{"id":5871,"date":"2020-09-08T11:58:09","date_gmt":"2020-09-08T09:58:09","guid":{"rendered":"https:\/\/www.axitea.com\/mercati\/pubblica-amministrazione\/"},"modified":"2021-08-26T15:41:55","modified_gmt":"2021-08-26T13:41:55","slug":"public-administrations","status":"publish","type":"mercati","link":"https:\/\/www.axitea.com\/en\/markets\/public-administrations\/","title":{"rendered":"Public Administrations"},"content":{"rendered":"<h3>\n\t\tMarket\n\t<\/h3>\n<h1>\n\t\tSicurezza informatica\n\t<\/h1>\n\t<p>Privacy and cyber security: the new challenges for Public Administrations<\/p>\n\t\t<h4>\n\t\t\tThe reference scenario\n\t\t<\/h4>\n\t\t\t<p>Public administrations are undergoing a process of transformation and innovation of the services offered to citizens and businesses, especially through the use of digital technologies, with the aim of increasing efficiency, decreasing distances between public bodies and users and facilitating access to services.However, when talking about digital and IoT systems and, more generally, web platforms, we cannot fail to consider the related cyber threats. Recent hacker attacks on public bodies, including courts, universities and public entities, show that there is still a long way to go to ensure adequate levels of IT infrastructure security.With the coming of digitalization, the key assets to protect are sensitive citizen data, and their management and storage. It is therefore necessary to invest in the preparation and training of staff entrusted with data management, and the development and maintenance of IT systems.For the many services offered to citizens, web platforms (INPS etc) become attractive preys for cyber criminals, and must be properly protected against any attacks aimed at slowing down or interrupting the delivery of services offered (DDoS, ransomware).Sensitive data &#8211; this time in their &#8220;physical&#8221; form &#8211; must also be appropriately protected to prevent theft and unauthorized removal. An effective system of access control and perimeter protection of buildings is therefore essential. It is also necessary to protect buildings and public places, such as squares or parks, against vandalism.Lastly, with the Coronavirus emergency, managing access to public buildings has become a fundamental issue, as it must guarantee the customers\u2019 and employees\u2019 safety, whilst preventing the formation of queues and gatherings.<\/p>\t\t\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Assistenza-reti-informatiche-1.png\" alt=\"Ico-pos-Assistenza reti informatiche\" \/>\n\t\t\t\t\t<p>It is estimated that 67% of Public Administration websites are at risk of hacker attacks, with steadily increasing rates of DDoS attacks, spear phishing and account compromise campaigns.<\/p>\n\t\t<h4>\n\t\t\tAxitea for PA: we protect sensitive data\n\t\t<\/h4>\n\t\t\t<p>For the PA\u2019s security needs, Axitea offers a wide range of services, to protect physical and logical assets.Customer sensitive data security is ensured by monitoring and protection services for computer networks, workstations (PCs, servers), e-mail traffic and &#8211; in this period that has seen a large increase in WFH &#8211; secure remote connections via VPN.Axitea also offers anti-DDoS (Denial of Service) services to ensure optimal functionality of web portals and prevent interruptions and slowdowns in the provision of online services. In the unfortunate event of a data breach, through the Log Retention service, it is possible to retrace the critical events that occurred in the network, and verify the causes and effects of cyber attacks and\/or faults.Lastly, our consulting services, provided through a team of specialized consultants, verify and implement sensitive data management systems compliant with the latest privacy \/ GDPR regulations, including the provision of high quality training courses and awareness-raising programs on multiple topics (GDPR Privacy, Cyber Security, training for working from home, &#8230;).<\/p>\t\t\n\t<p>Physical security solutions<\/p>\n\t\t<h4>\n\t\t\tAxitea is present with its services in the main purchasing portals of Public Administrations, such as MEPA\n\t\t<\/h4>\n\t\t\t<p>The access control and perimeter protection systems prevent unauthorized access and theft of goods, data and sensitive documents; for business and public space security purposes, Axitea designs and installs advanced video surveillance and license plate reading systems, as well as maintenance services on existing security systems.Lastly, body temperature measurement systems allow access to public buildings, in full compliance with safety protocols (temperature below 37.5\u00b0 and presence of PPE), avoiding the creation of outbreaks and discomfort.<\/p>\t\t\n<h2>\n\t\tWho has already chosen Axitea?\n\t<\/h2>\n\t\t\t\t<a\n\t\t\thref=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/azienda-unita-sanitaria-locale-imola.jpg\"\n\t\t\t\t\t\tdata-fancybox=\"images\" \n\t\t\ttitle=\"azienda-unit\u00e0-sanitaria-locale-imola\" \n\t\t\t\t\t\tdata-caption=\"\"\n\t\t\t\t\t\tdata-description=\"\" \n\t\t\titemprop=\"contentUrl\"\n\t\t>\n\t\t<img decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/azienda-unita-sanitaria-locale-imola.jpg\" alt=\"\" data-no-lazy=\"1\" itemprop=\"thumbnail\" \/>\n\t\t\t<!-- Overlay Wrapper -->\n\t\t\t <!-- Overlay Wrapper Closed -->\n\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<meta itemprop=\"width\" content=\"400\" \/>\n\t\t\t<meta itemprop=\"height\" content=\"400\" \/>\n\t\t\t\t<a\n\t\t\thref=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/camera-di-commercio-delle-marche.jpg\"\n\t\t\t\t\t\tdata-fancybox=\"images\" \n\t\t\ttitle=\"camera di commercio delle marche\" \n\t\t\t\t\t\tdata-caption=\"\"\n\t\t\t\t\t\tdata-description=\"\" \n\t\t\titemprop=\"contentUrl\"\n\t\t>\n\t\t<img decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/camera-di-commercio-delle-marche.jpg\" alt=\"\" data-no-lazy=\"1\" itemprop=\"thumbnail\" \/>\n\t\t\t<!-- Overlay Wrapper -->\n\t\t\t <!-- Overlay Wrapper Closed -->\n\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<meta itemprop=\"width\" content=\"400\" \/>\n\t\t\t<meta itemprop=\"height\" content=\"400\" \/>\n\t\t\t\t<a\n\t\t\thref=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/camera-di-commercio-teramo.jpg\"\n\t\t\t\t\t\tdata-fancybox=\"images\" \n\t\t\ttitle=\"camera-di-commercio-teramo\" \n\t\t\t\t\t\tdata-caption=\"\"\n\t\t\t\t\t\tdata-description=\"\" \n\t\t\titemprop=\"contentUrl\"\n\t\t>\n\t\t<img decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/camera-di-commercio-teramo.jpg\" alt=\"\" data-no-lazy=\"1\" itemprop=\"thumbnail\" \/>\n\t\t\t<!-- Overlay Wrapper -->\n\t\t\t <!-- Overlay Wrapper Closed -->\n\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<meta itemprop=\"width\" content=\"400\" \/>\n\t\t\t<meta itemprop=\"height\" content=\"400\" \/>\n\t\t\t\t<a\n\t\t\thref=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/Comune-di-Milano.jpg\"\n\t\t\t\t\t\tdata-fancybox=\"images\" \n\t\t\ttitle=\"Comune-di-Milano\" \n\t\t\t\t\t\tdata-caption=\"\"\n\t\t\t\t\t\tdata-description=\"\" \n\t\t\titemprop=\"contentUrl\"\n\t\t>\n\t\t<img decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/Comune-di-Milano.jpg\" alt=\"\" data-no-lazy=\"1\" itemprop=\"thumbnail\" \/>\n\t\t\t<!-- Overlay Wrapper -->\n\t\t\t <!-- Overlay Wrapper Closed -->\n\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<meta itemprop=\"width\" content=\"400\" \/>\n\t\t\t<meta itemprop=\"height\" content=\"400\" \/>\n\t\t\t\t<a\n\t\t\thref=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/muve.jpg\"\n\t\t\t\t\t\tdata-fancybox=\"images\" \n\t\t\ttitle=\"muve\" \n\t\t\t\t\t\tdata-caption=\"\"\n\t\t\t\t\t\tdata-description=\"\" \n\t\t\titemprop=\"contentUrl\"\n\t\t>\n\t\t<img decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/muve.jpg\" alt=\"\" data-no-lazy=\"1\" itemprop=\"thumbnail\" \/>\n\t\t\t<!-- Overlay Wrapper -->\n\t\t\t <!-- Overlay Wrapper Closed -->\n\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<meta itemprop=\"width\" content=\"400\" \/>\n\t\t\t<meta itemprop=\"height\" content=\"400\" \/>\n\t\t\t\t<a\n\t\t\thref=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/provincia-autonoma-di-trento.jpg\"\n\t\t\t\t\t\tdata-fancybox=\"images\" \n\t\t\ttitle=\"provincia-autonoma-di-trento\" \n\t\t\t\t\t\tdata-caption=\"\"\n\t\t\t\t\t\tdata-description=\"\" \n\t\t\titemprop=\"contentUrl\"\n\t\t>\n\t\t<img decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/provincia-autonoma-di-trento.jpg\" alt=\"\" data-no-lazy=\"1\" itemprop=\"thumbnail\" \/>\n\t\t\t<!-- Overlay Wrapper -->\n\t\t\t <!-- Overlay Wrapper Closed -->\n\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<meta itemprop=\"width\" content=\"400\" \/>\n\t\t\t<meta itemprop=\"height\" content=\"400\" \/>\n\t\t\t\t<a\n\t\t\thref=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/provincia-pesaro-e-urbino.jpg\"\n\t\t\t\t\t\tdata-fancybox=\"images\" \n\t\t\ttitle=\"provincia-pesaro-e-urbino\" \n\t\t\t\t\t\tdata-caption=\"\"\n\t\t\t\t\t\tdata-description=\"\" \n\t\t\titemprop=\"contentUrl\"\n\t\t>\n\t\t<img decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/provincia-pesaro-e-urbino.jpg\" alt=\"\" data-no-lazy=\"1\" itemprop=\"thumbnail\" \/>\n\t\t\t<!-- Overlay Wrapper -->\n\t\t\t <!-- Overlay Wrapper Closed -->\n\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<meta itemprop=\"width\" content=\"400\" \/>\n\t\t\t<meta itemprop=\"height\" content=\"400\" \/>\n\t\t\t\t<a\n\t\t\thref=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/ulss-1-dolomiti.jpg\"\n\t\t\t\t\t\tdata-fancybox=\"images\" \n\t\t\ttitle=\"ulss-1-dolomiti\" \n\t\t\t\t\t\tdata-caption=\"\"\n\t\t\t\t\t\tdata-description=\"\" \n\t\t\titemprop=\"contentUrl\"\n\t\t>\n\t\t<img decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/ulss-1-dolomiti.jpg\" alt=\"\" data-no-lazy=\"1\" itemprop=\"thumbnail\" \/>\n\t\t\t<!-- Overlay Wrapper -->\n\t\t\t <!-- Overlay Wrapper Closed -->\n\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<meta itemprop=\"width\" content=\"400\" \/>\n\t\t\t<meta itemprop=\"height\" content=\"400\" \/>\n\t<h2>\n\t\tConsulting\n\t<\/h2>\n\t<p>Services for the verification and implementation of sensitive data management systems, in compliance with the most recent privacy regulations:<\/p>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/security-consulting\/identity-access-governance\/\" content=\"Identity Access Governance\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/security-consulting\/identity-access-governance\/' title='Identity Access Governance'>Identity Access Governance<\/a><\/h3>\n        \t<p>Consulting services for the design, management and monitoring of access to corporate information assets.<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/security-consulting\/identity-access-governance\/' title='Identity Access Governance'>Identity Access Governance<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/security-consulting\/gap-analysis-reporting\/\" content=\"Gap Analysis &#038; Reporting\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/security-consulting\/gap-analysis-reporting\/' title='Gap Analysis &#038; Reporting'>Gap Analysis &#038; Reporting<\/a><\/h3>\n        \t<p>Consulting services for a professional assessment of the company&#8217;s security level.<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/security-consulting\/gap-analysis-reporting\/' title='Gap Analysis &#038; Reporting'>Gap Analysis &#038; Reporting<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/security-consulting\/security-governance-models\/\" content=\"Security Governance Models\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/security-consulting\/security-governance-models\/' title='Security Governance Models'>Security Governance Models<\/a><\/h3>\n        \t<p>Support for companies in the design and implementation of security management process, in accordance with industry regulations&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/security-consulting\/security-governance-models\/' title='Security Governance Models'>Security Governance Models<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/security-consulting\/pandemic-plan-infection-prevention-and-control-ipc-contagion-security-protocol\/\" content=\"Pandemic Plan (Infection Prevention and Control &#8211; IPC &#8211; Contagion Security Protocol)\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/security-consulting\/pandemic-plan-infection-prevention-and-control-ipc-contagion-security-protocol\/' title='Pandemic Plan (Infection Prevention and Control &#8211; IPC &#8211; Contagion Security Protocol)'>Pandemic Plan (Infection Prevention and Control &#8211; IPC &#8211; Contagion Security Protocol)<\/a><\/h3>\n        \t<p>Consultancy services to support companies in the compulsory activities to implement the IPC protocol and manage body&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/security-consulting\/pandemic-plan-infection-prevention-and-control-ipc-contagion-security-protocol\/' title='Pandemic Plan (Infection Prevention and Control &#8211; IPC &#8211; Contagion Security Protocol)'>Pandemic Plan (Infection Prevention and Control &#8211; IPC &#8211; Contagion Security Protocol)<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/security-consulting\/business-continuity-crisis-management-plan\/\" content=\"Business Continuity &#038; Crisis Management Plan\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/security-consulting\/business-continuity-crisis-management-plan\/' title='Business Continuity &#038; Crisis Management Plan'>Business Continuity &#038; Crisis Management Plan<\/a><\/h3>\n        \t<p>Support in the design and implementation of structured emergency and crisis management plans, with the aim of&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/security-consulting\/business-continuity-crisis-management-plan\/' title='Business Continuity &#038; Crisis Management Plan'>Business Continuity &#038; Crisis Management Plan<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/security-consulting\/risk-analysis-management\/\" content=\"Risk Analysis &#038; Management\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/security-consulting\/risk-analysis-management\/' title='Risk Analysis &#038; Management'>Risk Analysis &#038; Management<\/a><\/h3>\n        \t<p>Risk Analysis &#038; Management Assessment of the likelihood of occurrence and magnitude of potential Cyber and ICT&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/security-consulting\/risk-analysis-management\/' title='Risk Analysis &#038; Management'>Risk Analysis &#038; Management<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/security-consulting\/dpo-as-a-service\/\" content=\"DPO as a Service\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/security-consulting\/dpo-as-a-service\/' title='DPO as a Service'>DPO as a Service<\/a><\/h3>\n        \t<p>DPO as a Service Data protection experts, whose job is to evaluate and organize the management of&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/security-consulting\/dpo-as-a-service\/' title='DPO as a Service'>DPO as a Service<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/security-consulting\/gdpr-compliance-consulting\/\" content=\"GDPR Compliance Consulting\" \/><meta itemprop=\"datePublished\" content=\"2020-09-10\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/security-consulting\/gdpr-compliance-consulting\/' title='GDPR Compliance Consulting'>GDPR Compliance Consulting<\/a><\/h3>\n        \t<p>Verification of potential GAPs in the mandatory protection measures compliance requirements, and security of personal data processed&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/security-consulting\/gdpr-compliance-consulting\/' title='GDPR Compliance Consulting'>GDPR Compliance Consulting<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t\t<!-- .pp-content-posts -->\n<h2>\n\t\tCyber Security\n\t<\/h2>\n\t<p>Axitea identifies the most suitable solutions for protecting data &amp; information and avoiding disruptions in service delivery:<\/p>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/cyber-security\/log-retention\/\" content=\"Log Retention\" \/><meta itemprop=\"datePublished\" content=\"2020-09-08\" \/><meta itemprop=\"dateModified\" content=\"2021-03-08\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/log-retention\/' title='Log Retention'>Log Retention<\/a><\/h3>\n        \t<p>Solution that allows the collection of critical events that occurred in the network, to verify causes and&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/log-retention\/' title='Log Retention'>Log Retention<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/cyber-security\/ransomware-incident-response\/\" content=\"Ransomware Incident Response\" \/><meta itemprop=\"datePublished\" content=\"2020-09-08\" \/><meta itemprop=\"dateModified\" content=\"2021-03-08\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/ransomware-incident-response\/' title='Ransomware Incident Response'>Ransomware Incident Response<\/a><\/h3>\n        \t<p>Support provided to the customer in the event of a ransomware attack, to try to recover encrypted&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/ransomware-incident-response\/' title='Ransomware Incident Response'>Ransomware Incident Response<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/cyber-security\/data-center-protection\/\" content=\"Data Center Protection\" \/><meta itemprop=\"datePublished\" content=\"2020-09-08\" \/><meta itemprop=\"dateModified\" content=\"2021-03-08\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/data-center-protection\/' title='Data Center Protection'>Data Center Protection<\/a><\/h3>\n        \t<p>Monitoring and protection of single applications and processes within a corporate network, through non-IP-based segmentation.<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/data-center-protection\/' title='Data Center Protection'>Data Center Protection<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/cyber-security\/data-loss-prevention-dlp\/\" content=\"Data Loss Prevention (DLP)\" \/><meta itemprop=\"datePublished\" content=\"2020-09-08\" \/><meta itemprop=\"dateModified\" content=\"2021-03-08\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/data-loss-prevention-dlp\/' title='Data Loss Prevention (DLP)'>Data Loss Prevention (DLP)<\/a><\/h3>\n        \t<p>Timely and targeted protection of the most critical business data based on specific rules (blocking of database&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/data-loss-prevention-dlp\/' title='Data Loss Prevention (DLP)'>Data Loss Prevention (DLP)<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/cyber-security\/threat-intelligence\/\" content=\"Threat Intelligence\" \/><meta itemprop=\"datePublished\" content=\"2020-09-08\" \/><meta itemprop=\"dateModified\" content=\"2021-03-08\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/threat-intelligence\/' title='Threat Intelligence'>Threat Intelligence<\/a><\/h3>\n        \t<p>Collection and analysis of information in order to characterize possible cyber threats from a technical, resource, motivation&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/threat-intelligence\/' title='Threat Intelligence'>Threat Intelligence<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/cyber-security\/vulnerability-analysis-and-penetration-test\/\" content=\"Vulnerability Analysis and Penetration Test\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2021-03-08\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/vulnerability-analysis-and-penetration-test\/' title='Vulnerability Analysis and Penetration Test'>Vulnerability Analysis and Penetration Test<\/a><\/h3>\n        \t<p>Test for measuring the level of protection of the IT network and digital infrastructure, in order to&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/vulnerability-analysis-and-penetration-test\/' title='Vulnerability Analysis and Penetration Test'>Vulnerability Analysis and Penetration Test<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/cyber-security\/phishing-attack-simulator\/\" content=\"Phishing Attack Simulator\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2021-03-08\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/phishing-attack-simulator\/' title='Phishing Attack Simulator'>Phishing Attack Simulator<\/a><\/h3>\n        \t<p>Employee training on phishing attacks (methods, best practices, etc&#8230;) and attack simulation through ad hoc e-mail campaigns,&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/phishing-attack-simulator\/' title='Phishing Attack Simulator'>Phishing Attack Simulator<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/cyber-security\/supply-chain-risk-mitigation\/\" content=\"Supply Chain Risk Mitigation\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2021-03-08\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/supply-chain-risk-mitigation\/' title='Supply Chain Risk Mitigation'>Supply Chain Risk Mitigation<\/a><\/h3>\n        \t<p>Analysis of cyber risks from the entire chain of services provided (external suppliers, maintainers, consultants, etc&#8230;).<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/supply-chain-risk-mitigation\/' title='Supply Chain Risk Mitigation'>Supply Chain Risk Mitigation<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/\" content=\"Managed Endpoint Detection and Response\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2021-03-08\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/' title='Managed Endpoint Detection and Response'>Managed Endpoint Detection and Response<\/a><\/h3>\n        \t<p>Advanced network protection (PCs, Servers, mobile) from malware and network traffic control.<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/' title='Managed Endpoint Detection and Response'>Managed Endpoint Detection and Response<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/cyber-security\/incident-management\/\" content=\"Incident Management\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2021-03-08\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/incident-management\/' title='Incident Management'>Incident Management<\/a><\/h3>\n        \t<p>Minimizing the damage of a cyber attack and identifying the activities\/processes to restore normal operations in the&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/incident-management\/' title='Incident Management'>Incident Management<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t\t<!-- .pp-content-posts -->\n<h2>\n\t\tPhysical Security\n\t<\/h2>\n\t<p>Axitea&#8217;s physical security solutions are aimed at safeguarding sensitive documents and public buildings:<\/p>\n<h4>\n\t<\/h4>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/physical-security\/fog-security-system\/\" content=\"Fog Security System\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2021-08-26\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/physical-security\/fog-security-system\/' title='Fog Security System'>Fog Security System<\/a><\/h3>\n        \t<p>Security system that, in case of attempted intrusion, spreads a dense and persistent blanket of non-toxic fog&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/physical-security\/fog-security-system\/' title='Fog Security System'>Fog Security System<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/physical-security\/intrusion-detection-systems\/\" content=\"Intrusion Detection Systems\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/physical-security\/intrusion-detection-systems\/' title='Intrusion Detection Systems'>Intrusion Detection Systems<\/a><\/h3>\n        \t<p>Design, implementation and installation of solutions to protect sensitive areas against the risk of intrusion.<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/physical-security\/intrusion-detection-systems\/' title='Intrusion Detection Systems'>Intrusion Detection Systems<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/physical-security\/fire-detection-systems\/\" content=\"Fire Detection Systems\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/physical-security\/fire-detection-systems\/' title='Fire Detection Systems'>Fire Detection Systems<\/a><\/h3>\n        \t<p>Design and implementation of certified fire-prevention systems for the protection of people and goods against fire risks.<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/physical-security\/fire-detection-systems\/' title='Fire Detection Systems'>Fire Detection Systems<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/physical-security\/physical-security-information-management-system\/\" content=\"Physical Security Information Management System (PSIM)\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/physical-security\/physical-security-information-management-system\/' title='Physical Security Information Management System (PSIM)'>Physical Security Information Management System (PSIM)<\/a><\/h3>\n        \t<p>Physical security management solutions through software platforms that integrate different unrelated security systems.<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/physical-security\/physical-security-information-management-system\/' title='Physical Security Information Management System (PSIM)'>Physical Security Information Management System (PSIM)<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/physical-security\/audio-and-video-analysis\/\" content=\"Audio and Video Analysis Systems\" \/><meta itemprop=\"datePublished\" content=\"2020-09-14\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/physical-security\/audio-and-video-analysis\/' title='Audio and Video Analysis Systems'>Audio and Video Analysis Systems<\/a><\/h3>\n        \t<p>Artificial intelligence applied to video surveillance and audio detection, for increasingly effective detection and prevention of criminal&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/physical-security\/audio-and-video-analysis\/' title='Audio and Video Analysis Systems'>Audio and Video Analysis Systems<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/physical-security\/video-management-system\/\" content=\"Video Management System\" \/><meta itemprop=\"datePublished\" content=\"2020-09-14\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/physical-security\/video-management-system\/' title='Video Management System'>Video Management System<\/a><\/h3>\n        \t<p>Platform for the centralized viewing of video systems of any size, from a few cameras up to&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/physical-security\/video-management-system\/' title='Video Management System'>Video Management System<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/physical-security\/access-control-systems\/\" content=\"Access Control Systems\" \/><meta itemprop=\"datePublished\" content=\"2020-09-14\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/physical-security\/access-control-systems\/' title='Access Control Systems'>Access Control Systems<\/a><\/h3>\n        \t<p>Access control and protection solutions for companies, to prevent unauthorized access, also useful in case of health&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/physical-security\/access-control-systems\/' title='Access Control Systems'>Access Control Systems<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/physical-security\/private-security\/\" content=\"Private Security\" \/><meta itemprop=\"datePublished\" content=\"2020-09-14\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/physical-security\/private-security\/' title='Private Security'>Private Security<\/a><\/h3>\n        \t<p>Private security services that include alarm monitoring 24\/7 from the Security Operation Center, alarm follow-up intervention by&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/physical-security\/private-security\/' title='Private Security'>Private Security<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/physical-security\/home-security\/\" content=\"Home Security\" \/><meta itemprop=\"datePublished\" content=\"2020-09-14\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/physical-security\/home-security\/' title='Home Security'>Home Security<\/a><\/h3>\n        \t<p>Home protection services through professional, effective and discreet alarm systems, with 24\/7 alarm monitoring from the Security&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/physical-security\/home-security\/' title='Home Security'>Home Security<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/physical-security\/perimeter-security-systems\/\" content=\"Perimeter Security Systems\" \/><meta itemprop=\"datePublished\" content=\"2020-09-08\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/physical-security\/perimeter-security-systems\/' title='Perimeter Security Systems'>Perimeter Security Systems<\/a><\/h3>\n        \t<p>Company perimeter protection systems, anticipating anti-intrusion alarms and significantly reducing the likelihood of theft.<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/physical-security\/perimeter-security-systems\/' title='Perimeter Security Systems'>Perimeter Security Systems<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t\t<!-- .pp-content-posts -->\n<h2>\n\t\tBiosecurity\n\t<\/h2>\n\t<p>Solutions for the health protection of employees and citizens:<\/p>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/bio-safety-covid-19\/social-distancing-solutions\/\" content=\"Social Distancing Solutions\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/bio-safety-covid-19\/social-distancing-solutions\/' title='Social Distancing Solutions'>Social Distancing Solutions<\/a><\/h3>\n        \t<p>Worker-distancing management, by tracking their movements and interactions, in order to retrace the chain of transmission.<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/bio-safety-covid-19\/social-distancing-solutions\/' title='Social Distancing Solutions'>Social Distancing Solutions<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/bio-safety-covid-19\/body-temperature-measurement\/\" content=\"Body Temperature Measurement\" \/><meta itemprop=\"datePublished\" content=\"2020-09-10\" \/><meta itemprop=\"dateModified\" content=\"2021-03-03\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/bio-safety-covid-19\/body-temperature-measurement\/' title='Body Temperature Measurement'>Body Temperature Measurement<\/a><\/h3>\n        \t<p>Body temperature detection solutions on individuals or groups, to check that the temperature is below the threshold&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/bio-safety-covid-19\/body-temperature-measurement\/' title='Body Temperature Measurement'>Body Temperature Measurement<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\t<\/a>\n<\/a>\n\t\t<!-- .pp-content-posts -->\n<h2>\n\t\tFind out what we have done for our customers.\n\t<\/h2>\n\t\t\t<a href=\"https:\/\/www.axitea.com\/en\/case-studies\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\n\t\t\t\t\t\t\tALL CASE STUDIES\n\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/case-studies\/cold-chain-and-security-for-the-bomi-group\/\" content=\"Cold chain and security for the BOMI Group\" \/><meta itemprop=\"datePublished\" content=\"2021-03-29\" \/><meta itemprop=\"dateModified\" content=\"2021-08-26\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/valeria-deidda\/\" \/><meta itemprop=\"name\" content=\"Valeria Deidda\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs.jpeg\" \/><meta itemprop=\"width\" content=\"1700\" \/><meta itemprop=\"height\" content=\"1134\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/en\/case-studies\/cold-chain-and-security-for-the-bomi-group\/' title='Cold chain and security for the BOMI Group'><img decoding=\"async\" width=\"1700\" height=\"1134\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs.jpeg\" alt=\"\" loading=\"lazy\" itemprop=\"image\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs.jpeg 1700w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs-300x200.jpeg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs-1024x683.jpeg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs-768x512.jpeg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/02\/headquarter_copertina-cs.jpeg 1536w\" sizes=\"auto, (max-width: 1700px) 100vw, 1700px\" \/><\/a>\n        \t<a href=\"https:\/\/www.axitea.com\/en\/mercati-relativi\/transport\/\" rel=\"tag\">Transport<\/a>\n        <h5><a href='https:\/\/www.axitea.com\/en\/case-studies\/cold-chain-and-security-for-the-bomi-group\/' title='Cold chain and security for the BOMI Group'>Cold chain and security for the BOMI Group<\/a><\/h5>\n        \t<a href=\"https:\/\/www.axitea.com\/en\/soluzioni\/vehicle-security\/\" rel=\"tag\">Vehicle Security<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/case-studies\/advanced-security-of-natural-gas-storage-for-ital-gas-storage\/\" content=\"Advanced security of natural gas storage for Ital Gas Storage\" \/><meta itemprop=\"datePublished\" content=\"2021-01-14\" \/><meta itemprop=\"dateModified\" content=\"2021-04-13\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/valeria-deidda\/\" \/><meta itemprop=\"name\" content=\"Valeria Deidda\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea.jpeg\" \/><meta itemprop=\"width\" content=\"1700\" \/><meta itemprop=\"height\" content=\"1134\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/en\/case-studies\/advanced-security-of-natural-gas-storage-for-ital-gas-storage\/' title='Advanced security of natural gas storage for Ital Gas Storage'><img decoding=\"async\" width=\"1700\" height=\"1134\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea.jpeg\" alt=\"\" loading=\"lazy\" itemprop=\"image\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea.jpeg 1700w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea-300x200.jpeg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea-1024x683.jpeg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea-768x513.jpeg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/stoccaggio-gas_axitea.jpeg 1536w\" sizes=\"auto, (max-width: 1700px) 100vw, 1700px\" \/><\/a>\n        \t<a href=\"https:\/\/www.axitea.com\/en\/mercati-relativi\/other-markets\/\" rel=\"tag\">Other Markets<\/a>\n        <h5><a href='https:\/\/www.axitea.com\/en\/case-studies\/advanced-security-of-natural-gas-storage-for-ital-gas-storage\/' title='Advanced security of natural gas storage for Ital Gas Storage'>Advanced security of natural gas storage for Ital Gas Storage<\/a><\/h5>\n        \t<a href=\"https:\/\/www.axitea.com\/en\/soluzioni\/physical-security\/\" rel=\"tag\">Physical Security<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/case-studies\/ensuring-store-security-in-vf-italy-retail-multibrand-stores\/\" content=\"Ensuring store security in VF Italy Retail multibrand stores\" \/><meta itemprop=\"datePublished\" content=\"2021-01-07\" \/><meta itemprop=\"dateModified\" content=\"2021-04-13\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/valeria-deidda\/\" \/><meta itemprop=\"name\" content=\"Valeria Deidda\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura.jpeg\" \/><meta itemprop=\"width\" content=\"1700\" \/><meta itemprop=\"height\" content=\"1134\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/en\/case-studies\/ensuring-store-security-in-vf-italy-retail-multibrand-stores\/' title='Ensuring store security in VF Italy Retail multibrand stores'><img decoding=\"async\" width=\"1700\" height=\"1134\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura.jpeg\" alt=\"\" loading=\"lazy\" itemprop=\"image\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura.jpeg 1700w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura-300x200.jpeg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura-1024x683.jpeg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura-768x512.jpeg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/01\/retail_vf-italyscura.jpeg 1536w\" sizes=\"auto, (max-width: 1700px) 100vw, 1700px\" \/><\/a>\n        \t<a href=\"https:\/\/www.axitea.com\/en\/mercati-relativi\/retail-and-large-scale-retail-channels\/\" rel=\"tag\">Retail &amp; Large-scale retail channels<\/a>\n        <h5><a href='https:\/\/www.axitea.com\/en\/case-studies\/ensuring-store-security-in-vf-italy-retail-multibrand-stores\/' title='Ensuring store security in VF Italy Retail multibrand stores'>Ensuring store security in VF Italy Retail multibrand stores<\/a><\/h5>\n        \t<a href=\"https:\/\/www.axitea.com\/en\/soluzioni\/physical-security\/\" rel=\"tag\">Physical Security<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/en\/case-studies\/play-safe-at-the-casino-de-la-vallee\/\" content=\"Play safe at the Casin\u00f2 de la Vall\u00e9e\" \/><meta itemprop=\"datePublished\" content=\"2020-12-04\" \/><meta itemprop=\"dateModified\" content=\"2021-04-13\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/valeria-deidda\/\" \/><meta itemprop=\"name\" content=\"Valeria Deidda\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/12\/casino-roulette_scura.jpg\" \/><meta itemprop=\"width\" content=\"1700\" \/><meta itemprop=\"height\" content=\"1134\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/en\/case-studies\/play-safe-at-the-casino-de-la-vallee\/' title='Play safe at the Casin\u00f2 de la Vall\u00e9e'><img decoding=\"async\" width=\"1700\" height=\"1134\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/12\/casino-roulette_scura.jpg\" alt=\"\" loading=\"lazy\" itemprop=\"image\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/12\/casino-roulette_scura.jpg 1700w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/12\/casino-roulette_scura-300x200.jpg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/12\/casino-roulette_scura-1024x683.jpg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/12\/casino-roulette_scura-768x512.jpg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/12\/casino-roulette_scura-1536x1025.jpg 1536w\" sizes=\"auto, (max-width: 1700px) 100vw, 1700px\" \/><\/a>\n        \t<a href=\"https:\/\/www.axitea.com\/en\/mercati-relativi\/other-markets\/\" rel=\"tag\">Other Markets<\/a>\n        <h5><a href='https:\/\/www.axitea.com\/en\/case-studies\/play-safe-at-the-casino-de-la-vallee\/' title='Play safe at the Casin\u00f2 de la Vall\u00e9e'>Play safe at the Casin\u00f2 de la Vall\u00e9e<\/a><\/h5>\n        \t<a href=\"https:\/\/www.axitea.com\/en\/soluzioni\/bio-safety-covid-19\/\" rel=\"tag\">Bio Safety Covid-19<\/a>\n\t\t<!-- .pp-content-posts -->\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Rilevazione-intrusione-1.png\" alt=\"Ico-pos-Rilevazione intrusione\" itemprop=\"image\" height=\"450\" width=\"450\" title=\"Ico-pos-Rilevazione intrusione\" onerror=\"this.style.display='none'\"  \/>\n\t<p>Would you like to know more on what Axitea can do for you?<\/p>\n\t<a href=\"#\" id=\"trigger-\" data-modal=\"\" data-node=\"\">\n\t\t\t\t\t\t\t\t\tContact Us\n\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\tPreview\n\t\t\tmodal-\n\t\t\t\t\t\t\t\t\t\t<h2><\/h2>\n\t\t\t\t\t\t<div class='_form_19'><\/div><script type='text\/javascript' src='https:\/\/axitea.activehosted.com\/f\/embed.php?static=0&id=19&69E3326BBFED6&nostyles=1&preview=0'><\/script>\t\t\t\t\t\n","protected":false},"excerpt":{"rendered":"<p>Market Sicurezza informatica Privacy and cyber security: the new challenges for Public Administrations The reference scenario Public administrations are undergoing a process of transformation and innovation of the services offered to citizens and businesses, especially through the use of digital technologies, with the aim of increasing efficiency, decreasing distances between public bodies and users and &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.axitea.com\/en\/markets\/public-administrations\/\"> <span class=\"screen-reader-text\">Public Administrations<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"featured_media":3090,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-5871","mercati","type-mercati","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security solutions for Public Administrations | Axitea<\/title>\n<meta name=\"description\" content=\"Axitea is a Global Security Provider for physical security and cyber security. Discover our tailor-made solutions for Public Administrations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.axitea.com\/en\/markets\/public-administrations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security solutions for Public Administrations | Axitea\" \/>\n<meta property=\"og:description\" content=\"Axitea is a Global Security Provider for physical security and cyber security. Discover our tailor-made solutions for Public Administrations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.axitea.com\/en\/markets\/public-administrations\/\" \/>\n<meta property=\"og:site_name\" content=\"AXITEA\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-26T13:41:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/pa.png\" \/>\n\t<meta property=\"og:image:width\" content=\"586\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/markets\\\/public-administrations\\\/\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/markets\\\/public-administrations\\\/\",\"name\":\"Security solutions for Public Administrations | Axitea\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/markets\\\/public-administrations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/markets\\\/public-administrations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/pa.png\",\"datePublished\":\"2020-09-08T09:58:09+00:00\",\"dateModified\":\"2021-08-26T13:41:55+00:00\",\"description\":\"Axitea is a Global Security Provider for physical security and cyber security. Discover our tailor-made solutions for Public Administrations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/markets\\\/public-administrations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.axitea.com\\\/en\\\/markets\\\/public-administrations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/markets\\\/public-administrations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/pa.png\",\"contentUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/pa.png\",\"width\":586,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/markets\\\/public-administrations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Axitea\",\"item\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Public Administrations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/\",\"name\":\"AXITEA\",\"description\":\"Security Evolution\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#organization\",\"name\":\"Axitea\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/logo-axitea-colore.svg\",\"contentUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/logo-axitea-colore.svg\",\"width\":515,\"height\":217,\"caption\":\"Axitea\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security solutions for Public Administrations | Axitea","description":"Axitea is a Global Security Provider for physical security and cyber security. Discover our tailor-made solutions for Public Administrations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.axitea.com\/en\/markets\/public-administrations\/","og_locale":"en_US","og_type":"article","og_title":"Security solutions for Public Administrations | Axitea","og_description":"Axitea is a Global Security Provider for physical security and cyber security. Discover our tailor-made solutions for Public Administrations.","og_url":"https:\/\/www.axitea.com\/en\/markets\/public-administrations\/","og_site_name":"AXITEA","article_modified_time":"2021-08-26T13:41:55+00:00","og_image":[{"width":586,"height":330,"url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/pa.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.axitea.com\/en\/markets\/public-administrations\/","url":"https:\/\/www.axitea.com\/en\/markets\/public-administrations\/","name":"Security solutions for Public Administrations | Axitea","isPartOf":{"@id":"https:\/\/www.axitea.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.axitea.com\/en\/markets\/public-administrations\/#primaryimage"},"image":{"@id":"https:\/\/www.axitea.com\/en\/markets\/public-administrations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/pa.png","datePublished":"2020-09-08T09:58:09+00:00","dateModified":"2021-08-26T13:41:55+00:00","description":"Axitea is a Global Security Provider for physical security and cyber security. Discover our tailor-made solutions for Public Administrations.","breadcrumb":{"@id":"https:\/\/www.axitea.com\/en\/markets\/public-administrations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.axitea.com\/en\/markets\/public-administrations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.axitea.com\/en\/markets\/public-administrations\/#primaryimage","url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/pa.png","contentUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/pa.png","width":586,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/www.axitea.com\/en\/markets\/public-administrations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Axitea","item":"https:\/\/www.axitea.com\/en\/"},{"@type":"ListItem","position":2,"name":"Public Administrations"}]},{"@type":"WebSite","@id":"https:\/\/www.axitea.com\/en\/#website","url":"https:\/\/www.axitea.com\/en\/","name":"AXITEA","description":"Security Evolution","publisher":{"@id":"https:\/\/www.axitea.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.axitea.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.axitea.com\/en\/#organization","name":"Axitea","url":"https:\/\/www.axitea.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.axitea.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg","contentUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg","width":515,"height":217,"caption":"Axitea"},"image":{"@id":"https:\/\/www.axitea.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/mercati\/5871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/mercati"}],"about":[{"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/types\/mercati"}],"replies":[{"embeddable":true,"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/comments?post=5871"}],"version-history":[{"count":0,"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/mercati\/5871\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/media\/3090"}],"wp:attachment":[{"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/media?parent=5871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}