valeria Deidda\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/12\/casino-roulette_scura.jpg\" \/><meta itemprop=\"width\" content=\"1700\" \/><meta itemprop=\"height\" content=\"1134\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/en\/case-studies\/play-safe-at-the-casino-de-la-vallee\/' title='Play safe at the Casin\u00f2 de la Vall\u00e9e'><img decoding=\"async\" width=\"1700\" height=\"1134\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/12\/casino-roulette_scura.jpg\" alt=\"\" loading=\"lazy\" itemprop=\"image\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/12\/casino-roulette_scura.jpg 1700w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/12\/casino-roulette_scura-300x200.jpg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/12\/casino-roulette_scura-1024x683.jpg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/12\/casino-roulette_scura-768x512.jpg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/12\/casino-roulette_scura-1536x1025.jpg 1536w\" sizes=\"auto, (max-width: 1700px) 100vw, 1700px\" \/><\/a>\n        \t<a href=\"https:\/\/www.axitea.com\/en\/mercati-relativi\/other-markets\/\" rel=\"tag\">Other Markets<\/a>\n        <h5><a href='https:\/\/www.axitea.com\/en\/case-studies\/play-safe-at-the-casino-de-la-vallee\/' title='Play safe at the Casin\u00f2 de la Vall\u00e9e'>Play safe at the Casin\u00f2 de la Vall\u00e9e<\/a><\/h5>\n\t\t<!-- .pp-content-posts -->\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Rilevazione-intrusione-1.png\" alt=\"Ico-pos-Rilevazione intrusione\" itemprop=\"image\" height=\"450\" width=\"450\" title=\"Ico-pos-Rilevazione intrusione\" onerror=\"this.style.display='none'\"  \/>\n\t<p>Would you like to know more on what Axitea can do for you?<\/p>\n\t<a href=\"#\" id=\"trigger-\" data-modal=\"\" data-node=\"\">\n\t\t\t\t\t\t\t\t\tContact Us\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\tPreview\n\t\t\tmodal-\n\t\t\t\t\t\t\t\t\t\t<h2><\/h2>\n\t\t\t\t\t\t<div class='_form_19'><\/div><script type='text\/javascript' src='https:\/\/axitea.activehosted.com\/f\/embed.php?static=0&id=19&69F09E06EF518&nostyles=1&preview=0'><\/script>\t\t\t\t\t\n","protected":false},"excerpt":{"rendered":"<p>Essenziale nel mondo della Formula 1, a causa della mole dei dati generati, possedere una protezione di sicurezza informatica a 360\u00b0 e affidarsi dunque a una terza parte che possa garantirla.<\/p>\n","protected":false},"featured_media":3241,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}}},"categoria_servizio":[87],"mercati-relativi":[111],"class_list":["post-5886","casi_di_studio","type-casi_di_studio","status-publish","format-standard","has-post-thumbnail","hentry","categoria_servizio-cyber-security","mercati-relativi-other-markets"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security in the challenging world of Formula 1 | Case Study | Axitea<\/title>\n<meta name=\"description\" content=\"Axitea is a Global Security Provider for physical &amp; cyber security. Read about our case study &quot;Cyber security in the challenging world of F1&quot;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security in the challenging world of Formula 1 | Case Study | Axitea\" \/>\n<meta property=\"og:description\" content=\"Axitea is a Global Security Provider for physical &amp; cyber security. Read about our case study &quot;Cyber security in the challenging world of F1&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/\" \/>\n<meta property=\"og:site_name\" content=\"AXITEA\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-26T12:26:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/case-studies\\\/cyber-security-in-the-challenging-world-of-formula-1\\\/\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/case-studies\\\/cyber-security-in-the-challenging-world-of-formula-1\\\/\",\"name\":\"Cyber Security in the challenging world of Formula 1 | Case Study | Axitea\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/case-studies\\\/cyber-security-in-the-challenging-world-of-formula-1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/case-studies\\\/cyber-security-in-the-challenging-world-of-formula-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/alfa-romeo-macchina-scaled.jpg\",\"datePublished\":\"2020-09-08T14:11:13+00:00\",\"dateModified\":\"2021-08-26T12:26:45+00:00\",\"description\":\"Axitea is a Global Security Provider for physical & cyber security. Read about our case study \\\"Cyber security in the challenging world of F1\\\"\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/case-studies\\\/cyber-security-in-the-challenging-world-of-formula-1\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.axitea.com\\\/en\\\/case-studies\\\/cyber-security-in-the-challenging-world-of-formula-1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/case-studies\\\/cyber-security-in-the-challenging-world-of-formula-1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/alfa-romeo-macchina-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/alfa-romeo-macchina-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/case-studies\\\/cyber-security-in-the-challenging-world-of-formula-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Axitea\",\"item\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber security in the challenging world of Formula 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/\",\"name\":\"AXITEA\",\"description\":\"Security Evolution\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#organization\",\"name\":\"Axitea\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/logo-axitea-colore.svg\",\"contentUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/logo-axitea-colore.svg\",\"width\":515,\"height\":217,\"caption\":\"Axitea\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security in the challenging world of Formula 1 | Case Study | Axitea","description":"Axitea is a Global Security Provider for physical & cyber security. Read about our case study \"Cyber security in the challenging world of F1\"","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security in the challenging world of Formula 1 | Case Study | Axitea","og_description":"Axitea is a Global Security Provider for physical & cyber security. Read about our case study \"Cyber security in the challenging world of F1\"","og_url":"https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/","og_site_name":"AXITEA","article_modified_time":"2021-08-26T12:26:45+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/","url":"https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/","name":"Cyber Security in the challenging world of Formula 1 | Case Study | Axitea","isPartOf":{"@id":"https:\/\/www.axitea.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/#primaryimage"},"image":{"@id":"https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-scaled.jpg","datePublished":"2020-09-08T14:11:13+00:00","dateModified":"2021-08-26T12:26:45+00:00","description":"Axitea is a Global Security Provider for physical & cyber security. Read about our case study \"Cyber security in the challenging world of F1\"","breadcrumb":{"@id":"https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/#primaryimage","url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-scaled.jpg","contentUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Axitea","item":"https:\/\/www.axitea.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber security in the challenging world of Formula 1"}]},{"@type":"WebSite","@id":"https:\/\/www.axitea.com\/en\/#website","url":"https:\/\/www.axitea.com\/en\/","name":"AXITEA","description":"Security Evolution","publisher":{"@id":"https:\/\/www.axitea.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.axitea.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.axitea.com\/en\/#organization","name":"Axitea","url":"https:\/\/www.axitea.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.axitea.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg","contentUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg","width":515,"height":217,"caption":"Axitea"},"image":{"@id":"https:\/\/www.axitea.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/casi_di_studio\/5886","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/casi_di_studio"}],"about":[{"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/types\/casi_di_studio"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/media\/3241"}],"wp:attachment":[{"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/media?parent=5886"}],"wp:term":[{"taxonomy":"categoria_servizio","embeddable":true,"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/categoria_servizio?post=5886"},{"taxonomy":"mercati-relativi","embeddable":true,"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/mercati-relativi?post=5886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}