{"id":5751,"date":"2020-09-03T12:28:49","date_gmt":"2020-09-03T10:28:49","guid":{"rendered":"https:\/\/www.axitea.com\/servizi\/managed-endpoint-detection-and-response\/"},"modified":"2025-02-11T12:40:21","modified_gmt":"2025-02-11T11:40:21","slug":"managed-endpoint-detection-and-response","status":"publish","type":"servizi","link":"https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/","title":{"rendered":"Managed Endpoint Detection and Response"},"content":{"rendered":"\n<h4>\n\t\tCyber Security\n\t<\/h4>\n<h1>\n\t\tEDR &#8211; Managed Endpoint Detection and Response\n\t<\/h1>\n\t<p>Advanced endpoint and corporate network cyber security<\/p>\n\t\t\n\t\t\t<p>In the era of digital transformation, where companies are moving towards an increasingly computerized process management, (Industry 4.0, Cloud, mobile and Internet of Things &#8211; IoT), data-related risks take on a whole new sphere. The intensive use of the Internet by production companies, employees, suppliers and customers increases cyber risks.Axitea offers a concrete and continuous response to cyber threats, combining state-of-the-art endpoint &amp; corporate network protection with Security Operation Center monitoring 24\/7.The effectiveness of monitoring is then reinforced with a well-defined and proven incident management process. The system takes immediate action by blocking and removing advanced malware that is not detected by traditional defense systems, such as antivirus and firewalls.<\/p>\t\t\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png\" alt=\"Ico-pos-Monitoraggio reti informatiche\" \/>\n\t\t\n\t\t\t\t\t<p>In the first half of 2024, attacks increased by 23% compared to the previous half-year and are increasingly serious: 81% have a critical or serious severity level (source: Clusit 2024 report).<\/p>\n<h2>\n\t\tHow Axitea can help you\n\t<\/h2>\n\t\t<p>No management commitment, Axitea takes care of everything<\/p>\n\t\t\t\t\t<p>Every piece of equipment and device is controlled and monitored by the Security Operation Center, active 24 hours a day, 365 days a year.<\/p>\t\t\t\t\n\t\t<p>Constant network monitoring against advanced threats<\/p>\n\t\t\t\t\t<p>The latest malware and ransomware, spam, and web threats not registered by antivirus and firewalls are immediately detected and blocked.<\/p>\t\t\t\t\n\t\t<p>Detailed event reporting<\/p>\n\t\t\t\t\t<p>How much malware has been detected? How many APTs blocked? Detailed multi-channel event and alarm reporting with notification.<\/p>\t\t\t\t\n\t\t<p>Increased business productivity<\/p>\n\t\t\t\t\t<p>In\/out traffic and navigation control, and blocking of dangerous or non-work-related websites (e.g. Facebook).<\/p>\t\t\t\t\n\t\t<p>No work interruptions<\/p>\n\t\t\t\t\t<p>Immediate recovery times, thanks to a redundant architecture triggered in the event of blockages or failures.<\/p>\t\t\t\t\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Rilevazione-intrusione-1.png\" alt=\"Ico-pos-Rilevazione intrusione\" itemprop=\"image\" height=\"450\" width=\"450\" title=\"Ico-pos-Rilevazione intrusione\" onerror=\"this.style.display='none'\"  \/>\n<h2>\n\t\tWould you like to know more about Managed Endpoint Detection and response?\n\t<\/h2>\n\t<a href=\"#\" id=\"trigger-\" role=\"button\" data-modal=\"\" data-node=\"\">\n\t\t\t\t\t\t\t\t\tContact us\n\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\tPreview\n\t\t\tmodal-\n\t\t\t\t\t\t\t\t\t\t\t<h4 id=\"modal-title-\"><\/h4>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<div class='_form_19'><\/div><script type='text\/javascript' src='https:\/\/axitea.activehosted.com\/f\/embed.php?static=0&id=19&69E319FD0ACB3&nostyles=1&preview=0'><\/script>\t\t\t\t\t\n<h2>\n\t\tMain features\n\t<\/h2>\n\t\t\n\t\t\t\t\t<p><br \/>Continuous protection against the evolution of malware-based cyber attacks (such as viruses, APTs, ransomware and the like) and identification of the interventions necessary for existing protection measures.<\/p>\t\t\t\t\n\t\t\n\t\t\t\t\t<p>Early detection of the spread of new types of malware on the Internet, and assessment of the level of effectiveness of the active protection service against such malware. In addition, identification of any additional measures to improve the adequacy of the protection measures against newly detected threats.<\/p>\t\t\t\t\n\t\t\n\t\t\t\t\t<p>Specialized support in case of malware infections (such as viruses, APT, ransomware and similar) in order to support the customer in identifying the actions to be taken, both for fully containing damage, and for quickly restoring the previous operating conditions.<\/p>\t\t\t\t\n<h2>\n\t\tOther SOC as a Service services\n\t<\/h2>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/5712\" content=\"Supply Chain Risk Mitigation\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2021-03-08\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/supply-chain-risk-mitigation\/' title='Supply Chain Risk Mitigation'>Supply Chain Risk Mitigation<\/a><\/h3>\n        \t<p>Analysis of cyber risks from the entire chain of services provided (external suppliers, maintainers, consultants, etc&#8230;).<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/supply-chain-risk-mitigation\/' title='Supply Chain Risk Mitigation'>Supply Chain Risk Mitigation<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" rel=\"noopener\">\n\t\t\t\t\t\t\t<\/a>\n\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/5753\" content=\"Incident Management\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2025-02-07\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/incident-management\/' title='Incident Management'>Incident Management<\/a><\/h3>\n        \t<p>Minimizing the damage of a cyber attack and identifying the activities\/processes to restore normal operations in the&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/incident-management\/' title='Incident Management'>Incident Management<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" rel=\"noopener\">\n\t\t\t\t\t\t\t<\/a>\n\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/5722\" content=\"Managed SIEM\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2025-01-22\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/managed-siem\/' title='Managed SIEM'>Managed SIEM<\/a><\/h3>\n        \t<p>Real-time monitoring of events generated by applications and corporate information systems 24\/7, as a proactive tool to&#8230;<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/managed-siem\/' title='Managed SIEM'>Managed SIEM<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" rel=\"noopener\">\n\t\t\t\t\t\t\t<\/a>\n\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/5741\" content=\"VPN Access Management\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2025-02-07\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/vpn-as-a-service\/' title='VPN Access Management'>VPN Access Management<\/a><\/h3>\n        \t<p>Creating secure connections for employees working remotely, without having to make investments to upgrade the existing infrastructure.<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/vpn-as-a-service\/' title='VPN Access Management'>VPN Access Management<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" rel=\"noopener\">\n\t\t\t\t\t\t\t<\/a>\n\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/5724\" content=\"Email Security\" \/><meta itemprop=\"datePublished\" content=\"2020-09-02\" \/><meta itemprop=\"dateModified\" content=\"2025-02-07\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/en\/cyber-security\/email-security\/' title='Email Security'>Email Security<\/a><\/h3>\n        \t<p>Advanced control of inbound and outbound email traffic to recognize and block malware-infected emails.<\/p>\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/en\/cyber-security\/email-security\/' title='Email Security'>Email Security<\/a>&#8220;>\n\t\t\t<a href=\"\" target=\"_self\" rel=\"noopener\">\n\t\t\t\t\t\t\t<\/a>\n\n\t\t<!-- .pp-content-posts -->\n<h2>\n\t\tFind out what we have done for our customers.\n\t<\/h2>\n\t\t\t<a href=\"https:\/\/www.axitea.com\/en\/case-studies\" target=\"_self\" rel=\"noopener\">\n\t\t\t\t\t\t\tALL CASE STUDIES\n\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/8853\" content=\"IT asset protection for the insulating glass leader, ISO CLIMA\" \/><meta itemprop=\"datePublished\" content=\"2022-04-12\" \/><meta itemprop=\"dateModified\" content=\"2024-03-15\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/gianfranco-ciuffreda\/\" \/><meta itemprop=\"name\" content=\"gianfranco.ciuffreda\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/05\/AZIENDA-COPERTINA.jpeg\" \/><meta itemprop=\"width\" content=\"1700\" \/><meta itemprop=\"height\" content=\"1134\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/en\/case-studies\/it-asset-protection-for-the-insulating-glass-leader-iso-clima\/' title='IT asset protection for the insulating glass leader, ISO CLIMA'><img width=\"1700\" height=\"1134\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/05\/AZIENDA-COPERTINA.jpeg\" alt=\"iso clima sede\" itemprop=\"image\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/05\/AZIENDA-COPERTINA.jpeg 1700w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/05\/AZIENDA-COPERTINA-300x200.jpeg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/05\/AZIENDA-COPERTINA-1024x683.jpeg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/05\/AZIENDA-COPERTINA-768x512.jpeg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2021\/05\/AZIENDA-COPERTINA-1536x1025.jpeg 1536w\" sizes=\"auto, (max-width: 1700px) 100vw, 1700px\" \/><\/a>\n        \tManufacturing\n        <h5><a href='https:\/\/www.axitea.com\/en\/case-studies\/it-asset-protection-for-the-insulating-glass-leader-iso-clima\/' title='IT asset protection for the insulating glass leader, ISO CLIMA'>IT asset protection for the insulating glass leader, ISO CLIMA<\/a><\/h5>\n        \tCyber Security\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/5878\" content=\"Proactive security for Benigni&#038;K&#8217;s consulting world\" \/><meta itemprop=\"datePublished\" content=\"2020-11-02\" \/><meta itemprop=\"dateModified\" content=\"2021-08-26\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/luca-robustelli\/\" \/><meta itemprop=\"name\" content=\"Luca Robustelli\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/11\/sede-BK-vicenza-001.jpg\" \/><meta itemprop=\"width\" content=\"1366\" \/><meta itemprop=\"height\" content=\"768\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/en\/case-studies\/proactive-security-for-benigniks-consulting-world\/' title='Proactive security for Benigni&#038;K&#8217;s consulting world'><img width=\"1366\" height=\"768\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/11\/sede-BK-vicenza-001.jpg\" alt=\"\" itemprop=\"image\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/11\/sede-BK-vicenza-001.jpg 1366w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/11\/sede-BK-vicenza-001-300x169.jpg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/11\/sede-BK-vicenza-001-1024x576.jpg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/11\/sede-BK-vicenza-001-768x432.jpg 768w\" sizes=\"auto, (max-width: 1366px) 100vw, 1366px\" \/><\/a>\n        <h5><a href='https:\/\/www.axitea.com\/en\/case-studies\/proactive-security-for-benigniks-consulting-world\/' title='Proactive security for Benigni&#038;K&#8217;s consulting world'>Proactive security for Benigni&#038;K&#8217;s consulting world<\/a><\/h5>\n        \tCyber Security\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/5881\" content=\"Advanced security for the law firm Gattai, Minoli, Agostinelli &#038; Partners\" \/><meta itemprop=\"datePublished\" content=\"2020-10-29\" \/><meta itemprop=\"dateModified\" content=\"2021-04-13\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/valeria-deidda\/\" \/><meta itemprop=\"name\" content=\"Valeria Deidda\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/facciata-gattai-low.jpg\" \/><meta itemprop=\"width\" content=\"1700\" \/><meta itemprop=\"height\" content=\"1134\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/en\/case-studies\/advanced-security-for-the-law-firm-gattai-minoli-agostinelli-partners\/' title='Advanced security for the law firm Gattai, Minoli, Agostinelli &#038; Partners'><img width=\"1700\" height=\"1134\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/facciata-gattai-low.jpg\" alt=\"\" itemprop=\"image\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/facciata-gattai-low.jpg 1700w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/facciata-gattai-low-300x200.jpg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/facciata-gattai-low-1024x683.jpg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/facciata-gattai-low-768x512.jpg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/facciata-gattai-low-1536x1025.jpg 1536w\" sizes=\"auto, (max-width: 1700px) 100vw, 1700px\" \/><\/a>\n        <h5><a href='https:\/\/www.axitea.com\/en\/case-studies\/advanced-security-for-the-law-firm-gattai-minoli-agostinelli-partners\/' title='Advanced security for the law firm Gattai, Minoli, Agostinelli &#038; Partners'>Advanced security for the law firm Gattai, Minoli, Agostinelli &#038; Partners<\/a><\/h5>\n        \tCyber Security\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/5886\" content=\"Cyber security in the challenging world of Formula 1\" \/><meta itemprop=\"datePublished\" content=\"2020-09-08\" \/><meta itemprop=\"dateModified\" content=\"2021-08-26\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/en\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-scaled.jpg\" \/><meta itemprop=\"width\" content=\"2560\" \/><meta itemprop=\"height\" content=\"1707\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/' title='Cyber security in the challenging world of Formula 1'><img width=\"2560\" height=\"1707\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-scaled.jpg\" alt=\"\" itemprop=\"image\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-scaled.jpg 2560w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-300x200.jpg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-1024x683.jpg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-768x512.jpg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-1536x1024.jpg 1536w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/a>\n        \tOther Markets\n        <h5><a href='https:\/\/www.axitea.com\/en\/case-studies\/cyber-security-in-the-challenging-world-of-formula-1\/' title='Cyber security in the challenging world of Formula 1'>Cyber security in the challenging world of Formula 1<\/a><\/h5>\n        \tCyber Security\n\t\t<!-- .pp-content-posts -->\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Rilevazione-intrusione-1.png\" alt=\"Ico-pos-Rilevazione intrusione\" itemprop=\"image\" height=\"450\" width=\"450\" title=\"Ico-pos-Rilevazione intrusione\" onerror=\"this.style.display='none'\"  \/>\n\t<p>Would you like to know more on what Axitea can do for you?<\/p>\n\t<a href=\"#\" id=\"trigger-\" role=\"button\" data-modal=\"\" data-node=\"\">\n\t\t\t\t\t\t\t\t\tContact Us\n\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\tPreview\n\t\t\tmodal-\n\t\t\t\t\t\t\t\t\t\t\t<h4 id=\"modal-title-\"><\/h4>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<!--[activecampaign form=19]-->\n<iframe loading=\"lazy\" src=\"https:\/\/go.axitea.com\/l\/1015162\/2023-09-01\/3c4nx\" width=\"100%\" height=\"100%\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\"><\/iframe>\n\n","protected":false},"excerpt":{"rendered":"<p>Advanced network protection (PCs, Servers, mobile) from malware and network traffic control.<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}}},"categoria_servizio":[87,94],"mercati-relativi":[110],"tag_servizi":[],"servizi_folder":[],"class_list":["post-5751","servizi","type-servizi","status-publish","format-standard","hentry","categoria_servizio-cyber-security","categoria_servizio-soc-as-a-service","mercati-relativi-manufacturing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EDR - Managed Endpoint Detection and Response | Axitea<\/title>\n<meta name=\"description\" content=\"Advanced protection for endpoints and corporate network (PCs, servers, mobile) from malware, network traffic monitoring. 24\/7 event monitoring from the SOC. Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EDR - Managed Endpoint Detection and Response | Axitea\" \/>\n<meta property=\"og:description\" content=\"Advanced protection for endpoints and corporate network (PCs, servers, mobile) from malware, network traffic monitoring. 24\/7 event monitoring from the SOC. Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/\" \/>\n<meta property=\"og:site_name\" content=\"AXITEA\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-11T11:40:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/cyber-security\\\/managed-endpoint-detection-and-response\\\/\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/cyber-security\\\/managed-endpoint-detection-and-response\\\/\",\"name\":\"EDR - Managed Endpoint Detection and Response | Axitea\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/cyber-security\\\/managed-endpoint-detection-and-response\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/cyber-security\\\/managed-endpoint-detection-and-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Ico-pos-Monitoraggio-reti-informatiche-1.png\",\"datePublished\":\"2020-09-03T10:28:49+00:00\",\"dateModified\":\"2025-02-11T11:40:21+00:00\",\"description\":\"Advanced protection for endpoints and corporate network (PCs, servers, mobile) from malware, network traffic monitoring. 24\\\/7 event monitoring from the SOC. Learn more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/cyber-security\\\/managed-endpoint-detection-and-response\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.axitea.com\\\/en\\\/cyber-security\\\/managed-endpoint-detection-and-response\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/cyber-security\\\/managed-endpoint-detection-and-response\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Ico-pos-Monitoraggio-reti-informatiche-1.png\",\"contentUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Ico-pos-Monitoraggio-reti-informatiche-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/cyber-security\\\/managed-endpoint-detection-and-response\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Axitea\",\"item\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\",\"item\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/soluzioni\\\/cyber-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Managed Endpoint Detection and Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/\",\"name\":\"AXITEA\",\"description\":\"Security Evolution\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#organization\",\"name\":\"Axitea\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/logo-axitea-colore.svg\",\"contentUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/logo-axitea-colore.svg\",\"width\":515,\"height\":217,\"caption\":\"Axitea\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EDR - Managed Endpoint Detection and Response | Axitea","description":"Advanced protection for endpoints and corporate network (PCs, servers, mobile) from malware, network traffic monitoring. 24\/7 event monitoring from the SOC. Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/","og_locale":"en_US","og_type":"article","og_title":"EDR - Managed Endpoint Detection and Response | Axitea","og_description":"Advanced protection for endpoints and corporate network (PCs, servers, mobile) from malware, network traffic monitoring. 24\/7 event monitoring from the SOC. Learn more.","og_url":"https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/","og_site_name":"AXITEA","article_modified_time":"2025-02-11T11:40:21+00:00","og_image":[{"url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/","url":"https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/","name":"EDR - Managed Endpoint Detection and Response | Axitea","isPartOf":{"@id":"https:\/\/www.axitea.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/#primaryimage"},"image":{"@id":"https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png","datePublished":"2020-09-03T10:28:49+00:00","dateModified":"2025-02-11T11:40:21+00:00","description":"Advanced protection for endpoints and corporate network (PCs, servers, mobile) from malware, network traffic monitoring. 24\/7 event monitoring from the SOC. Learn more.","breadcrumb":{"@id":"https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/#primaryimage","url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png","contentUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.axitea.com\/en\/cyber-security\/managed-endpoint-detection-and-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Axitea","item":"https:\/\/www.axitea.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Security","item":"https:\/\/www.axitea.com\/en\/soluzioni\/cyber-security\/"},{"@type":"ListItem","position":3,"name":"Managed Endpoint Detection and Response"}]},{"@type":"WebSite","@id":"https:\/\/www.axitea.com\/en\/#website","url":"https:\/\/www.axitea.com\/en\/","name":"AXITEA","description":"Security Evolution","publisher":{"@id":"https:\/\/www.axitea.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.axitea.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.axitea.com\/en\/#organization","name":"Axitea","url":"https:\/\/www.axitea.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.axitea.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg","contentUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg","width":515,"height":217,"caption":"Axitea"},"image":{"@id":"https:\/\/www.axitea.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/servizi\/5751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/servizi"}],"about":[{"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/types\/servizi"}],"author":[{"embeddable":true,"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/users\/3"}],"wp:attachment":[{"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/media?parent=5751"}],"wp:term":[{"taxonomy":"categoria_servizio","embeddable":true,"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/categoria_servizio?post=5751"},{"taxonomy":"mercati-relativi","embeddable":true,"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/mercati-relativi?post=5751"},{"taxonomy":"tag_servizi","embeddable":true,"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/tag_servizi?post=5751"},{"taxonomy":"servizi_folder","embeddable":true,"href":"https:\/\/www.axitea.com\/en\/wp-json\/wp\/v2\/servizi_folder?post=5751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}