{"id":600,"date":"2020-09-02T11:19:05","date_gmt":"2020-09-02T09:19:05","guid":{"rendered":"https:\/\/axitea.borasolab.it\/?page_id=600"},"modified":"2025-09-26T14:28:07","modified_gmt":"2025-09-26T12:28:07","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/www.axitea.com\/it\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\n<h4>\n\t\t\tSoluzioni\t<\/h4>\n<h1>\n\t\t\tServizi di Sicurezza Informatica e Cyber Security per Aziende\t<\/h1>\n\t<p>Soluzioni di Cyber Security di ultima generazione per proteggere il business della tua azienda.<\/p>\n\t\t<h2>\n\t\t\tServizi gestiti di Cyber Security\n\t\t<\/h2>\n\t\t\t<p>Il rischio cyber \u00e8 un rischio economico aziendale che pu\u00f2 portare al blocco dei processi, sottrazione e violazione di dati, alterazione o modifica della produzione, perdita di dati personali e informazioni sensibili, con conseguenti danni reputazionali.Quando si parla di sicurezza informatica aziendale ci si riferisce a un fenomeno in costante evoluzione, che quotidianamente deve affrontare nuove forme di attacco.Per contrastare questa situazione occorrerebbe dotarsi di una struttura di cyber security sempre aggiornata, in grado cio\u00e8 di studiare soluzioni efficaci, di rispondere ad eventuali attacchi e di accrescere la cultura aziendale necessaria a far fronte alle minacce.La maggior parte delle organizzazioni non dispone di tempo, denaro e personale per gestire un programma di sicurezza &#8211; ottimizzato H24, 7\/7 per 365 giorni l&#8217;anno &#8211; e ricostruire gli eventi come richiesto dalla normativa.Axitea, in qualit\u00e0 di azienda di sicurezza informatica viene in soccorso di imprese e organizzazioni fornendo servizi di Sicurezza Informatica Gestita, ossia in outsourcing.Questi servizi di consulenza per la sicurezza informatica risultano essenziali laddove non \u00e8 possibile disporre di risorse interne per tali attivit\u00e0, che consentono la riduzione del rischio cyber.<\/p>\t\t\n\t<iframe allowfullscreen allow=\"autoplay\" data-src=\"https:\/\/www.youtube.com\/embed\/5xS6d6UcXLs?feature=oembed&amp;start&amp;end&amp;wmode=opaque&amp;loop=0&amp;controls=1&amp;mute=0&amp;rel=0&amp;modestbranding=0\"><\/iframe>\t\t\n\t\t\t\t\tPlay Video\n\t\t<h2>\n\t\t\tIl Security Operation Center Axitea\n\t\t<\/h2>\n\t\t\t<p>Axitea fornisce le contromisure adeguate contro le minacce informatiche pi\u00f9 evolute mettendo a disposizione delle aziende il proprio Security Operation Center h24\/7.Il SOC di Axitea \u00e8 un ecosistema integrato e multidisciplinare in grado di erogare servizi di sicurezza gestita e, allo stesso tempo, rispondere efficacemente a ogni sfida in termini di sicurezza aziendale.Il SOC composto da Professionalit\u00e0 certificate e Team multidisciplinari che, grazie all&#8217;utilizzo di piattaforme tecnologiche integrate ed avanzate, identifica gli Asset da proteggere, valuta e gestisce i rischi, rileva le minacce e risponde agli incidenti.<\/p>\t\t\n\t\t1 mld\n\t\t\t\t\tNumero totale eventi\/mese\n\t\t 430\n\t\t\t\t\tNumero ticket di sicurezza gestiti\/mese\n\t\t80,000\n\t\t\t\t\tMail\/mese pericolose bloccate\n\t\t140\n\t\t\t\t\tTecnici installatori\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Rilevazione-intrusione-1.png\" alt=\"Ico-pos-Rilevazione intrusione\" itemprop=\"image\" height=\"450\" width=\"450\" title=\"Ico-pos-Rilevazione intrusione\" onerror=\"this.style.display='none'\" loading=\"lazy\" \/>\n<h2>\n\t\t<a href=\"\" title=\"Vuoi maggiori informazioni sui servizi di Cyber Security?\"  target=\"_self\">\n\t\t\tVuoi maggiori informazioni sui servizi di Cyber Security?\t\t<\/a>\n\t<\/h2>\n\t<a href=\"#\" id=\"trigger-\" role=\"button\" data-modal=\"\" data-node=\"\">\n\t\t\t\t\t\t\t\t\tContattaci\n\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\tPreview\n\t\t\tmodal-\n\t\t\t\t\t\t\t\t\t\t\t<h4 id=\"modal-title-\">Compila il modulo per richiedere un contatto:<\/h4>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n<iframe loading=\"lazy\" src=\"https:\/\/go.axitea.com\/l\/1015162\/2023-09-28\/42vt4\" width=\"100%\" height=\"500\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\"><\/iframe>\n<h2>\n\t\t\tSOC as a Service\t<\/h2>\n\t<p>Soluzioni di cyber security con gestione proattiva da parte del SOC Axitea e del suo team di esperti e analisti, per prevenire e individuare cyber attacchi in tempo reale<\/p>\n<h4>\n\t\t\tI nostri servizi di SOC as a Service\t<\/h4>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/688\" content=\"Managed Endpoint Detection and Response\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2025-02-11\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/managed-endpoint-detection-and-response\/' title='Managed Endpoint Detection and Response'>Managed Endpoint Detection and Response<\/a><\/h3>\n        \t<p>Protezione evoluta della rete informatica (PC, Server, mobile) dai malware e controllo del traffico di rete.<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/686\" content=\"Incident Management\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2025-07-31\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/incident-management\/' title='Incident Management'>Incident Management<\/a><\/h3>\n        \t<p>Minimizzare i danni di un attacco informatico e individuare le attivit\u00e0\/processi per ripristinare nel miglior modo e nel minor tempo possibile la normale operativit\u00e0.<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/682\" content=\"Managed Siem\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2025-05-19\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/managed-siem\/' title='Managed Siem'>Managed Siem<\/a><\/h3>\n        \t<p>Monitoraggio real-time h24 degli eventi generati dagli applicativi e dai sistemi informativi aziendali, come strumento proattivo di difesa e prevenzione contro gli attacchi informatici.<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/678\" content=\"VPN Access Management\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2025-02-07\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/vpn-as-a-service\/' title='VPN Access Management'>VPN Access Management<\/a><\/h3>\n        \t<p>Creazione di connessioni sicure per i dipendenti che lavorano da remoto, senza dover effettuare investimenti per l&#8217;upgrade dell&#8217;infrastruttura esistente.<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/636\" content=\"Email Security\" \/><meta itemprop=\"datePublished\" content=\"2020-09-02\" \/><meta itemprop=\"dateModified\" content=\"2025-02-07\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/email-security\/' title='Email Security'>Email Security<\/a><\/h3>\n        \t<p>Controllo evoluto del traffico email in entrata e in uscita, per riconoscere e bloccare mail infettate da malware.<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t\t<!-- .pp-content-posts -->\n<h2>\n\t\t\tCyber Security Solutions\t<\/h2>\n\t<p>Soluzioni di cyber security volte a individuare vulnerabilit\u00e0 nei sistemi aziendali e potenziali esposizioni di dati, assicurare una corretta gestione degli accessi, fornire sicurezza di sistemi complessi.<\/p>\n<h4>\n\t\t\tI nostri servizi di Cyber Security Solutions\t<\/h4>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/1467\" content=\"Identity Access Governance\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2025-02-11\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/identity-access-governance\/' title='Identity Access Governance'>Identity Access Governance<\/a><\/h3>\n        \t<p>Servizi di consulenza per progettare, gestire e monitorare gli accessi al patrimonio informativo aziendale.<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/952\" content=\"Data Center Security &#038; Protection\" \/><meta itemprop=\"datePublished\" content=\"2020-09-08\" \/><meta itemprop=\"dateModified\" content=\"2025-01-21\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/data-center-protection\/' title='Data Center Security &#038; Protection'>Data Center Security &#038; Protection<\/a><\/h3>\n        \t<p>Monitoraggio e protezione delle singole applicazioni e dei processi all&#8217;interno di una rete aziendale, attraverso una segmentazione non basata su IP.<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/936\" content=\"Cyber Security Exposure\" \/><meta itemprop=\"datePublished\" content=\"2020-09-08\" \/><meta itemprop=\"dateModified\" content=\"2025-02-11\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/security-exposure\/' title='Cyber Security Exposure'>Cyber Security Exposure<\/a><\/h3>\n        \t<p>Raccolta e analisi di informazioni al fine di caratterizzare possibili minacce cyber dal punto di vista tecnico, di risorse, di motivazioni e di intenti, in relazione ai contesti operativi specifici del cliente.<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/694\" content=\"Vulnerability Analysis and Penetration Test\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2025-01-27\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/vulnerability-analysis-and-penetration-test\/' title='Vulnerability Analysis and Penetration Test'>Vulnerability Analysis and Penetration Test<\/a><\/h3>\n        \t<p>Test per la misurazione del livello di protezione della rete informatica e delle infrastrutture digitali, al fine di rilevare lacune e aree di miglioramento.<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t\t<!-- .pp-content-posts -->\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Rilevazione-intrusione-1.png\" alt=\"Ico-pos-Rilevazione intrusione\" itemprop=\"image\" height=\"450\" width=\"450\" title=\"Ico-pos-Rilevazione intrusione\" onerror=\"this.style.display='none'\" loading=\"lazy\" \/>\n<h2>\n\t\t\tHai subito un attacco informatico?\t<\/h2>\n\t<a href=\"#\" id=\"trigger-\" role=\"button\" data-modal=\"\" data-node=\"\">\n\t\t\t\t\t\t\t\t\tContattaci\n\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\tPreview\n\t\t\tmodal-\n\t\t\t\t\t\t\t\t\t\t\t<h4 id=\"modal-title-\">Compila il modulo per richiedere un contatto:<\/h4>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<iframe data-url=\"https:\/\/www.axitea.com\/it\/landing\/assistenza-post-attacco-informatico\/#form-contatto\" frameborder=\"0\" width=\"100%\" height=\"100%\"><\/iframe>\t\t\t\t\t\n<h2>\n\t\t\tConsulting\t<\/h2>\n\t<p>Servizi di consulenza avanzata per ridurre i rischi di cyber security, gestire situazioni di crisi e governare le informazioni, adeguarsi alle normative privacy<\/p>\n<h4>\n\t\t\tI nostri servizi di Consulting\t<\/h4>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/8576\" content=\"Ciso as a Service\" \/><meta itemprop=\"datePublished\" content=\"2022-01-28\" \/><meta itemprop=\"dateModified\" content=\"2025-01-21\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/ciso-as-a-service\/' title='Ciso as a Service'>Ciso as a Service<\/a><\/h3>\n        \t<p>Cyber security CISO as a Service Il ruolo del CISO \u00e8 strategico nelle aziende, tuttavia poche organizzazioni&#8230;<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/1465\" content=\"Security Governance\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2025-02-10\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/security-governance\/' title='Security Governance'>Security Governance<\/a><\/h3>\n        \t<p>Supporto alle aziende nella progettazione e realizzazione di un modello di gestione della sicurezza, in conformit\u00e0 alle normative di settore e alle strategie di business aziendali.<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/1463\" content=\"Business Continuity &#038; Crisis Management Plan\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2025-02-11\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/business-continuity-and-crisis-management-plan\/' title='Business Continuity &#038; Crisis Management Plan'>Business Continuity &#038; Crisis Management Plan<\/a><\/h3>\n        \t<p>Supporto nella progettazione e implementazione di piani strutturati di gestione delle emergenze e delle crisi con l&#8217;obiettivo di assicurare una continuit\u00e0 operativa del business.<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/1462\" content=\"Risk Analysis &#038; Management\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2025-02-10\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/risk-analysis-and-management\/' title='Risk Analysis &#038; Management'>Risk Analysis &#038; Management<\/a><\/h3>\n        \t<p>Valutazione della probabilit\u00e0 di accadimento e magnitudo dei potenziali rischi Cyber e ICT che sono in grado di compromettere l&#8217;operativit\u00e0, la reputazione, la conformit\u00e0 alle normative e l&#8217;integrit\u00e0 legale di un&#8217;azienda.<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/1461\" content=\"DPO as a Service\" \/><meta itemprop=\"datePublished\" content=\"2020-09-15\" \/><meta itemprop=\"dateModified\" content=\"2025-01-27\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/dpo-as-a-service\/' title='DPO as a Service'>DPO as a Service<\/a><\/h3>\n        \t<p>Professionisti esperti nella protezione dei dati, il cui compito \u00e8 valutare e organizzare la gestione del trattamento di dati personali all&#8217;interno dell&#8217;azienda.<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/1209\" content=\"Consulenza Privacy e GDPR\" \/><meta itemprop=\"datePublished\" content=\"2020-09-10\" \/><meta itemprop=\"dateModified\" content=\"2025-01-27\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/consulenza-privacy-gdpr\/' title='Consulenza Privacy e GDPR'>Consulenza Privacy e GDPR<\/a><\/h3>\n        \t<p>Verifica dei potenziali GAP rispetto a quanto necessario per essere compliant con le misure di protezione e sicurezza dei dati personali trattati in azienda (GDPR).<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t\t<!-- .pp-content-posts -->\n<h2>\n\t\t\tTraining\t<\/h2>\n\t<p>Programmi formativi, flessibili, modulare e di alta qualit\u00e0 per rispondere a ogni esigenza di formazione interna relativi a cyber security &amp; privacy<\/p>\n<h4>\n\t\t\tI nostri servizi di Training\t<\/h4>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/1540\" content=\"Corso Privacy e GDPR\" \/><meta itemprop=\"datePublished\" content=\"2020-09-16\" \/><meta itemprop=\"dateModified\" content=\"2025-02-11\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/corso-privacy-gdpr\/' title='Corso Privacy e GDPR'>Corso Privacy e GDPR<\/a><\/h3>\n        \t<p>Programma di formazione in modalit\u00e0 e-learning o in aula, che consente ai partecipanti di acquisire concetti e meccanismi previsti dal GDPR e dalla Data Protection.<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/1216\" content=\"Corso Cyber Security Awareness\" \/><meta itemprop=\"datePublished\" content=\"2020-09-10\" \/><meta itemprop=\"dateModified\" content=\"2025-02-10\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/corso-cyber-security-awareness\/' title='Corso Cyber Security Awareness'>Corso Cyber Security Awareness<\/a><\/h3>\n        \t<p>Programma di formazione puntuale e interattivo per aumentare la consapevolezza e le competenze dei dipendenti in materia di sicurezza informatica.<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/692\" content=\"Corsi Phishing Attack Simulation\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2025-01-21\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/corso-phishing-attack-simulation\/' title='Corsi Phishing Attack Simulation'>Corsi Phishing Attack Simulation<\/a><\/h3>\n        \t<p>Training ai dipendenti sugli attacchi phishing (modalit\u00e0, best practise, ecc&#8230;) e simulazione di attacco tramite campagne e-mail ad hoc, per testarne l&#8217;apprendimento.<\/p>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t\t<!-- .pp-content-posts -->\n<h4>\n\t\t\tAxitea sul territorio\t<\/h4>\n\t<p>Axitea offre servizi di Cyber Security per aziende italiane ed estere, senza vincoli territoriali. Di seguito le principali localit\u00e0 ricercate dagli utenti.<\/p>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/13785\" content=\"Cyber Security Torino\" \/><meta itemprop=\"datePublished\" content=\"2025-08-04\" \/><meta itemprop=\"dateModified\" content=\"2025-08-04\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2023\/01\/consulenza-cyber-security-padova.jpg\" \/><meta itemprop=\"width\" content=\"2500\" \/><meta itemprop=\"height\" content=\"1644\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security-torino\/' title='Cyber Security Torino'>Cyber Security Torino<\/a><\/h3>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/13784\" content=\"Cyber Security Mantova\" \/><meta itemprop=\"datePublished\" content=\"2025-08-04\" \/><meta itemprop=\"dateModified\" content=\"2025-08-04\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2023\/01\/consulenza-cyber-security-roma.jpg\" \/><meta itemprop=\"width\" content=\"2560\" \/><meta itemprop=\"height\" content=\"1440\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security-mantova\/' title='Cyber Security Mantova'>Cyber Security Mantova<\/a><\/h3>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/13783\" content=\"Cyber Security Trento\" \/><meta itemprop=\"datePublished\" content=\"2025-08-04\" \/><meta itemprop=\"dateModified\" content=\"2025-08-04\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2022\/04\/33-scaled.jpg\" \/><meta itemprop=\"width\" content=\"2560\" \/><meta itemprop=\"height\" content=\"1629\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security-trento\/' title='Cyber Security Trento'>Cyber Security Trento<\/a><\/h3>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/13782\" content=\"Cyber Security Treviso\" \/><meta itemprop=\"datePublished\" content=\"2025-08-04\" \/><meta itemprop=\"dateModified\" content=\"2025-08-04\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2023\/01\/consulenza-cyber-security-padova.jpg\" \/><meta itemprop=\"width\" content=\"2500\" \/><meta itemprop=\"height\" content=\"1644\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security-treviso\/' title='Cyber Security Treviso'>Cyber Security Treviso<\/a><\/h3>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/13781\" content=\"Cyber Security Genova\" \/><meta itemprop=\"datePublished\" content=\"2025-08-04\" \/><meta itemprop=\"dateModified\" content=\"2025-08-04\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2023\/01\/consulenza-cyber-security-roma.jpg\" \/><meta itemprop=\"width\" content=\"2560\" \/><meta itemprop=\"height\" content=\"1440\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security-genova\/' title='Cyber Security Genova'>Cyber Security Genova<\/a><\/h3>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/13779\" content=\"Cyber Security Vicenza\" \/><meta itemprop=\"datePublished\" content=\"2025-08-04\" \/><meta itemprop=\"dateModified\" content=\"2025-08-04\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2022\/04\/33-scaled.jpg\" \/><meta itemprop=\"width\" content=\"2560\" \/><meta itemprop=\"height\" content=\"1629\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security-vicenza\/' title='Cyber Security Vicenza'>Cyber Security Vicenza<\/a><\/h3>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/13778\" content=\"Cyber Security Verona\" \/><meta itemprop=\"datePublished\" content=\"2025-08-04\" \/><meta itemprop=\"dateModified\" content=\"2025-08-04\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2023\/01\/consulenza-cyber-security-padova.jpg\" \/><meta itemprop=\"width\" content=\"2500\" \/><meta itemprop=\"height\" content=\"1644\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security-verona\/' title='Cyber Security Verona'>Cyber Security Verona<\/a><\/h3>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/13777\" content=\"Cyber Security Bologna\" \/><meta itemprop=\"datePublished\" content=\"2025-08-04\" \/><meta itemprop=\"dateModified\" content=\"2025-08-04\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2023\/01\/consulenza-cyber-security-roma.jpg\" \/><meta itemprop=\"width\" content=\"2560\" \/><meta itemprop=\"height\" content=\"1440\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security-bologna\/' title='Cyber Security Bologna'>Cyber Security Bologna<\/a><\/h3>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/9506\" content=\"Cyber Security Roma\" \/><meta itemprop=\"datePublished\" content=\"2023-02-21\" \/><meta itemprop=\"dateModified\" content=\"2025-01-21\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2023\/01\/consulenza-cyber-security-roma.jpg\" \/><meta itemprop=\"width\" content=\"2560\" \/><meta itemprop=\"height\" content=\"1440\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security-roma\/' title='Cyber Security Roma'>Cyber Security Roma<\/a><\/h3>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/9501\" content=\"Cyber Security Padova\" \/><meta itemprop=\"datePublished\" content=\"2023-01-30\" \/><meta itemprop=\"dateModified\" content=\"2025-01-21\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin\/\" \/><meta itemprop=\"name\" content=\"axiadmin\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2023\/01\/consulenza-cyber-security-padova.jpg\" \/><meta itemprop=\"width\" content=\"2500\" \/><meta itemprop=\"height\" content=\"1644\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security-padova\/' title='Cyber Security Padova'>Cyber Security Padova<\/a><\/h3>\n\t\t\t<a href=\"\" target=\"_self\">\n\t\t\t\t\t\t\t<\/a>\n\t\t<!-- .pp-content-posts -->\n<h2>\n\t\t\tCosa abbiamo fatto per i nostri clienti?\t<\/h2>\n\t\t\t<a href=\"https:\/\/www.axitea.com\/it\/casi-studio\/\" target=\"_self\">\n\t\t\t\t\t\t\tTUTTI I CASI STUDIO\n\t\t\t<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/13721\" content=\"Tecnologie integrate per la sicurezza e la sostenibilit\u00e0 ambientale: il caso ARAL\" \/><meta itemprop=\"datePublished\" content=\"2025-06-26\" \/><meta itemprop=\"dateModified\" content=\"2025-06-26\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/luca-robustelli\/\" \/><meta itemprop=\"name\" content=\"Luca Robustelli\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2025\/06\/aral-ripresa-drone-altra-1.jpg\" \/><meta itemprop=\"width\" content=\"1916\" \/><meta itemprop=\"height\" content=\"840\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/it\/casi-studio\/aral\/' title='Tecnologie integrate per la sicurezza e la sostenibilit\u00e0 ambientale: il caso ARAL'><img width=\"1916\" height=\"840\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2025\/06\/aral-ripresa-drone-altra-1.jpg\" alt=\"\" itemprop=\"image\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2025\/06\/aral-ripresa-drone-altra-1.jpg 1916w, https:\/\/www.axitea.com\/wp-content\/uploads\/2025\/06\/aral-ripresa-drone-altra-1-300x132.jpg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2025\/06\/aral-ripresa-drone-altra-1-1024x449.jpg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2025\/06\/aral-ripresa-drone-altra-1-768x337.jpg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2025\/06\/aral-ripresa-drone-altra-1-1536x673.jpg 1536w\" sizes=\"auto, (max-width: 1916px) 100vw, 1916px\" \/><\/a>\n        \t<a href=\"https:\/\/www.axitea.com\/it\/mercati-relativi\/waste-management\/\" rel=\"tag\">Waste Management<\/a>\n        <h5><a href='https:\/\/www.axitea.com\/it\/casi-studio\/aral\/' title='Tecnologie integrate per la sicurezza e la sostenibilit\u00e0 ambientale: il caso ARAL'>Tecnologie integrate per la sicurezza e la sostenibilit\u00e0 ambientale: il caso ARAL<\/a><\/h5>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/11349\" content=\"Fare squadra per proteggere gli asset di una gloriosa societ\u00e0: il caso Benetton Rugby\" \/><meta itemprop=\"datePublished\" content=\"2024-02-26\" \/><meta itemprop=\"dateModified\" content=\"2024-04-05\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/luca-robustelli\/\" \/><meta itemprop=\"name\" content=\"Luca Robustelli\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2024\/02\/benetton-mischia-web.jpg\" \/><meta itemprop=\"width\" content=\"1500\" \/><meta itemprop=\"height\" content=\"613\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/it\/casi-studio\/benetton-rugby\/' title='Fare squadra per proteggere gli asset di una gloriosa societ\u00e0: il caso Benetton Rugby'><img width=\"1500\" height=\"613\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2024\/02\/benetton-mischia-web.jpg\" alt=\"Case Study Benetton Rugby - Axitea\" itemprop=\"image\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2024\/02\/benetton-mischia-web.jpg 1500w, https:\/\/www.axitea.com\/wp-content\/uploads\/2024\/02\/benetton-mischia-web-300x123.jpg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2024\/02\/benetton-mischia-web-1024x418.jpg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2024\/02\/benetton-mischia-web-768x314.jpg 768w\" sizes=\"auto, (max-width: 1500px) 100vw, 1500px\" \/><\/a>\n        \t<a href=\"https:\/\/www.axitea.com\/it\/mercati-relativi\/altri-mercati\/\" rel=\"tag\">Altri Mercati<\/a>\n        <h5><a href='https:\/\/www.axitea.com\/it\/casi-studio\/benetton-rugby\/' title='Fare squadra per proteggere gli asset di una gloriosa societ\u00e0: il caso Benetton Rugby'>Fare squadra per proteggere gli asset di una gloriosa societ\u00e0: il caso Benetton Rugby<\/a><\/h5>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/11058\" content=\"Isole Ciclopi: le soluzioni IoT di Axitea a salvaguardia dell&#8217;Area Marina Protetta\" \/><meta itemprop=\"datePublished\" content=\"2024-01-22\" \/><meta itemprop=\"dateModified\" content=\"2024-02-23\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/luca-robustelli\/\" \/><meta itemprop=\"name\" content=\"Luca Robustelli\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2024\/01\/isole-ciclopi-castello.jpg\" \/><meta itemprop=\"width\" content=\"1800\" \/><meta itemprop=\"height\" content=\"799\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/it\/casi-studio\/isole-ciclopi-soluzioni-iot-a-salvaguardia-amp\/' title='Isole Ciclopi: le soluzioni IoT di Axitea a salvaguardia dell&#8217;Area Marina Protetta'><img width=\"1800\" height=\"799\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2024\/01\/isole-ciclopi-castello.jpg\" alt=\"Isole Ciclopi\" itemprop=\"image\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2024\/01\/isole-ciclopi-castello.jpg 1800w, https:\/\/www.axitea.com\/wp-content\/uploads\/2024\/01\/isole-ciclopi-castello-300x133.jpg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2024\/01\/isole-ciclopi-castello-1024x455.jpg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2024\/01\/isole-ciclopi-castello-768x341.jpg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2024\/01\/isole-ciclopi-castello-1536x682.jpg 1536w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\" \/><\/a>\n        \t<a href=\"https:\/\/www.axitea.com\/it\/mercati-relativi\/altri-mercati\/\" rel=\"tag\">Altri Mercati<\/a>\n        <h5><a href='https:\/\/www.axitea.com\/it\/casi-studio\/isole-ciclopi-soluzioni-iot-a-salvaguardia-amp\/' title='Isole Ciclopi: le soluzioni IoT di Axitea a salvaguardia dell&#8217;Area Marina Protetta'>Isole Ciclopi: le soluzioni IoT di Axitea a salvaguardia dell&#8217;Area Marina Protetta<\/a><\/h5>\n        \t<a href=\"https:\/\/www.axitea.com\/it\/soluzioni\/monitoraggio-e-gestione-degli-eventi\/\" rel=\"tag\">Monitoraggio e gestione degli eventi<\/a>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"http:\/\/10395\" content=\"Dalla sicurezza allo Smart Rent: il caso Lift Level\" \/><meta itemprop=\"datePublished\" content=\"2023-09-12\" \/><meta itemprop=\"dateModified\" content=\"2023-09-13\" \/><meta itemprop=\"name\" content=\"AXITEA\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"\/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/valeria-deidda\/\" \/><meta itemprop=\"name\" content=\"Valeria Deidda\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2023\/09\/lift-level-noleggio-axitea.jpeg\" \/><meta itemprop=\"width\" content=\"1280\" \/><meta itemprop=\"height\" content=\"643\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n    \t<a href='https:\/\/www.axitea.com\/it\/casi-studio\/satellite-lift-level-iot\/' title='Dalla sicurezza allo Smart Rent: il caso Lift Level'><img width=\"1280\" height=\"643\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2023\/09\/lift-level-noleggio-axitea.jpeg\" alt=\"lift level noleggio-axitea\" itemprop=\"image\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2023\/09\/lift-level-noleggio-axitea.jpeg 1280w, https:\/\/www.axitea.com\/wp-content\/uploads\/2023\/09\/lift-level-noleggio-axitea-300x151.jpeg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2023\/09\/lift-level-noleggio-axitea-1024x514.jpeg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2023\/09\/lift-level-noleggio-axitea-768x386.jpeg 768w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/a>\n        \t<a href=\"https:\/\/www.axitea.com\/it\/mercati-relativi\/trasporti\/\" rel=\"tag\">Trasporti<\/a>\n        <h5><a href='https:\/\/www.axitea.com\/it\/casi-studio\/satellite-lift-level-iot\/' title='Dalla sicurezza allo Smart Rent: il caso Lift Level'>Dalla sicurezza allo Smart Rent: il caso Lift Level<\/a><\/h5>\n        \t<a href=\"https:\/\/www.axitea.com\/it\/soluzioni\/sicurezza-automezzi\/\" rel=\"tag\">Fleet Security<\/a>\n\t\t<!-- .pp-content-posts -->\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Rilevazione-intrusione-1.png\" alt=\"Ico-pos-Rilevazione intrusione\" itemprop=\"image\" height=\"450\" width=\"450\" title=\"Ico-pos-Rilevazione intrusione\" onerror=\"this.style.display='none'\" loading=\"lazy\" \/>\n\t<p>Vuoi maggiori informazioni su cosa pu\u00f2 fare Axitea per te?<\/p>\n\t<a href=\"#\" id=\"trigger-\" role=\"button\" data-modal=\"\" data-node=\"\">\n\t\t\t\t\t\t\t\t\tContattaci\n\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\tPreview\n\t\t\tmodal-\n\t\t\t\t\t\t\t\t\t\t\t<h4 id=\"modal-title-\">Compila il modulo per richiedere un contatto:<\/h4>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<!--[activecampaign form=3]-->\n<iframe loading=\"lazy\" src=\"https:\/\/go.axitea.com\/l\/1015162\/2023-09-28\/42vt4\" width=\"100%\" height=\"100%\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\"><\/iframe>\n\n","protected":false},"excerpt":{"rendered":"<p>Soluzioni Servizi di Sicurezza Informatica e Cyber Security per Aziende Soluzioni di Cyber Security di ultima generazione per proteggere il business della tua azienda. Servizi gestiti di Cyber Security Il rischio cyber \u00e8 un rischio economico aziendale che pu\u00f2 portare al blocco dei processi, sottrazione e violazione di dati, alterazione o modifica della produzione, perdita &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.axitea.com\/it\/cyber-security\/\"> <span class=\"screen-reader-text\">Cyber Security<\/span> Leggi tutto \u00bb<\/a><\/p>\n","protected":false},"author":3,"featured_media":839,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"disabled","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"folder":[55],"class_list":["post-600","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Servizi Cyber Security e Sicurezza Informatica per Aziende | Axitea<\/title>\n<meta name=\"description\" content=\"Cyber Security Partner per la Sicurezza Informatica delle Aziende: protezione contro attacchi informatici, Security Operation Center H24. Scopri di pi\u00f9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.axitea.com\/it\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Servizi Cyber Security e Sicurezza Informatica per Aziende | Axitea\" \/>\n<meta property=\"og:description\" content=\"Cyber Security Partner per la Sicurezza Informatica delle Aziende: protezione contro attacchi informatici, Security Operation Center H24. Scopri di pi\u00f9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.axitea.com\/it\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"AXITEA\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-26T12:28:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/shutterstock_1472495273-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"657\" \/>\n\t<meta property=\"og:image:height\" content=\"547\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/cyber-security\\\/\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/cyber-security\\\/\",\"name\":\"Servizi Cyber Security e Sicurezza Informatica per Aziende | Axitea\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/shutterstock_1472495273-1.jpg\",\"datePublished\":\"2020-09-02T09:19:05+00:00\",\"dateModified\":\"2025-09-26T12:28:07+00:00\",\"description\":\"Cyber Security Partner per la Sicurezza Informatica delle Aziende: protezione contro attacchi informatici, Security Operation Center H24. Scopri di pi\u00f9.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.axitea.com\\\/it\\\/cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/cyber-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/shutterstock_1472495273-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/shutterstock_1472495273-1.jpg\",\"width\":657,\"height\":547},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Axitea\",\"item\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/\",\"name\":\"AXITEA\",\"description\":\"Security Evolution\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#organization\",\"name\":\"Axitea\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/logo-axitea-colore.svg\",\"contentUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/logo-axitea-colore.svg\",\"width\":515,\"height\":217,\"caption\":\"Axitea\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Servizi Cyber Security e Sicurezza Informatica per Aziende | Axitea","description":"Cyber Security Partner per la Sicurezza Informatica delle Aziende: protezione contro attacchi informatici, Security Operation Center H24. Scopri di pi\u00f9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.axitea.com\/it\/cyber-security\/","og_locale":"it_IT","og_type":"article","og_title":"Servizi Cyber Security e Sicurezza Informatica per Aziende | Axitea","og_description":"Cyber Security Partner per la Sicurezza Informatica delle Aziende: protezione contro attacchi informatici, Security Operation Center H24. Scopri di pi\u00f9.","og_url":"https:\/\/www.axitea.com\/it\/cyber-security\/","og_site_name":"AXITEA","article_modified_time":"2025-09-26T12:28:07+00:00","og_image":[{"width":657,"height":547,"url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/shutterstock_1472495273-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tempo di lettura stimato":"4 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.axitea.com\/it\/cyber-security\/","url":"https:\/\/www.axitea.com\/it\/cyber-security\/","name":"Servizi Cyber Security e Sicurezza Informatica per Aziende | Axitea","isPartOf":{"@id":"https:\/\/www.axitea.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.axitea.com\/it\/cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.axitea.com\/it\/cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/shutterstock_1472495273-1.jpg","datePublished":"2020-09-02T09:19:05+00:00","dateModified":"2025-09-26T12:28:07+00:00","description":"Cyber Security Partner per la Sicurezza Informatica delle Aziende: protezione contro attacchi informatici, Security Operation Center H24. Scopri di pi\u00f9.","breadcrumb":{"@id":"https:\/\/www.axitea.com\/it\/cyber-security\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.axitea.com\/it\/cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.axitea.com\/it\/cyber-security\/#primaryimage","url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/shutterstock_1472495273-1.jpg","contentUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/shutterstock_1472495273-1.jpg","width":657,"height":547},{"@type":"BreadcrumbList","@id":"https:\/\/www.axitea.com\/it\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Axitea","item":"https:\/\/www.axitea.com\/it\/"},{"@type":"ListItem","position":2,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/www.axitea.com\/it\/#website","url":"https:\/\/www.axitea.com\/it\/","name":"AXITEA","description":"Security Evolution","publisher":{"@id":"https:\/\/www.axitea.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.axitea.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.axitea.com\/it\/#organization","name":"Axitea","url":"https:\/\/www.axitea.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.axitea.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg","contentUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg","width":515,"height":217,"caption":"Axitea"},"image":{"@id":"https:\/\/www.axitea.com\/it\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/pages\/600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/comments?post=600"}],"version-history":[{"count":0,"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/pages\/600\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/media\/839"}],"wp:attachment":[{"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/media?parent=600"}],"wp:term":[{"taxonomy":"folder","embeddable":true,"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/folder?post=600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}