{"id":1395,"date":"2023-09-12T15:03:32","date_gmt":"2023-09-12T15:03:32","guid":{"rendered":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/?page_id=1395"},"modified":"2023-10-12T13:36:13","modified_gmt":"2023-10-12T13:36:13","slug":"servizi","status":"publish","type":"page","link":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/servizi\/","title":{"rendered":"Servizi"},"content":{"rendered":"

[vc_row css=”.vc_custom_1684764963100{margin-top: 20px !important;}”][vc_column][vc_custom_heading text=”Servizi e soluzioni per la Cyber Security” google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]<\/p>\n

\n
\n

Il nostro obiettivo \u00e8 aiutare le aziende ad identificare e opportunamente mitigare possibili attacchi<\/strong> e violazioni ai loro sistemi e a produrre miglioramenti tangibili del loro livello di Cyber Security e consapevolezza dei rischi.<\/p>\n<\/div>\n<\/div>\n

<\/div>\n

[\/vc_column_text][\/vc_column][vc_column][vc_row_inner css=”.vc_custom_1690450058010{margin-bottom: 0px !important;padding-left: 0px !important;}”][vc_column_inner css=”.vc_custom_1690450157861{margin-bottom: 0px !important;border-bottom-width: 0px !important;padding-left: 0px !important;}”][vc_custom_heading text=”Red Offering” font_container=”tag:h2|font_size:22|text_align:left|color:%23bd0926″ google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal” css=”.vc_custom_1690450134735{padding-left: 0px !important;}”][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=”yes” gap=”1″ css=”.vc_custom_1690449959059{margin-bottom: 40px !important;}”][vc_column_inner width=”1\/3″][mvc_infobox info_style=”mega_info_box_2″ link=”link_btn” title_color=”#bd0926″ btn_url=”url:http%3A%2F%2Fwdev2.shorr-kan.net%2Fclienti%2Fsk-it-int%2Fit%2Fpenetration-test-vulnerability-assessment%2F|title:Scopri%20di%20pi%C3%B9|target:_blank” btn_text=”Scopri di pi\u00f9” btn_clr=”#bd0926″ css=”.vc_custom_1697117718241{padding-right: 10px !important;padding-bottom: 23px !important;padding-left: 15px !important;background-color: #f5f6f6 !important;border-radius: 2px !important;}” title_size=”20″]<\/p>\n

Penetration Test & Vulnerability Assessment<\/h3>\n

Misurazione della Cyber Security Posture dell\u2019azienda e identificazione dei rischi potenziali ai quali \u00e8 esposta.<\/p>\n

[\/mvc_infobox][\/vc_column_inner][vc_column_inner width=”1\/3″][mvc_infobox info_style=”mega_info_box_2″ link=”link_btn” title_color=”#bd0926″ btn_url=”url:http%3A%2F%2Fwdev2.shorr-kan.net%2Fclienti%2Fsk-it-int%2Fit%2Fred-team-purple-team%2F|title:Scopri%20di%20pi%C3%B9|target:_blank” btn_text=”Scopri di pi\u00f9” btn_clr=”#bd0926″ css=”.vc_custom_1697117725774{padding-right: 10px !important;padding-bottom: 23px !important;padding-left: 15px !important;background-color: #f5f6f6 !important;border-radius: 2px !important;}” title_size=”20″]<\/p>\n

Red team & Purple team<\/h3>\n

Testiamo la reale solidit\u00e0 informatica di un\u2019azienda, mediante delle azioni di puro attacco (red) o di integrazione tra attacco e difesa (purple).<\/p>\n

[\/mvc_infobox][\/vc_column_inner][vc_column_inner width=”1\/3″][vc_custom_heading text=”Ogni azienda ha delle specificit\u00e0 legate alla cyber security.<\/p>\n

Il nostro obiettivo \u00e8 aiutare le aziende ad identificare e opportunamente mitigare possibili attacchi e violazioni ai loro sistemi e a produrre miglioramenti tangibili del loro livello di Cyber Security e consapevolezza dei rischi.” font_container=”tag:h4|text_align:left|color:%23303030″ google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:400%20regular%3A400%3Anormal”][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css=”.vc_custom_1690449858261{border-left-width: 0px !important;padding-left: 0px !important;}”][vc_column][vc_custom_heading text=”Blue Offering” font_container=”tag:h2|font_size:22|text_align:left|color:%23003872″ google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_row_inner equal_height=”yes” gap=”1″ css=”.vc_custom_1690982032640{margin-bottom: 40px !important;}”][vc_column_inner width=”1\/3″][mvc_infobox info_style=”mega_info_box_2″ link=”link_btn” title_color=”#bd0926″ btn_url=”url:http%3A%2F%2Fwdev2.shorr-kan.net%2Fclienti%2Fsk-it-int%2Fit%2Fapplication-data-security%2F|title:Application%20%26%20Data%20security|target:_blank” btn_text=”Scopri di pi\u00f9” btn_clr=”#003872″ css=”.vc_custom_1697117735338{padding-right: 10px !important;padding-bottom: 23px !important;padding-left: 15px !important;background-color: #f5f6f6 !important;border-radius: 2px !important;}” title_size=”20″]<\/p>\n

Application & Data security<\/h3>\n

Messa in sicurezza, di applicazioni e dati sensibili delle aziende, mediante processi, strumenti e risorse umane specializzate.<\/p>\n

[\/mvc_infobox][\/vc_column_inner][vc_column_inner width=”1\/3″][mvc_infobox info_style=”mega_info_box_2″ link=”link_btn” title_color=”#bd0926″ btn_url=”url:http%3A%2F%2Fwdev2.shorr-kan.net%2Fclienti%2Fsk-it-int%2Fit%2Finfrastructure-security%2F|title:Scopri%20di%20pi%C3%B9|target:_blank” btn_text=”Scopri di pi\u00f9” btn_clr=”#003872″ css=”.vc_custom_1697117744951{padding-right: 10px !important;padding-bottom: 23px !important;padding-left: 15px !important;background-color: #f5f6f6 !important;border-radius: 2px !important;}” title_size=”20″]<\/p>\n

Infrastructure security<\/h3>\n

Implementazione e ottimizzazione delle misure di sicurezza preventive necessarie a proteggere l\u2019infrastruttura di rete dell\u2019azienda.<\/p>\n

[\/mvc_infobox][\/vc_column_inner][vc_column_inner width=”1\/3″][mvc_infobox info_style=”mega_info_box_2″ link=”link_btn” title_color=”#bd0926″ btn_url=”url:http%3A%2F%2Fwdev2.shorr-kan.net%2Fclienti%2Fsk-it-int%2Fit%2Ftecnologie-per-i-soc%2F|title:Scopri%20di%20pi%C3%B9|target:_blank” btn_text=”Scopri di pi\u00f9” btn_clr=”#003872″ css=”.vc_custom_1697117757722{padding-right: 10px !important;padding-bottom: 23px !important;padding-left: 15px !important;background-color: #f5f6f6 !important;border-radius: 2px !important;}” title_size=”20″]<\/p>\n

Tecnologie per i SOC<\/h3>\n

Implementazione all\u2019interno di SOC delle migliori tecnologie per intercettare attacchi che subisce l\u2019azienda, analizzandone tutti i flussi di dati e i dispositivi aziendali.<\/p>\n

[\/mvc_infobox][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1695299738530{margin-top: 30px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;background-color: #f5f6f6 !important;}”][vc_column css=”.vc_custom_1690810013242{margin-right: 0px !important;margin-left: 0px !important;background-color: #f5f6f6 !important;}”][vc_custom_heading text=”Proteggi la tua azienda, affidati a SKIT.” font_container=”tag:h2|font_size:30|text_align:center|color:%23303030″ google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal” css=”.vc_custom_1690810068017{margin-right: 0px !important;margin-bottom: 30px !important;margin-left: 0px !important;padding-top: 20px !important;background-color: #f5f6f6 !important;}”][vc_column_text]<\/p>\n

Scopri come i nostri servizi possono aiutarti a rinforzare la tua struttura informatica e a porre in sicurezza i dati e la riservatezza della tua azienda<\/span><\/p>\n

[\/vc_column_text][vc_btn title=”Contattaci” color=”juicy-pink” size=”lg” align=”center” link=”url:http%3A%2F%2Fwdev2.shorr-kan.net%2Fclienti%2Fsk-it-int%2Fit%2Fcontatti%2F|title:Contatti|target:_blank” css=”.vc_custom_1695299709073{padding-bottom: 20px !important;}”][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"

[vc_row css=”.vc_custom_1684764963100{margin-top: 20px !important;}”][vc_column][vc_custom_heading text=”Servizi e soluzioni per la Cyber Security” google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text] Il nostro obiettivo \u00e8 aiutare le aziende ad identificare e opportunamente mitigare possibili attacchi e violazioni ai loro sistemi e a produrre miglioramenti tangibili del loro livello di Cyber Security e consapevolezza dei rischi. [\/vc_column_text][\/vc_column][vc_column][vc_row_inner css=”.vc_custom_1690450058010{margin-bottom: 0px !important;padding-left: 0px !important;}”][vc_column_inner css=”.vc_custom_1690450157861{margin-bottom: 0px !important;border-bottom-width: …<\/p>\n

Servizi<\/span> Leggi di pi\u00f9<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"plain-container","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"yoast_head":"\nServizi - SKIT Cyber Security<\/title>\n<meta name=\"description\" content=\"I nostri servizi ricoprono la Cyber Security a 360\u00b0, a partire dai penetration test fino all'implementazione delle tecnologie per i SOC\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Servizi - SKIT Cyber Security\" \/>\n<meta property=\"og:description\" content=\"I nostri servizi ricoprono la Cyber Security a 360\u00b0, a partire dai penetration test fino all'implementazione delle tecnologie per i SOC\" \/>\n<meta property=\"og:url\" content=\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/servizi\/\" \/>\n<meta property=\"og:site_name\" content=\"SKIT Cyber Security\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-12T13:36:13+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/servizi\/\",\"url\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/servizi\/\",\"name\":\"Servizi - SKIT Cyber Security\",\"isPartOf\":{\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/#website\"},\"datePublished\":\"2023-09-12T15:03:32+00:00\",\"dateModified\":\"2023-10-12T13:36:13+00:00\",\"description\":\"I nostri servizi ricoprono la Cyber Security a 360\u00b0, a partire dai penetration test fino all'implementazione delle tecnologie per i SOC\",\"breadcrumb\":{\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/servizi\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/servizi\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/servizi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Servizi\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/#website\",\"url\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/\",\"name\":\"SKIT Cyber Security\",\"description\":\"\",\"publisher\":{\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/#organization\",\"name\":\"SKIT Cyber Security\",\"url\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/wp-content\/uploads\/2023\/05\/Progetto-senza-titolo-9.png\",\"contentUrl\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/wp-content\/uploads\/2023\/05\/Progetto-senza-titolo-9.png\",\"width\":600,\"height\":202,\"caption\":\"SKIT Cyber Security\"},\"image\":{\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Servizi - SKIT Cyber Security","description":"I nostri servizi ricoprono la Cyber Security a 360\u00b0, a partire dai penetration test fino all'implementazione delle tecnologie per i SOC","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"it_IT","og_type":"article","og_title":"Servizi - SKIT Cyber Security","og_description":"I nostri servizi ricoprono la Cyber Security a 360\u00b0, a partire dai penetration test fino all'implementazione delle tecnologie per i SOC","og_url":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/servizi\/","og_site_name":"SKIT Cyber Security","article_modified_time":"2023-10-12T13:36:13+00:00","twitter_card":"summary_large_image","twitter_misc":{"Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/servizi\/","url":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/servizi\/","name":"Servizi - SKIT Cyber Security","isPartOf":{"@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/#website"},"datePublished":"2023-09-12T15:03:32+00:00","dateModified":"2023-10-12T13:36:13+00:00","description":"I nostri servizi ricoprono la Cyber Security a 360\u00b0, a partire dai penetration test fino all'implementazione delle tecnologie per i SOC","breadcrumb":{"@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/servizi\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/servizi\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/servizi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/"},{"@type":"ListItem","position":2,"name":"Servizi"}]},{"@type":"WebSite","@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/#website","url":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/","name":"SKIT Cyber Security","description":"","publisher":{"@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/#organization","name":"SKIT Cyber Security","url":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/#\/schema\/logo\/image\/","url":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/wp-content\/uploads\/2023\/05\/Progetto-senza-titolo-9.png","contentUrl":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/wp-content\/uploads\/2023\/05\/Progetto-senza-titolo-9.png","width":600,"height":202,"caption":"SKIT Cyber Security"},"image":{"@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/#\/schema\/logo\/image\/"}}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Stefano Antonucci","author_link":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/author\/stefano-antonuccishorr-kan-com\/"},"uagb_comment_info":0,"uagb_excerpt":"[vc_row css=”.vc_custom_1684764963100{margin-top: 20px !important;}”][vc_column][vc_custom_heading text=”Servizi e soluzioni per la Cyber Security” google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text] Il nostro obiettivo \u00e8 aiutare le aziende ad identificare e opportunamente mitigare possibili attacchi e violazioni ai loro sistemi e a produrre miglioramenti tangibili del loro livello di Cyber Security e consapevolezza dei rischi. [\/vc_column_text][\/vc_column][vc_column][vc_row_inner css=”.vc_custom_1690450058010{margin-bottom: 0px !important;padding-left: 0px !important;}”][vc_column_inner css=”.vc_custom_1690450157861{margin-bottom: 0px !important;border-bottom-width:…","_links":{"self":[{"href":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/wp-json\/wp\/v2\/pages\/1395"}],"collection":[{"href":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/wp-json\/wp\/v2\/comments?post=1395"}],"version-history":[{"count":4,"href":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/wp-json\/wp\/v2\/pages\/1395\/revisions"}],"predecessor-version":[{"id":1967,"href":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/wp-json\/wp\/v2\/pages\/1395\/revisions\/1967"}],"wp:attachment":[{"href":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/it\/wp-json\/wp\/v2\/media?parent=1395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}