{"id":78,"date":"2023-11-20T10:28:15","date_gmt":"2023-11-20T10:28:15","guid":{"rendered":"https:\/\/www.criticalservice.it\/?page_id=78"},"modified":"2024-01-11T17:44:38","modified_gmt":"2024-01-11T17:44:38","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.criticalservice.it\/index.php\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/cf23557a-d29e-408d-96e1-23499bdd66734.png&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; min_height=&#8221;409px&#8221; height=&#8221;289px&#8221; max_height=&#8221;195px&#8221; custom_margin=&#8221;2px||12px|0px|false|false&#8221; custom_padding=&#8221;4px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1751px&#8221; global_colors_info=&#8221;{}&#8221; custom_padding=&#8221;98px|||||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|700|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;40px&#8221; text_line_height=&#8221;1em&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Cybersecurity<\/p>\n<p>[\/et_pb_text][et_pb_divider divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;35%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|500|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;21px&#8221; text_line_height=&#8221;1.8em&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Protezione a 360\u00b0 dai rischi di sicurezza informatica<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;-39px|auto||auto||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/Black-Logo-Critical-SOC.png&#8221; title_text=&#8221;Black &#8211; Logo Critical SOC&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;54%&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.9em&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;|-18px||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Il SOC o Security Operations Center rappresenta la struttura, costituita da persone, tecnologie e processi, con l&#8217;obiettivo di intercettare le azioni potenzialmente dannose che mirano a superare la linea di difesa del cliente.<\/p>\n<p>Critical Service \u00e8 in grado di offrire servizi basati sul monitoraggio continuo per una difesa avanzata dalle minacce che vengono segnalate direttamente dal cliente o dai sistemi di controllo (SIEM)<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;23%&#8221; module_alignment=&#8221;right&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|700|||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;43px&#8221; text_orientation=&#8221;right&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Perch\u00e8?<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/Occhio-Cybersecurity_1.png&#8221; title_text=&#8221;Occhio Cybersecurity_1&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;32%&#8221; width_tablet=&#8221;57%&#8221; width_phone=&#8221;57%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;89%&#8221; min_height=&#8221;100px&#8221; max_height=&#8221;1000px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.8em&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>La sola sicurezza perimetrale basata sull&#8217;installazione di firewall e altri apparati di sicurezza tradizionale risulta insufficiente, poich\u00e8 le tecniche di attacco usate dagli hacker sono in continua evoluzione e sempre pi\u00f9 insidiose.<\/p>\n<p>Il nostro Team SOC esegue un&#8217;attivit\u00e0 di monitoraggio con elevata velocit\u00e0 di reazione per intercettare i tentativi di intrusione prima che possano generare danni al tuo business.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||2px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_icon font_icon=&#8221;&#x47;||divi||400&#8243; icon_width=&#8221;50px&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_icon][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||14px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/Banner-Cybersecurity-2.png&#8221; title_text=&#8221;Banner Cybersecurity (2)&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;13%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|700|||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;36px&#8221; custom_margin=&#8221;-26px|||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Attivit\u00e0\u00a0<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/SIEM-2.png&#8221; title_text=&#8221;SIEM&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/Web-Vulnerabilty-Assestment.png&#8221; title_text=&#8221;Web Vulnerabilty Assestment&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/Network-Vulnerabilty-Assestment-2.png&#8221; title_text=&#8221;Network Vulnerabilty Assestment (2)&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/Phishing-Simulation-Attack-1.png&#8221; title_text=&#8221;Phishing Simulation Attack&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/Phishing-Simulation-Attack-1-1.png&#8221; title_text=&#8221;Phishing Simulation Attack (1)&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/Phishing-Simulation-Attack-2.png&#8221; title_text=&#8221;Phishing Simulation Attack (2)&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/Phishing-Simulation-Attack-3.png&#8221; title_text=&#8221;Phishing Simulation Attack (3)&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/Phishing-Simulation-Attack-4.png&#8221; title_text=&#8221;Phishing Simulation Attack (4)&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;70%&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;0px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/Training-1.png&#8221; title_text=&#8221;Training&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;76%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/UEBA-1.png&#8221; title_text=&#8221;UEBA (1)&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;76%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/On-Site.png&#8221; title_text=&#8221;On Site&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;76%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/WebSite-Cybersecurityopac-1.png&#8221; custom_padding=&#8221;||88px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||1px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider divider_style=&#8221;ridge&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;18%&#8221; max_height=&#8221;1000px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;1px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|700|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;29px&#8221; text_line_height=&#8221;1em&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Servizio Tailor-Made<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|300|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Adottiamo un approccio su misura per offrire servizi scalabili in base alle specifiche necessit\u00e0 e vulnerabilit\u00e0 delle aziende, considerando i diversi settori in cui operano<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; width=&#8221;18%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|700|||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;30px&#8221; custom_margin=&#8221;-31px|||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Perch\u00e8 sceglierci?<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||1px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/Maggiore-efficienza-del-tuo-reparto-IT.png&#8221; title_text=&#8221;Maggiore efficienza del tuo reparto IT&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; min_height=&#8221;106px&#8221; height=&#8221;127px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|500|||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.9em&#8221; module_alignment=&#8221;left&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"color: #ed8b23;\"><strong>Maggiore efficienza del tuo reparto IT<\/strong><\/span><\/p>\n<p>L&#8217;operativit\u00e0 del SOC alleggerisce il carico di lavoro del tuo team IT intreno del cliente, permettendo ai dipendenti di concentrarsi su progetti critici e nuove iniziative.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;61px||1px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/Sicurezza-aggiornata.png&#8221; title_text=&#8221;Sicurezza aggiornata&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; min_height=&#8221;106px&#8221; height=&#8221;127px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.9em&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"color: #ed8b23;\"><strong>Sicurezza Aggiornata<\/strong><\/span><\/p>\n<p>Sistema di sicurezza costantemente aggiornato per poter fronteggiare le minacce in continua evoluzione.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;61px||5px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/Monitoraggio-continuo-e-rapidita-di-risposta.png&#8221; title_text=&#8221;Monitoraggio continuo e rapidit\u00e0 di risposta&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; min_height=&#8221;106px&#8221; height=&#8221;127px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|500|||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.9em&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong><span style=\"color: #ed8b23;\">Monitoraggio continuo e rapidit\u00e0 di risposta<\/span>\u00a0<\/strong><\/p>\n<p>Il SOC \u00e8 progettato per monitorare in modalit\u00e0 24\/7 i sistemi di sicurezza, identificare rapidamente i problemi e prevenirli prima che diventino potenzialmente dannosi.\u00a0<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;60px||4px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/Ottimizzazione-del-perimetro.png&#8221; title_text=&#8221;Ottimizzazione del perimetro&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;106px&#8221; height=&#8221;127px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|500|||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.9em&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"color: #ed8b23;\"><strong>Ottimizzazione del perimetro<\/strong><\/span><\/p>\n<p>Il SOC fornisce report sullo stato della sicurezza perimetrale, identifica le aree di miglioramento e implementa le azioni necessarie per migliorarne le performance.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;61px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.criticalservice.it\/wp-content\/uploads\/2023\/12\/Azioni-di-ripristino-in-caso-di-attacchi-subiti.png&#8221; title_text=&#8221;Azioni di ripristino in caso di attacchi subiti&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;106px&#8221; height=&#8221;127px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|500|||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.9em&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"color: #ed8b23;\"><strong>Azioni di ripristino in caso di attacchi subiti<\/strong><\/span><\/p>\n<p>Grazie ad un piano di azione che documenta una serie di passi attuabili che l&#8217;azienda deve seguire per ripristinare con successo dati, sistemi e servizi.\u00a0<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Download Now&#8221; _builder_version=&#8221;4.23.4&#8243; background_color=&#8221;#ED8B23&#8243; custom_margin=&#8221;-1px|||||&#8221; custom_padding=&#8221;9px|0px|10px|0px||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;6px||6px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|800|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.9em&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Scopri come possiamo aiutarti a raggiungere i tuoi obiettivi<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;59px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/www.criticalservice.it\/index.php\/contattaci\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Contattaci&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.23.4&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;26px&#8221; button_text_color=&#8221;#ED8B23&#8243; button_bg_use_color_gradient=&#8221;on&#8221; button_bg_color_gradient_stops=&#8221;#000000 1%|#000000 100%&#8221; button_border_width=&#8221;0px&#8221; box_shadow_style=&#8221;preset4&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CybersecurityProtezione a 360\u00b0 dai rischi di sicurezza informaticaIl SOC o Security Operations Center rappresenta la struttura, costituita da persone, tecnologie e processi, con l&#8217;obiettivo di intercettare le azioni potenzialmente dannose che mirano a superare la linea di difesa del cliente. Critical Service \u00e8 in grado di offrire servizi basati sul monitoraggio continuo per una difesa [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-78","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.criticalservice.it\/index.php\/wp-json\/wp\/v2\/pages\/78","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.criticalservice.it\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.criticalservice.it\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.criticalservice.it\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.criticalservice.it\/index.php\/wp-json\/wp\/v2\/comments?post=78"}],"version-history":[{"count":54,"href":"https:\/\/www.criticalservice.it\/index.php\/wp-json\/wp\/v2\/pages\/78\/revisions"}],"predecessor-version":[{"id":1060,"href":"https:\/\/www.criticalservice.it\/index.php\/wp-json\/wp\/v2\/pages\/78\/revisions\/1060"}],"wp:attachment":[{"href":"https:\/\/www.criticalservice.it\/index.php\/wp-json\/wp\/v2\/media?parent=78"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}