{"id":1643,"date":"2023-09-12T14:23:40","date_gmt":"2023-09-12T14:23:40","guid":{"rendered":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/?page_id=1643"},"modified":"2023-09-21T13:06:08","modified_gmt":"2023-09-21T13:06:08","slug":"application-data-security","status":"publish","type":"page","link":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/application-data-security\/","title":{"rendered":"Application & Data security"},"content":{"rendered":"

[vc_row css=”.vc_custom_1694528893244{margin-bottom: 35px !important;}”][vc_column]\n\t\t\t

<\/p>\n\t\t\t\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\"Scacchi\nGRAYBOX SECURITY \n\t\t\t\t\t\t\t<\/rs-layer>Application & Data Security \n\t\t\t\t\t\t\t<\/h2>DATA ENCRYPTION \n\t\t\t\t\t\t\t<\/rs-layer>Keeping sensitive company data and applications safe, using effective processes, specialized tools and human resources. \n\n \n\t\t\t\t\t\t\t<\/rs-layer>BLACKBOX SECURITY \n\t\t\t\t\t\t\t<\/rs-layer> \n\t\t\t\t\t\t\t<\/rs-layer>\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t<\/rs-module>\n\t\t\t\t