{"id":680,"date":"2020-09-03T12:28:00","date_gmt":"2020-09-03T10:28:00","guid":{"rendered":"https:\/\/axitea.borasolab.it\/?post_type=servizi&#038;p=680"},"modified":"2025-01-21T11:36:39","modified_gmt":"2025-01-21T10:36:39","slug":"crittografia-e-cifratura-dei-dati","status":"publish","type":"servizi","link":"https:\/\/www.axitea.com\/it\/crittografia-e-cifratura-dei-dati\/","title":{"rendered":"Crittografia e Cifratura dei dati"},"content":{"rendered":"<h4>\r\n\t\tSicurezza informatica\r\n\t<\/h4>\r\n<h1>\r\n\t\tCrittografia e Cifratura dei Dati\r\n\t<\/h1>\r\n\t<p>Protezione automatica con cifratura delle informazioni, dei file e dei dati<\/p>\r\n\t\t<h4>\r\n\t\t<\/h4>\r\n\t\t\t<p>Sempre pi\u00f9 aziende tendono a sostituire i propri device fissi con PC portatili, pi\u00f9 maneggevoli, leggeri e facili da trasportare. Ma anche pi\u00f9 facilmente trafugabili. I dati salvati sul computer &#8211; che siano documenti, immagini, musica o programmi non cambia &#8211; normalmente sono perfettamente leggibili da chiunque ne abbia accesso.Da sole, le password impostate durante l\u2019avvio del laptop non sono sufficienti a proteggere i dati. Basta infatti estrarre il disco rigido dal computer, inserirlo in un altro PC per essere in grado di aprire ogni tipologia di dato.Il servizio Crittografia e Cifratura dei dati fornito da Axitea permette di gestire la cifratura completa del disco e consiste nella fornitura di una password (personale e impostata dal cliente) che permette di decifrare i dati, ossia di renderli di nuovo leggibili.<\/p>\t\t\r\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png\" alt=\"Ico-pos-Monitoraggio reti informatiche\" \/>\r\n\t\t\t<p><\/p>\r\n\t\t\t\t\t<h4><\/h4>\r\n\t\t\t\t\t<p>La crittografia \u00e8 una tra le misure tecniche adeguate e fondamentali per proteggere i dati e raggiungere al contempo la conformit\u00e0 al Regolamento Generale sulla Protezione dei Dati Personali Europeo (GDPR).<\/p>\t\t\t\t\r\n<h2>\r\n\t\tCome Axitea  pu\u00f2 aiutarti\r\n\t<\/h2>\r\n\t\t\t\t\t<p>Dati illeggibili per gli estranei<\/p>\r\n\t\t\t\t\t<p>Cifratura completa del disco che rende i dati illeggibili a chiunque cerchi di consultarli senza la password di decrittazione.<\/p>\t\t\t\t\r\n\t\t\t\t\t<p>Massima protezione della privacy<\/p>\r\n\t\t\t\t\t<p>Elevata protezione della privacy che pu\u00f2 resistere anche ad attacchi di Brute Force.<\/p>\t\t\t\t\r\n\t\t\t\t\t<p>Unica console di gestione<\/p>\r\n\t\t\t\t\t<p>Criteri e chiavi di cifratura, policy di sicurezza gestiti da un\u2019unica console.<\/p>\t\t\t\t\r\n\t\t\t\t\t<p>La migliore sicurezza per i dati<\/p>\r\n\t\t\t\t\t<p>Prima linea di difesa essenziale per la protezione dei dati, considerata il metodo pi\u00f9 sicuro in assoluto per la loro sicurezza.<\/p>\t\t\t\t\r\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Rilevazione-intrusione-1.png\" alt=\"Ico-pos-Rilevazione intrusione\" itemprop=\"image\" height=\"450\" width=\"450\" title=\"Ico-pos-Rilevazione intrusione\" onerror=\"this.style.display='none'\"  \/>\r\n<h2>\r\n\t\tVuoi maggiori informazioni sul servizio di crittografia e cifratura dei dati?\r\n\t<\/h2>\r\n\t<a href=\"#\" id=\"trigger-\" data-modal=\"\" data-node=\"\">\r\n\t\t\t\t\t\t\t\t\tContattaci\r\n\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\tPreview\r\n\t\t\tmodal-\r\n\t\t\t\t\t\t\t\t\t\t<h2>Compila il modulo per richiedere un contatto:<\/h2>\r\n\t\t\t\t\t\t<div class='_form_3'><\/div><script type='text\/javascript' src='https:\/\/axitea.activehosted.com\/f\/embed.php?static=0&id=3&69F09DC2C57F1&nostyles=1&preview=0'><\/script>\t\t\t\t\t\r\n<h2>\r\n\t\tPrincipali funzionalit\u00e0\r\n\t<\/h2>\r\n\t\t\t\t\t<p><\/p>\r\n\t\t\t\t\t<p>Il servizio Crittografia e Cifratura dei dati offre una cifratura completa del disco gestita in maniera centralizzata, che utilizza Windows BitLocker e Mac FileVault, sfruttando le tecnologie integrate nei sistemi operativi.Il servizio si attiva prima dell\u2019avvio del sistema operativo (e la conseguente richiesta della password di accesso), rendendo inutile anche l\u2019estrazione dell\u2019hard disk.In caso di perdita\/dimenticanza della password, il SOC Axitea permette agli utenti di recuperare facilmente le proprie chiavi di ripristino, tornando rapidamente alle proprie mansioni lavorative con un conseguente risparmio sia in termini di tempo che di consumo delle risorse IT.<\/p>\t\t\t\t\r\n<h2>\r\n\t\tAltri servizi di prevention\r\n\t<\/h2>\r\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/it\/cyber-security\/data-center-protection\/\" content=\"Data Center Protection\" \/><meta itemprop=\"datePublished\" content=\"2020-09-08\" \/><meta itemprop=\"dateModified\" content=\"2021-03-01\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\r\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/data-center-protection\/' title='Data Center Protection'>Data Center Protection<\/a><\/h3>\r\n        \t<p>Monitoraggio e protezione delle singole applicazioni e dei processi all\u2019interno di una rete aziendale, attraverso una segmentazione&#8230;<\/p>\r\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/it\/cyber-security\/data-center-protection\/' title='Data Center Protection'>Data Center Protection<\/a>&#8220;>\r\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\r\n\t\t\t\t\t\t\t<\/a>\r\n<\/a>\r\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/it\/cyber-security\/data-loss-prevention\/\" content=\"Data Loss Prevention (DLP)\" \/><meta itemprop=\"datePublished\" content=\"2020-09-08\" \/><meta itemprop=\"dateModified\" content=\"2021-03-01\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\r\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/data-loss-prevention\/' title='Data Loss Prevention (DLP)'>Data Loss Prevention (DLP)<\/a><\/h3>\r\n        \t<p>Protezione in modo puntuale e mirato dei dati aziendali pi\u00f9 critici sulla base di regole (blocco del&#8230;<\/p>\r\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/it\/cyber-security\/data-loss-prevention\/' title='Data Loss Prevention (DLP)'>Data Loss Prevention (DLP)<\/a>&#8220;>\r\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\r\n\t\t\t\t\t\t\t<\/a>\r\n<\/a>\r\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/it\/cyber-security\/soc-as-a-service\/\" content=\"Soc as a service\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2021-03-01\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\r\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/soc-as-a-service\/' title='Soc as a service'>Soc as a service<\/a><\/h3>\r\n        \t<p>Monitoraggio real-time h24 degli eventi generati dagli applicativi e dai sistemi informativi aziendali, come strumento proattivo di&#8230;<\/p>\r\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/it\/cyber-security\/soc-as-a-service\/' title='Soc as a service'>Soc as a service<\/a>&#8220;>\r\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\r\n\t\t\t\t\t\t\t<\/a>\r\n<\/a>\r\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/it\/cyber-security\/crittografia-e-cifratura-dei-dati\/\" content=\"Crittografia e Cifratura dei dati\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2021-03-01\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\r\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/crittografia-e-cifratura-dei-dati\/' title='Crittografia e Cifratura dei dati'>Crittografia e Cifratura dei dati<\/a><\/h3>\r\n        \t<p>Criptaggio del disco fisso per scongiurare la libera lettura di dati sensibili in caso di furto del&#8230;<\/p>\r\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/it\/cyber-security\/crittografia-e-cifratura-dei-dati\/' title='Crittografia e Cifratura dei dati'>Crittografia e Cifratura dei dati<\/a>&#8220;>\r\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\r\n\t\t\t\t\t\t\t<\/a>\r\n<\/a>\r\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/it\/cyber-security\/vpn-as-a-service\/\" content=\"VPN as a Service\" \/><meta itemprop=\"datePublished\" content=\"2020-09-03\" \/><meta itemprop=\"dateModified\" content=\"2021-03-01\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\r\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/vpn-as-a-service\/' title='VPN as a Service'>VPN as a Service<\/a><\/h3>\r\n        \t<p>Creazione di connessioni sicure per i dipendenti che lavorano da remoto, senza dover effettuare investimenti per l\u2019upgrade&#8230;<\/p>\r\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/it\/cyber-security\/vpn-as-a-service\/' title='VPN as a Service'>VPN as a Service<\/a>&#8220;>\r\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\r\n\t\t\t\t\t\t\t<\/a>\r\n<\/a>\r\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/it\/cyber-security\/email-security\/\" content=\"Email security\" \/><meta itemprop=\"datePublished\" content=\"2020-09-02\" \/><meta itemprop=\"dateModified\" content=\"2021-03-02\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\r\n        <h3><a href='https:\/\/www.axitea.com\/it\/cyber-security\/email-security\/' title='Email security'>Email security<\/a><\/h3>\r\n        \t<p>Controllo evoluto del traffico email in entrata e in uscita, per riconoscere e bloccare mail infettate da&#8230;<\/p>\r\n    \t<a href=\"<a href='https:\/\/www.axitea.com\/it\/cyber-security\/email-security\/' title='Email security'>Email security<\/a>&#8220;>\r\n\t\t\t<a href=\"\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\r\n\t\t\t\t\t\t\t<\/a>\r\n<\/a>\r\n\t\t<!-- .pp-content-posts -->\r\n<h2>\r\n\t\tCosa abbiamo fatto per i nostri clienti?\r\n\t<\/h2>\r\n\t\t\t<a href=\"https:\/\/www.axitea.com\/it\/casi-studio\/\" target=\"_self\" role=\"button\" rel=\"noopener noreferrer\">\r\n\t\t\t\t\t\t\tTUTTI I CASI STUDIO\r\n\t\t\t<\/a>\r\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/it\/casi-studio\/sicurezza-proattiva-per-il-mondo-della-consulenza-di-benignik\/\" content=\"Sicurezza proattiva per il mondo della consulenza di Benigni&#038;K\" \/><meta itemprop=\"datePublished\" content=\"2020-11-02\" \/><meta itemprop=\"dateModified\" content=\"2021-02-22\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/luca-robustelli\/\" \/><meta itemprop=\"name\" content=\"Luca Robustelli\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/11\/sede-BK-vicenza-001.jpg\" \/><meta itemprop=\"width\" content=\"1366\" \/><meta itemprop=\"height\" content=\"768\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\r\n    \t<a href='https:\/\/www.axitea.com\/it\/casi-studio\/sicurezza-proattiva-per-il-mondo-della-consulenza-di-benignik\/' title='Sicurezza proattiva per il mondo della consulenza di Benigni&#038;K'><img decoding=\"async\" width=\"1366\" height=\"768\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/11\/sede-BK-vicenza-001.jpg\" alt=\"sede-BK-vicenza-axitea\" loading=\"lazy\" itemprop=\"image\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/11\/sede-BK-vicenza-001.jpg 1366w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/11\/sede-BK-vicenza-001-300x169.jpg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/11\/sede-BK-vicenza-001-1024x576.jpg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/11\/sede-BK-vicenza-001-768x432.jpg 768w\" sizes=\"auto, (max-width: 1366px) 100vw, 1366px\" \/><\/a>\r\n        \tAltri Mercati\r\n        <h5><a href='https:\/\/www.axitea.com\/it\/casi-studio\/sicurezza-proattiva-per-il-mondo-della-consulenza-di-benignik\/' title='Sicurezza proattiva per il mondo della consulenza di Benigni&#038;K'>Sicurezza proattiva per il mondo della consulenza di Benigni&#038;K<\/a><\/h5>\r\n        \tSicurezza informatica\r\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/it\/casi-studio\/security-avanzata-studio-legale-gattai\/\" content=\"Security avanzata per lo Studio Legale Gattai, Minoli, Agostinelli, Partners\" \/><meta itemprop=\"datePublished\" content=\"2020-10-29\" \/><meta itemprop=\"dateModified\" content=\"2021-03-01\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/valeria-deidda\/\" \/><meta itemprop=\"name\" content=\"Valeria Deidda\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/facciata-gattai-low.jpg\" \/><meta itemprop=\"width\" content=\"1700\" \/><meta itemprop=\"height\" content=\"1134\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\r\n    \t<a href='https:\/\/www.axitea.com\/it\/casi-studio\/security-avanzata-studio-legale-gattai\/' title='Security avanzata per lo Studio Legale Gattai, Minoli, Agostinelli, Partners'><img decoding=\"async\" width=\"1700\" height=\"1134\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/facciata-gattai-low.jpg\" alt=\"facciata-gattai-axitea\" loading=\"lazy\" itemprop=\"image\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/facciata-gattai-low.jpg 1700w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/facciata-gattai-low-300x200.jpg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/facciata-gattai-low-1024x683.jpg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/facciata-gattai-low-768x512.jpg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/10\/facciata-gattai-low.jpg 1536w\" sizes=\"auto, (max-width: 1700px) 100vw, 1700px\" \/><\/a>\r\n        \tAltri Mercati\r\n        <h5><a href='https:\/\/www.axitea.com\/it\/casi-studio\/security-avanzata-studio-legale-gattai\/' title='Security avanzata per lo Studio Legale Gattai, Minoli, Agostinelli, Partners'>Security avanzata per lo Studio Legale Gattai, Minoli, Agostinelli, Partners<\/a><\/h5>\r\n        \tSecurity Consulting\r\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/it\/casi-studio\/la-sicurezza-informatica-nello-sfidante-mondo-della-formula-1\/\" content=\"La sicurezza informatica nello sfidante mondo della Formula 1\" \/><meta itemprop=\"datePublished\" content=\"2020-09-08\" \/><meta itemprop=\"dateModified\" content=\"2020-11-09\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-scaled.jpg\" \/><meta itemprop=\"width\" content=\"2560\" \/><meta itemprop=\"height\" content=\"1707\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\r\n    \t<a href='https:\/\/www.axitea.com\/it\/casi-studio\/la-sicurezza-informatica-nello-sfidante-mondo-della-formula-1\/' title='La sicurezza informatica nello sfidante mondo della Formula 1'><img decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-scaled.jpg\" alt=\"\" loading=\"lazy\" itemprop=\"image\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-scaled.jpg 2560w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-300x200.jpg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-1024x683.jpg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-768x512.jpg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-1536x1024.jpg 1536w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/alfa-romeo-macchina-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/a>\r\n        \tAltri Mercati\r\n        <h5><a href='https:\/\/www.axitea.com\/it\/casi-studio\/la-sicurezza-informatica-nello-sfidante-mondo-della-formula-1\/' title='La sicurezza informatica nello sfidante mondo della Formula 1'>La sicurezza informatica nello sfidante mondo della Formula 1<\/a><\/h5>\r\n        \tSicurezza informatica\r\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/www.axitea.com\/it\/casi-studio\/economia-circolare-e-sicurezza-a-360\/\" content=\"Economia circolare e sicurezza a 360\u00b0 per Itelyum\" \/><meta itemprop=\"datePublished\" content=\"2020-09-08\" \/><meta itemprop=\"dateModified\" content=\"2020-11-09\" \/><meta itemprop=\"name\" content=\"AXITEA\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg\"><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/it\/author\/axiadmin2\/\" \/><meta itemprop=\"name\" content=\"Axiadmin2\" \/><meta itemprop=\"url\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/itelyum4.jpg\" \/><meta itemprop=\"width\" content=\"1700\" \/><meta itemprop=\"height\" content=\"1133\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\r\n    \t<a href='https:\/\/www.axitea.com\/it\/casi-studio\/economia-circolare-e-sicurezza-a-360\/' title='Economia circolare e sicurezza a 360\u00b0 per Itelyum'><img decoding=\"async\" width=\"1700\" height=\"1133\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/itelyum4.jpg\" alt=\"\" loading=\"lazy\" itemprop=\"image\" srcset=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/itelyum4.jpg 1700w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/itelyum4-300x200.jpg 300w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/itelyum4-1024x682.jpg 1024w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/itelyum4-768x512.jpg 768w, https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/09\/itelyum4-1536x1024.jpg 1536w\" sizes=\"auto, (max-width: 1700px) 100vw, 1700px\" \/><\/a>\r\n        \tManufacturing\r\n        <h5><a href='https:\/\/www.axitea.com\/it\/casi-studio\/economia-circolare-e-sicurezza-a-360\/' title='Economia circolare e sicurezza a 360\u00b0 per Itelyum'>Economia circolare e sicurezza a 360\u00b0 per Itelyum<\/a><\/h5>\r\n        \tSicurezza fisica\r\n\t\t<!-- .pp-content-posts -->\r\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Rilevazione-intrusione-1.png\" alt=\"Ico-pos-Rilevazione intrusione\" itemprop=\"image\" height=\"450\" width=\"450\" title=\"Ico-pos-Rilevazione intrusione\" onerror=\"this.style.display='none'\"  \/>\r\n\t<p>Vuoi maggiori informazioni su cosa pu\u00f2 fare Axitea per te?<\/p>\r\n\t<a href=\"#\" id=\"trigger-\" data-modal=\"\" data-node=\"\">\r\n\t\t\t\t\t\t\t\t\tContattaci\r\n\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\tPreview\r\n\t\t\tmodal-\r\n\t\t\t\t\t\t\t\t\t\t<h2>Compila il modulo per richiedere un contatto:<\/h2>\r\n\t\t\t\t\t\t<div class='_form_3'><\/div><script type='text\/javascript' src='https:\/\/axitea.activehosted.com\/f\/embed.php?static=0&id=3&69F09DC2C58A2&nostyles=1&preview=0'><\/script>\t\t\t\t\t\r\n","protected":false},"excerpt":{"rendered":"<p>Criptaggio del disco fisso per scongiurare la libera lettura di dati sensibili in caso di furto del PC.<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}}},"categoria_servizio":[],"mercati-relativi":[],"tag_servizi":[],"servizi_folder":[48],"class_list":["post-680","servizi","type-servizi","status-publish","format-standard","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Crittografia e Cifratura dei dati | Axitea<\/title>\n<meta name=\"description\" content=\"Axitea \u00e8 Global Security Provider per la Sicurezza Fisica e la Sicurezza Informatica. Scopri le soluzioni in tema di Crittografia e Cifratura dei dati.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.axitea.com\/it\/crittografia-e-cifratura-dei-dati\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Crittografia e Cifratura dei dati | Axitea\" \/>\n<meta property=\"og:description\" content=\"Axitea \u00e8 Global Security Provider per la Sicurezza Fisica e la Sicurezza Informatica. Scopri le soluzioni in tema di Crittografia e Cifratura dei dati.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.axitea.com\/it\/crittografia-e-cifratura-dei-dati\/\" \/>\n<meta property=\"og:site_name\" content=\"AXITEA\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-21T10:36:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/crittografia-e-cifratura-dei-dati\\\/\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/crittografia-e-cifratura-dei-dati\\\/\",\"name\":\"Crittografia e Cifratura dei dati | Axitea\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/crittografia-e-cifratura-dei-dati\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/crittografia-e-cifratura-dei-dati\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Ico-pos-Monitoraggio-reti-informatiche-1.png\",\"datePublished\":\"2020-09-03T10:28:00+00:00\",\"dateModified\":\"2025-01-21T10:36:39+00:00\",\"description\":\"Axitea \u00e8 Global Security Provider per la Sicurezza Fisica e la Sicurezza Informatica. Scopri le soluzioni in tema di Crittografia e Cifratura dei dati.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/crittografia-e-cifratura-dei-dati\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.axitea.com\\\/it\\\/crittografia-e-cifratura-dei-dati\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/crittografia-e-cifratura-dei-dati\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Ico-pos-Monitoraggio-reti-informatiche-1.png\",\"contentUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Ico-pos-Monitoraggio-reti-informatiche-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/crittografia-e-cifratura-dei-dati\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Axitea\",\"item\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Crittografia e Cifratura dei dati\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/\",\"name\":\"AXITEA\",\"description\":\"Security Evolution\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#organization\",\"name\":\"Axitea\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/logo-axitea-colore.svg\",\"contentUrl\":\"https:\\\/\\\/www.axitea.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/logo-axitea-colore.svg\",\"width\":515,\"height\":217,\"caption\":\"Axitea\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axitea.com\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Crittografia e Cifratura dei dati | Axitea","description":"Axitea \u00e8 Global Security Provider per la Sicurezza Fisica e la Sicurezza Informatica. Scopri le soluzioni in tema di Crittografia e Cifratura dei dati.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.axitea.com\/it\/crittografia-e-cifratura-dei-dati\/","og_locale":"it_IT","og_type":"article","og_title":"Crittografia e Cifratura dei dati | Axitea","og_description":"Axitea \u00e8 Global Security Provider per la Sicurezza Fisica e la Sicurezza Informatica. Scopri le soluzioni in tema di Crittografia e Cifratura dei dati.","og_url":"https:\/\/www.axitea.com\/it\/crittografia-e-cifratura-dei-dati\/","og_site_name":"AXITEA","article_modified_time":"2025-01-21T10:36:39+00:00","og_image":[{"url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.axitea.com\/it\/crittografia-e-cifratura-dei-dati\/","url":"https:\/\/www.axitea.com\/it\/crittografia-e-cifratura-dei-dati\/","name":"Crittografia e Cifratura dei dati | Axitea","isPartOf":{"@id":"https:\/\/www.axitea.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.axitea.com\/it\/crittografia-e-cifratura-dei-dati\/#primaryimage"},"image":{"@id":"https:\/\/www.axitea.com\/it\/crittografia-e-cifratura-dei-dati\/#primaryimage"},"thumbnailUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png","datePublished":"2020-09-03T10:28:00+00:00","dateModified":"2025-01-21T10:36:39+00:00","description":"Axitea \u00e8 Global Security Provider per la Sicurezza Fisica e la Sicurezza Informatica. Scopri le soluzioni in tema di Crittografia e Cifratura dei dati.","breadcrumb":{"@id":"https:\/\/www.axitea.com\/it\/crittografia-e-cifratura-dei-dati\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.axitea.com\/it\/crittografia-e-cifratura-dei-dati\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.axitea.com\/it\/crittografia-e-cifratura-dei-dati\/#primaryimage","url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png","contentUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/Ico-pos-Monitoraggio-reti-informatiche-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.axitea.com\/it\/crittografia-e-cifratura-dei-dati\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Axitea","item":"https:\/\/www.axitea.com\/it\/"},{"@type":"ListItem","position":2,"name":"Crittografia e Cifratura dei dati"}]},{"@type":"WebSite","@id":"https:\/\/www.axitea.com\/it\/#website","url":"https:\/\/www.axitea.com\/it\/","name":"AXITEA","description":"Security Evolution","publisher":{"@id":"https:\/\/www.axitea.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.axitea.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.axitea.com\/it\/#organization","name":"Axitea","url":"https:\/\/www.axitea.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.axitea.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg","contentUrl":"https:\/\/www.axitea.com\/wp-content\/uploads\/2020\/08\/logo-axitea-colore.svg","width":515,"height":217,"caption":"Axitea"},"image":{"@id":"https:\/\/www.axitea.com\/it\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/servizi\/680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/servizi"}],"about":[{"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/types\/servizi"}],"author":[{"embeddable":true,"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/users\/3"}],"wp:attachment":[{"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/media?parent=680"}],"wp:term":[{"taxonomy":"categoria_servizio","embeddable":true,"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/categoria_servizio?post=680"},{"taxonomy":"mercati-relativi","embeddable":true,"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/mercati-relativi?post=680"},{"taxonomy":"tag_servizi","embeddable":true,"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/tag_servizi?post=680"},{"taxonomy":"servizi_folder","embeddable":true,"href":"https:\/\/www.axitea.com\/it\/wp-json\/wp\/v2\/servizi_folder?post=680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}