{"id":97,"date":"2024-03-16T23:11:02","date_gmt":"2024-03-16T22:11:02","guid":{"rendered":"http:\/\/www.centergroup.it\/?page_id=97"},"modified":"2024-04-06T18:33:05","modified_gmt":"2024-04-06T16:33:05","slug":"97-2","status":"publish","type":"page","link":"http:\/\/www.centergroup.it\/?page_id=97","title":{"rendered":"Soluzioni di Cybersecurity"},"content":{"rendered":"<div id=\"dslc-theme-content\"><div id=\"dslc-theme-content-inner\">\n<div class=\"wp-block-group alignfull\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group alignfull is-content-justification-space-between is-layout-flex wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--30);padding-right:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30);padding-left:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-group is-layout-flex wp-block-group-is-layout-flex\"><div class=\"is-default-size wp-block-site-logo\"><a href=\"http:\/\/www.centergroup.it\/\" title=\"CENTER GROUP SRL - Ready for future\" rel=\"home\" itemprop=\"url\"><\/a><\/div>\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-block-group-is-layout-flex\"><h1 class=\"has-link-color wp-elements-f7ec64f471b5bfcc0be230aa4daa838e wp-block-site-title has-medium-font-size\"><a href=\"http:\/\/www.centergroup.it\" target=\"_self\" rel=\"home\">CENTER GROUP SRL<\/a><\/h1><\/div>\n<\/div>\n\n\n<nav class=\"is-responsive items-justified-right wp-block-navigation is-content-justification-right is-layout-flex wp-block-navigation-is-layout-flex\" aria-label=\"Navigazione\" \n\t\t data-wp-interactive=\"core\/navigation\" data-wp-context='{\"overlayOpenedBy\":{\"click\":false,\"hover\":false,\"focus\":false},\"type\":\"overlay\",\"roleAttribute\":\"\",\"ariaLabel\":\"Menu\"}'><button aria-haspopup=\"dialog\" aria-label=\"Apri menu\" class=\"wp-block-navigation__responsive-container-open \" \n\t\t\t\tdata-wp-on-async--click=\"actions.openMenuOnClick\"\n\t\t\t\tdata-wp-on--keydown=\"actions.handleMenuKeydown\"\n\t\t\t><svg width=\"24\" height=\"24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" aria-hidden=\"true\" focusable=\"false\"><rect x=\"4\" y=\"7.5\" width=\"16\" height=\"1.5\" \/><rect x=\"4\" y=\"15\" width=\"16\" height=\"1.5\" \/><\/svg><\/button>\n\t\t\t\t<div class=\"wp-block-navigation__responsive-container  \"  id=\"modal-1\" \n\t\t\t\tdata-wp-class--has-modal-open=\"state.isMenuOpen\"\n\t\t\t\tdata-wp-class--is-menu-open=\"state.isMenuOpen\"\n\t\t\t\tdata-wp-watch=\"callbacks.initMenu\"\n\t\t\t\tdata-wp-on--keydown=\"actions.handleMenuKeydown\"\n\t\t\t\tdata-wp-on-async--focusout=\"actions.handleMenuFocusout\"\n\t\t\t\ttabindex=\"-1\"\n\t\t\t>\n\t\t\t\t\t<div class=\"wp-block-navigation__responsive-close\" tabindex=\"-1\">\n\t\t\t\t\t\t<div class=\"wp-block-navigation__responsive-dialog\" \n\t\t\t\tdata-wp-bind--aria-modal=\"state.ariaModal\"\n\t\t\t\tdata-wp-bind--aria-label=\"state.ariaLabel\"\n\t\t\t\tdata-wp-bind--role=\"state.roleAttribute\"\n\t\t\t>\n\t\t\t\t\t\t\t<button aria-label=\"Chiudi menu\" class=\"wp-block-navigation__responsive-container-close\" \n\t\t\t\tdata-wp-on-async--click=\"actions.closeMenuOnClick\"\n\t\t\t><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" width=\"24\" height=\"24\" aria-hidden=\"true\" focusable=\"false\"><path d=\"m13.06 12 6.47-6.47-1.06-1.06L12 10.94 5.53 4.47 4.47 5.53 10.94 12l-6.47 6.47 1.06 1.06L12 13.06l6.47 6.47 1.06-1.06L13.06 12Z\"><\/path><\/svg><\/button>\n\t\t\t\t\t\t\t<div class=\"wp-block-navigation__responsive-container-content\" \n\t\t\t\tdata-wp-watch=\"callbacks.focusFirstElement\"\n\t\t\t id=\"modal-1-content\">\n\t\t\t\t\t\t\t\t<ul class=\"wp-block-navigation__container is-responsive items-justified-right wp-block-navigation\"><ul class=\"wp-block-page-list\"><li class=\"wp-block-pages-list__item wp-block-navigation-item open-on-hover-click menu-item-home\"><a class=\"wp-block-pages-list__item__link wp-block-navigation-item__content\" href=\"http:\/\/www.centergroup.it\/?page_id=165\">Chi siamo<\/a><\/li><li class=\"wp-block-pages-list__item wp-block-navigation-item open-on-hover-click\"><a class=\"wp-block-pages-list__item__link wp-block-navigation-item__content\" href=\"http:\/\/www.centergroup.it\/?page_id=76\">h<\/a><\/li><li class=\"wp-block-pages-list__item wp-block-navigation-item open-on-hover-click\"><a class=\"wp-block-pages-list__item__link wp-block-navigation-item__content\" href=\"http:\/\/www.centergroup.it\/?page_id=348\">JS Help Desk<\/a><\/li><li class=\"wp-block-pages-list__item wp-block-navigation-item open-on-hover-click\"><a class=\"wp-block-pages-list__item__link wp-block-navigation-item__content\" href=\"http:\/\/www.centergroup.it\/?page_id=272\">Manutenzione e supporto sistemistico<\/a><\/li><li class=\"wp-block-pages-list__item wp-block-navigation-item open-on-hover-click\"><a class=\"wp-block-pages-list__item__link wp-block-navigation-item__content\" href=\"http:\/\/www.centergroup.it\/?page_id=175\">Profilo aziendale<\/a><\/li><li class=\"wp-block-pages-list__item wp-block-navigation-item open-on-hover-click\"><a class=\"wp-block-pages-list__item__link wp-block-navigation-item__content\" href=\"http:\/\/www.centergroup.it\/?page_id=406\">Programmazione PLC<\/a><\/li><li class=\"wp-block-pages-list__item wp-block-navigation-item open-on-hover-click\"><a class=\"wp-block-pages-list__item__link wp-block-navigation-item__content\" href=\"http:\/\/www.centergroup.it\/?page_id=14\">PROVA<\/a><\/li><li class=\"wp-block-pages-list__item wp-block-navigation-item open-on-hover-click\"><a class=\"wp-block-pages-list__item__link wp-block-navigation-item__content\" href=\"http:\/\/www.centergroup.it\/?page_id=515\">Servizi REAL DATA per DR e backup remoto per AS\/400<\/a><\/li><li class=\"wp-block-pages-list__item wp-block-navigation-item open-on-hover-click\"><a class=\"wp-block-pages-list__item__link wp-block-navigation-item__content\" href=\"http:\/\/www.centergroup.it\/?page_id=97\">Soluzioni di Cybersecurity<\/a><\/li><li class=\"wp-block-pages-list__item wp-block-navigation-item open-on-hover-click\"><a class=\"wp-block-pages-list__item__link wp-block-navigation-item__content\" href=\"http:\/\/www.centergroup.it\/?page_id=212\">Sviluppo software<\/a><\/li><li class=\"wp-block-pages-list__item wp-block-navigation-item open-on-hover-click\"><a class=\"wp-block-pages-list__item__link wp-block-navigation-item__content\" href=\"http:\/\/www.centergroup.it\/?page_id=318\">Telefonia VOIP e Unified Communication<\/a><\/li><li class=\"wp-block-pages-list__item wp-block-navigation-item open-on-hover-click\"><a class=\"wp-block-pages-list__item__link wp-block-navigation-item__content\" href=\"http:\/\/www.centergroup.it\/?page_id=328\">Videosorveglianza IP<\/a><\/li><\/ul><\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/nav><\/div>\n\n\n\n<div class=\"wp-block-cover alignfull\" style=\"margin-top:0;min-height:374px\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-black-background-color has-background-dim-0 has-background-dim\"><\/span><img fetchpriority=\"high\" decoding=\"async\" width=\"1949\" height=\"975\" class=\"wp-block-cover__image-background wp-image-103\" alt=\"\" src=\"http:\/\/www.centergroup.it\/wp-content\/uploads\/2024\/03\/2061092.jpg\" data-object-fit=\"cover\" srcset=\"http:\/\/www.centergroup.it\/wp-content\/uploads\/2024\/03\/2061092.jpg 1949w, http:\/\/www.centergroup.it\/wp-content\/uploads\/2024\/03\/2061092-300x150.jpg 300w, http:\/\/www.centergroup.it\/wp-content\/uploads\/2024\/03\/2061092-1024x512.jpg 1024w, http:\/\/www.centergroup.it\/wp-content\/uploads\/2024\/03\/2061092-768x384.jpg 768w, http:\/\/www.centergroup.it\/wp-content\/uploads\/2024\/03\/2061092-1536x768.jpg 1536w\" sizes=\"(max-width: 1949px) 100vw, 1949px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-columns alignfull is-layout-flex wp-block-columns-is-layout-flex\" style=\"margin-bottom:0\">\n<div class=\"wp-block-column has-white-background-color has-text-color has-background has-link-color wp-elements-2dd702c8f3267c9fdd673f89ab3556b5 is-layout-flow wp-block-column-is-layout-flow\" style=\"color:#000000;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<h2 class=\"wp-block-heading has-vivid-red-color has-text-color has-link-color wp-elements-56079689cc60ea21c5740d7fe29049b5\" id=\"single\" style=\"font-size:40px\">Difesa del perimetro<\/h2>\n\n\n\n<p class=\"has-medium-font-size\" style=\"line-height:1.5\"><strong>Sicurezza e difesa del perimetro<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-css-opacity has-background is-style-wide\" style=\"background-color:#000000;color:#000000\"\/>\n\n\n\n<p>La sicurezza perimetrale \u00e8 fondamentale per proteggere i dati aziendali da minacce interne ed esterne. Immaginiamola come la difesa di una fortezza: il perimetro aziendale rappresenta i confini virtuali dell\u2019azienda, e la sua protezione \u00e8 cruciale. Ecco alcuni concetti chiave:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"241\" height=\"180\" src=\"http:\/\/www.centergroup.it\/wp-content\/uploads\/2024\/04\/OIP-2.jpg\" alt=\"\" class=\"wp-image-466\" style=\"width:303px;height:auto\"\/><\/figure>\n\n\n\n<p>Firewall Perimetrale: Un firewall \u00e8 l\u2019avamposto della sicurezza perimetrale. Esso filtra e analizza ogni pacchetto di dati che entra o esce dall\u2019organizzazione. Il firewall verifica l\u2019identit\u00e0 del mittente e del destinatario e blocca comportamenti malevoli. \u00c8 come un tagliafuoco che impedisce la propagazione di incendi.<\/p>\n\n\n\n<p><br>Strategia Multi-Layer: La network security moderna \u00e8 intrinsecamente multi-layer. Diversi strati di protezione (come hardening, firewall, IDS, segmentazione, controllo degli accessi, crittografia) lavorano sinergicamente per proteggere i dati preziosi dell\u2019azienda da errori o attacchi deliberati.<\/p>\n\n\n\n<p><br>Criteri di Filtraggio: I firewall definiscono ci\u00f2 che pu\u00f2 entrare o uscire dal sistema. Due criteri comuni sono:<br>Default-deny: Tutto \u00e8 bloccato di default, tranne ci\u00f2 che \u00e8 esplicitamente autorizzato.<\/p>\n\n\n\n<p><br>Default-allow: Tutto \u00e8 consentito di default, tranne ci\u00f2 che \u00e8 specificamente limitato. Il primo criterio \u00e8 pi\u00f9 diffuso e offre maggiore sicurezza.<\/p>\n\n\n\n<p><br>Benefici del Firewall Perimetrale:<br>Controllo del Traffico: Monitora e gestisce il flusso di dati.<br>Protezione dai Data Breach: Blocca l\u2019accesso non autorizzato.<br>Prima Barriera alle Minacce Estere: Protegge il sistema informatico dall\u2019esterno.<\/p>\n\n\n\n<p>La sicurezza di rete, o network security \u00e8  finalizzata a garantire:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>la&nbsp;<strong>continuit\u00e0 operativa<\/strong>&nbsp;dei sistemi presenti nella rete aziendale, tra cui i PC, i server, gli apparati di rete e i dispositivi mobile;<\/li>\n\n\n\n<li>la&nbsp;<strong>salvaguardia dei dati aziendali critici<\/strong>&nbsp;contro minacce interne ed esterne in crescita esponenziale.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"240\" height=\"180\" src=\"http:\/\/www.centergroup.it\/wp-content\/uploads\/2024\/04\/OIP-1.jpg\" alt=\"\" class=\"wp-image-457\" style=\"width:304px;height:auto\"\/><\/figure>\n\n\n\n<div class=\"wp-block-buttons alignfull is-horizontal is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100\"><a class=\"wp-block-button__link has-white-color has-cyan-bluish-gray-background-color has-text-color has-background no-border-radius wp-element-button\">On premise o con cloud ibrido!<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-white-background-color has-text-color has-background has-link-color wp-elements-b303c19685a2193474c0a1c56fe5df3f is-layout-flow wp-block-column-is-layout-flow\" style=\"color:#000000;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<h2 class=\"wp-block-heading has-light-green-cyan-color has-text-color has-link-color wp-elements-fab9431ed0075a84c78b1e8af076ecfb\" id=\"family\" style=\"font-size:40px\">Endpoint<\/h2>\n\n\n\n<p class=\"has-medium-font-size\" style=\"line-height:1.5\"><strong>Le nostre soluzioni<\/strong> <strong>per la protezione<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<p class=\"has-small-font-size\"><strong>Mobile Threat Defense (MTD)<\/strong>: Difesa dalle minacce mobili.<\/p>\n\n\n\n<p class=\"has-small-font-size\"><strong>Endpoint Detection and Response (EDR)<\/strong>: Soluzioni di rilevamento e risposta per gli endpoint.<\/p>\n\n\n\n<p class=\"has-small-font-size\"><strong>Endpoint Protection Platform (EPP)<\/strong>: Piattaforma di protezione degli endpoint.<\/p>\n\n\n\n<p class=\"has-small-font-size\"><strong>Advanced Threat Protection (ATP)<\/strong>: Protezione avanzata dalle minacce<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"565\" height=\"309\" src=\"http:\/\/www.centergroup.it\/wp-content\/uploads\/2024\/04\/img2.webp\" alt=\"\" class=\"wp-image-490\" srcset=\"http:\/\/www.centergroup.it\/wp-content\/uploads\/2024\/04\/img2.webp 565w, http:\/\/www.centergroup.it\/wp-content\/uploads\/2024\/04\/img2-300x164.webp 300w\" sizes=\"(max-width: 565px) 100vw, 565px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-buttons alignfull is-horizontal is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-fill\"><a class=\"wp-block-button__link has-black-color has-light-green-cyan-background-color has-text-color has-background no-border-radius wp-element-button\">Contattaci per la soluzione adatta!<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-white-background-color has-text-color has-background has-link-color wp-elements-1f7bead6f611df1624f76efeea767412 is-layout-flow wp-block-column-is-layout-flow\" style=\"color:#000000;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-bdc0ef0135cd44f2f78d1b1d23af73e8\" id=\"patron\" style=\"font-size:40px\">XDR<\/h2>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Extended Detection and Response<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<p class=\"has-medium-font-size\">Integrazione di Strumenti di Sicurezza<\/p>\n\n\n\n<p class=\"has-small-font-size\">L\u2019XDR consente alle soluzioni di sicurezza di interagire senza problemi sulla prevenzione, il rilevamento, l\u2019analisi e la risposta delle minacce. Questo elimina le lacune di visibilit\u00e0 tra gli strumenti e i livelli di sicurezza, consentendo ai team di sicurezza di rilevare e risolvere le minacce in modo pi\u00f9 rapido ed efficiente<\/p>\n\n\n\n<p class=\"has-small-font-size\"><strong>Visibilit\u00e0 End-to-End<\/strong><\/p>\n\n\n\n<p class=\"has-small-font-size\">L\u2019XDR offre visibilit\u00e0 delle minacce su tutti i vettori, inclusi utenti, endpoint, email, reti e carichi di lavoro cloud. Questo aiuta a individuare minacce sofisticate o nascoste che potrebbero altrimenti sfuggire.<\/p>\n\n\n\n<p class=\"has-small-font-size\"><strong>Interfaccia Unificata<\/strong><\/p>\n\n\n\n<p class=\"has-small-font-size\">L\u2019XDR semplifica le operazioni di sicurezza fornendo un\u2019interfaccia unificata per il rilevamento delle minacce, l\u2019analisi e la risposta. Questo ottimizza i flussi di lavoro e facilita l\u2019indagine sulle minacce<\/p>\n\n\n\n<div class=\"wp-block-buttons alignfull is-horizontal is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100\"><a class=\"wp-block-button__link has-white-color has-vivid-cyan-blue-background-color has-text-color has-background no-border-radius wp-element-button\">Porta la tua difesa ad un livello superiore<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-white-background-color has-text-color has-background has-link-color wp-elements-ad718a2ff68f095052dd0f6d1d9e7419 is-layout-flow wp-block-column-is-layout-flow\" style=\"color:#000000;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em\">\n<h2 class=\"wp-block-heading has-luminous-vivid-amber-color has-text-color has-link-color wp-elements-3c75d46e84b106b9d04b61da3f11bca0\" id=\"patron\" style=\"font-size:40px\">XCG-back<\/h2>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Disaster recovery e backup off-site<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<p class=\"has-medium-font-size\">I vantaggi di un piano di Backup e Disaster Recovery<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"270\" height=\"180\" src=\"http:\/\/www.centergroup.it\/wp-content\/uploads\/2024\/04\/OIP-4.jpg\" alt=\"\" class=\"wp-image-469\" style=\"width:399px;height:auto\"\/><\/figure>\n\n\n\n<p class=\"has-small-font-size\"><strong>Rapido Ripristino<\/strong>:<\/p>\n\n\n\n<p class=\"has-small-font-size\">Un buon piano di ripristino in caso di disastro dovrebbe consentire un rapido recupero dalle interruzioni, indipendentemente dalla causa delle stesse.&nbsp;Ci\u00f2 riduce al minimo l\u2019impatto negativo sull\u2019azienda, poich\u00e9 pi\u00f9 lungo \u00e8 il tempo di recupero, maggiore \u00e8 l\u2019impatto finanziario e sulla reputazione.<\/p>\n\n\n\n<p class=\"has-small-font-size\"><strong>Vantaggio Competitivo<\/strong>:<\/p>\n\n\n\n<p class=\"has-small-font-size\">Le organizzazioni con un piano di ripristino in caso di disastro hanno un vantaggio competitivo rispetto a quelle che non ne hanno uno.&nbsp;In caso di catastrofe di origine naturale o crisi di altro tipo, le aziende senza un piano dovrebbero arrestare l\u2019operativit\u00e0, mentre quelle con un DRP possono continuare a operare con minori interruzioni.<\/p>\n\n\n\n<p class=\"has-text-align-left has-small-font-size\"><strong>Preservazione dei Dati Sensibili<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left has-small-font-size\">Grazie alle misure di backup e ripristino previste dal piano, si garantisce la conservazione e la disponibilit\u00e0 dei dati critici in caso di perdita<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-buttons alignfull is-horizontal is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100\"><a class=\"wp-block-button__link has-black-color has-luminous-vivid-amber-background-color has-text-color has-background no-border-radius wp-element-button\">Contattaci per il tuo piano di disaster recovery!<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<p style=\"text-align: center;\"><strong>I PARTNER TECHNOLOGICI PER LA NOSTRA SICUREZZA CYBER<\/strong><\/p>\n\n\n<div class=\"wp-block-columns has-white-background-color has-background is-layout-flex wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"299\" height=\"180\" src=\"http:\/\/www.centergroup.it\/wp-content\/uploads\/2024\/03\/OIP-2.jpeg\" alt=\"\" class=\"wp-image-116\" style=\"width:116px;height:auto\"\/><\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"155\" height=\"56\" src=\"http:\/\/www.centergroup.it\/wp-content\/uploads\/2024\/03\/OIP-1.jpeg\" alt=\"\" class=\"wp-image-115\" style=\"width:111px;height:auto\"\/><\/figure><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"340\" height=\"61\" src=\"http:\/\/www.centergroup.it\/wp-content\/uploads\/2024\/03\/OIP-3.jpeg\" alt=\"\" class=\"wp-image-117\" style=\"width:195px;height:auto\" srcset=\"http:\/\/www.centergroup.it\/wp-content\/uploads\/2024\/03\/OIP-3.jpeg 340w, http:\/\/www.centergroup.it\/wp-content\/uploads\/2024\/03\/OIP-3-300x54.jpeg 300w\" sizes=\"(max-width: 340px) 100vw, 340px\" \/><\/figure><\/div><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<div class=\"wp-block-group alignfull has-white-background-color has-text-color has-background\" style=\"color:#000000\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><\/div><\/div>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-center is-style-large has-white-background-color has-background is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-white-background-color has-text-color has-background has-link-color has-medium-font-size wp-elements-4c1c2632797a7fed909c3b0472e8ecb2\"><strong> E&#8217; necessario avere un approccio pragmatico per una corretta valutazione del rischio informatico<\/strong> <\/p>\n<cite>\u2014 Amedeo Fiore, CEO Center Group<\/cite><\/blockquote>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center has-large-font-size\"><\/p>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Difesa del perimetro Sicurezza e difesa del perimetro La sicurezza perimetrale \u00e8 fondamentale per proteggere i dati aziendali da minacce interne ed esterne. Immaginiamola come la difesa di una fortezza: il perimetro aziendale rappresenta i confini virtuali dell\u2019azienda, e la sua protezione \u00e8 cruciale. Ecco alcuni concetti chiave: Firewall Perimetrale: Un firewall \u00e8 l\u2019avamposto della <a class=\"read-more\" href=\"http:\/\/www.centergroup.it\/?page_id=97\">LEGGI TUTTO<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-97","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/www.centergroup.it\/index.php?rest_route=\/wp\/v2\/pages\/97","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.centergroup.it\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.centergroup.it\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.centergroup.it\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.centergroup.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=97"}],"version-history":[{"count":57,"href":"http:\/\/www.centergroup.it\/index.php?rest_route=\/wp\/v2\/pages\/97\/revisions"}],"predecessor-version":[{"id":491,"href":"http:\/\/www.centergroup.it\/index.php?rest_route=\/wp\/v2\/pages\/97\/revisions\/491"}],"wp:attachment":[{"href":"http:\/\/www.centergroup.it\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=97"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}