{"id":1658,"date":"2023-09-12T15:03:32","date_gmt":"2023-09-12T15:03:32","guid":{"rendered":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/?page_id=1658"},"modified":"2023-10-12T13:43:15","modified_gmt":"2023-10-12T13:43:15","slug":"services","status":"publish","type":"page","link":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/services\/","title":{"rendered":"Services"},"content":{"rendered":"

[vc_row css=”.vc_custom_1684764963100{margin-top: 20px !important;}”][vc_column][vc_custom_heading text=”Cyber Security services and solutions” google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text]<\/p>\n

\n
\n

Our goal is to help companies identify and appropriately mitigate possible attacks<\/strong> and breaches of their systems, improving their level of Cyber \u200b\u200bSecurity and risk awareness in a tangible way.<\/div>\n<\/div>\n

<\/div>\n

[\/vc_column_text][\/vc_column][vc_column][vc_row_inner css=”.vc_custom_1690450058010{margin-bottom: 0px !important;padding-left: 0px !important;}”][vc_column_inner css=”.vc_custom_1690450157861{margin-bottom: 0px !important;border-bottom-width: 0px !important;padding-left: 0px !important;}”][vc_custom_heading text=”Red Offering” font_container=”tag:h2|font_size:22|text_align:left|color:%23bd0926″ google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal” css=”.vc_custom_1690450134735{padding-left: 0px !important;}”][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=”yes” gap=”1″ css=”.vc_custom_1690449959059{margin-bottom: 40px !important;}”][vc_column_inner width=”1\/3″][mvc_infobox info_style=”mega_info_box_2″ link=”link_btn” title_color=”#bd0926″ btn_url=”url:http%3A%2F%2Fwdev2.shorr-kan.net%2Fclienti%2Fsk-it-int%2Fpenetration-test-vulnerability-assessment%2F|title:Scopri%20di%20pi%C3%B9|target:_blank” btn_text=”Read more” btn_clr=”#bd0926″ css=”.vc_custom_1697117828844{padding-right: 10px !important;padding-bottom: 23px !important;padding-left: 15px !important;background-color: #f5f6f6 !important;border-radius: 2px !important;}” title_size=”20″]<\/p>\n

Penetration Test & Vulnerability Assessment<\/h3>\n

Measuring the company’s Cyber \u200b\u200bSecurity Posture and identifying the potential risks to which it is exposed.[\/mvc_infobox][\/vc_column_inner][vc_column_inner width=”1\/3″][mvc_infobox info_style=”mega_info_box_2″ link=”link_btn” line_height=”0″ title_color=”#bd0926″ btn_url=”url:http%3A%2F%2Fwdev2.shorr-kan.net%2Fclienti%2Fsk-it-int%2Fred-team-purple-team%2F|title:Scopri%20di%20pi%C3%B9|target:_blank” btn_text=”Read more” btn_clr=”#bd0926″ css=”.vc_custom_1697118184813{padding-right: 10px !important;padding-bottom: 23px !important;padding-left: 15px !important;background-color: #f5f6f6 !important;border-radius: 2px !important;}” title_size=”20″]<\/p>\n

Red team & Purple team<\/h3>\n

We test a company\u2019s real IT soundness, running pure attack (the Red team) or attack and defence integration tests (the Purple team).[\/mvc_infobox][\/vc_column_inner][vc_column_inner width=”1\/3″][vc_custom_heading text=”Each company has its own specific cyber security situation.<\/p>\n

Our goal is to help companies identify and appropriately mitigate possible attacks and breaches of their systems, improving their level of Cyber Security and risk awareness in a tangible way.” font_container=”tag:h4|text_align:left|color:%23303030″ google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:400%20regular%3A400%3Anormal”][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css=”.vc_custom_1690449858261{border-left-width: 0px !important;padding-left: 0px !important;}”][vc_column][vc_custom_heading text=”Blue Offering” font_container=”tag:h2|font_size:22|text_align:left|color:%23003872″ google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_row_inner equal_height=”yes” gap=”1″ css=”.vc_custom_1690982032640{margin-bottom: 40px !important;}”][vc_column_inner width=”1\/3″][mvc_infobox info_style=”mega_info_box_2″ link=”link_btn” title_color=”#bd0926″ btn_url=”url:http%3A%2F%2Fwdev2.shorr-kan.net%2Fclienti%2Fsk-it-int%2Fapplication-data-security%2F|title:Application%20%26%20Data%20security|target:_blank” btn_text=”Read more” btn_clr=”#003872″ css=”.vc_custom_1697117972167{padding-right: 15px !important;padding-bottom: 23px !important;padding-left: 15px !important;background-color: #f5f6f6 !important;border-radius: 2px !important;}” title_size=”20″]<\/p>\n

Application & Data security<\/h3>\n

Keeping sensitive company data and applications safe, using effective processes, specialized tools and human resources.[\/mvc_infobox][\/vc_column_inner][vc_column_inner width=”1\/3″][mvc_infobox info_style=”mega_info_box_2″ link=”link_btn” title_color=”#bd0926″ btn_url=”url:http%3A%2F%2Fwdev2.shorr-kan.net%2Fclienti%2Fsk-it-int%2Finfrastructure-security%2F|title:Scopri%20di%20pi%C3%B9|target:_blank” btn_text=”Read more” btn_clr=”#003872″ css=”.vc_custom_1697117858155{padding-right: 10px !important;padding-bottom: 23px !important;padding-left: 15px !important;background-color: #f5f6f6 !important;border-radius: 2px !important;}” title_size=”20″]<\/p>\n

Infrastructure security<\/h3>\n

Implementing the preventive security measures needed to provide maximum protection for the company’s network infrastructure.[\/mvc_infobox][\/vc_column_inner][vc_column_inner width=”1\/3″][mvc_infobox info_style=”mega_info_box_2″ link=”link_btn” title_color=”#bd0926″ btn_url=”url:http%3A%2F%2Fwdev2.shorr-kan.net%2Fclienti%2Fsk-it-int%2Fsoc-technologies%2F|title:Read%20more|target:_blank” btn_text=”Read more” btn_clr=”#003872″ css=”.vc_custom_1697117867615{padding-right: 10px !important;padding-bottom: 23px !important;padding-left: 15px !important;background-color: #f5f6f6 !important;border-radius: 2px !important;}” title_size=”20″]<\/p>\n

SOC Technologies<\/h3>\n

Implementation of the most effective technologies so the SOC can intercept attacks against the company, analysing all the data flows and company devices.[\/mvc_infobox][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=”stretch_row” css=”.vc_custom_1690888651988{margin-top: 30px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 0px !important;background-color: #f5f6f6 !important;}”][vc_column css=”.vc_custom_1690810013242{margin-right: 0px !important;margin-left: 0px !important;background-color: #f5f6f6 !important;}”][vc_custom_heading text=”Protect your company with SKIT.” font_container=”tag:h2|font_size:30|text_align:center|color:%23303030″ google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal” css=”.vc_custom_1694523986746{margin-right: 0px !important;margin-bottom: 30px !important;margin-left: 0px !important;padding-top: 20px !important;background-color: #f5f6f6 !important;}”][vc_column_text]<\/p>\n

Find out how our services can help you make your IT structure stronger and your company’s data and confidentiality secure.<\/span><\/p>\n

[\/vc_column_text][vc_btn title=”Contact us” color=”juicy-pink” size=”lg” align=”center” link=”url:http%3A%2F%2Fwdev2.shorr-kan.net%2Fclienti%2Fsk-it-int%2Fen%2Fcontact%2F|title:Contact|target:_blank” css=”.vc_custom_1694528512461{padding-bottom: 20px !important;}”][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"

[vc_row css=”.vc_custom_1684764963100{margin-top: 20px !important;}”][vc_column][vc_custom_heading text=”Cyber Security services and solutions” google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text] Our goal is to help companies identify and appropriately mitigate possible attacks and breaches of their systems, improving their level of Cyber \u200b\u200bSecurity and risk awareness in a tangible way. [\/vc_column_text][\/vc_column][vc_column][vc_row_inner css=”.vc_custom_1690450058010{margin-bottom: 0px !important;padding-left: 0px !important;}”][vc_column_inner css=”.vc_custom_1690450157861{margin-bottom: 0px !important;border-bottom-width: 0px !important;padding-left: 0px !important;}”][vc_custom_heading text=”Red Offering” …<\/p>\n

Services<\/span> Leggi di pi\u00f9<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"plain-container","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"yoast_head":"\nServices - SKIT Cyber Security<\/title>\n<meta name=\"description\" content=\"I nostri servizi ricoprono la Cyber Security a 360\u00b0, a partire dai penetration test fino all'implementazione delle tecnologie per i SOC\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Services - SKIT Cyber Security\" \/>\n<meta property=\"og:description\" content=\"I nostri servizi ricoprono la Cyber Security a 360\u00b0, a partire dai penetration test fino all'implementazione delle tecnologie per i SOC\" \/>\n<meta property=\"og:url\" content=\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/services\/\" \/>\n<meta property=\"og:site_name\" content=\"SKIT Cyber Security\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-12T13:43:15+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/services\/\",\"url\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/services\/\",\"name\":\"Services - SKIT Cyber Security\",\"isPartOf\":{\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/#website\"},\"datePublished\":\"2023-09-12T15:03:32+00:00\",\"dateModified\":\"2023-10-12T13:43:15+00:00\",\"description\":\"I nostri servizi ricoprono la Cyber Security a 360\u00b0, a partire dai penetration test fino all'implementazione delle tecnologie per i SOC\",\"breadcrumb\":{\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/services\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/#website\",\"url\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/\",\"name\":\"SKIT Cyber Security\",\"description\":\"\",\"publisher\":{\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/#organization\",\"name\":\"SKIT Cyber Security\",\"url\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/wp-content\/uploads\/2023\/05\/Progetto-senza-titolo-9.png\",\"contentUrl\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/wp-content\/uploads\/2023\/05\/Progetto-senza-titolo-9.png\",\"width\":600,\"height\":202,\"caption\":\"SKIT Cyber Security\"},\"image\":{\"@id\":\"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Services - SKIT Cyber Security","description":"I nostri servizi ricoprono la Cyber Security a 360\u00b0, a partire dai penetration test fino all'implementazione delle tecnologie per i SOC","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Services - SKIT Cyber Security","og_description":"I nostri servizi ricoprono la Cyber Security a 360\u00b0, a partire dai penetration test fino all'implementazione delle tecnologie per i SOC","og_url":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/services\/","og_site_name":"SKIT Cyber Security","article_modified_time":"2023-10-12T13:43:15+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/services\/","url":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/services\/","name":"Services - SKIT Cyber Security","isPartOf":{"@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/#website"},"datePublished":"2023-09-12T15:03:32+00:00","dateModified":"2023-10-12T13:43:15+00:00","description":"I nostri servizi ricoprono la Cyber Security a 360\u00b0, a partire dai penetration test fino all'implementazione delle tecnologie per i SOC","breadcrumb":{"@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/services\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/"},{"@type":"ListItem","position":2,"name":"Services"}]},{"@type":"WebSite","@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/#website","url":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/","name":"SKIT Cyber Security","description":"","publisher":{"@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/#organization","name":"SKIT Cyber Security","url":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/#\/schema\/logo\/image\/","url":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/wp-content\/uploads\/2023\/05\/Progetto-senza-titolo-9.png","contentUrl":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/wp-content\/uploads\/2023\/05\/Progetto-senza-titolo-9.png","width":600,"height":202,"caption":"SKIT Cyber Security"},"image":{"@id":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/#\/schema\/logo\/image\/"}}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Stefano Antonucci","author_link":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/author\/stefano-antonuccishorr-kan-com\/"},"uagb_comment_info":0,"uagb_excerpt":"[vc_row css=”.vc_custom_1684764963100{margin-top: 20px !important;}”][vc_column][vc_custom_heading text=”Cyber Security services and solutions” google_fonts=”font_family:Open%20Sans%3A300%2C300italic%2Cregular%2Citalic%2C600%2C600italic%2C700%2C700italic%2C800%2C800italic|font_style:700%20bold%20regular%3A700%3Anormal”][vc_column_text] Our goal is to help companies identify and appropriately mitigate possible attacks and breaches of their systems, improving their level of Cyber \u200b\u200bSecurity and risk awareness in a tangible way. [\/vc_column_text][\/vc_column][vc_column][vc_row_inner css=”.vc_custom_1690450058010{margin-bottom: 0px !important;padding-left: 0px !important;}”][vc_column_inner css=”.vc_custom_1690450157861{margin-bottom: 0px !important;border-bottom-width: 0px !important;padding-left: 0px !important;}”][vc_custom_heading text=”Red Offering”…","_links":{"self":[{"href":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/wp-json\/wp\/v2\/pages\/1658"}],"collection":[{"href":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/wp-json\/wp\/v2\/comments?post=1658"}],"version-history":[{"count":3,"href":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/wp-json\/wp\/v2\/pages\/1658\/revisions"}],"predecessor-version":[{"id":1968,"href":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/wp-json\/wp\/v2\/pages\/1658\/revisions\/1968"}],"wp:attachment":[{"href":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/wp-json\/wp\/v2\/media?parent=1658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}