{"id":16043,"date":"2023-03-16T11:41:25","date_gmt":"2023-03-16T10:41:25","guid":{"rendered":"https:\/\/www.whysecurity.it\/mid-and-big-companies\/"},"modified":"2023-03-22T17:39:52","modified_gmt":"2023-03-22T16:39:52","slug":"mid-and-big-companies","status":"publish","type":"page","link":"https:\/\/www.whysecurity.it\/en\/mid-and-big-companies\/","title":{"rendered":"Mid &#038; Big Companies"},"content":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column gradient_colors=&#8221;%5B%7B%7D%5D&#8221; offset=&#8221;vc_hidden-xs&#8221;][vc_custom_heading text=&#8221;Mid and big companies services&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center&#8221; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInLeft&#8221; css=&#8221;.vc_custom_1679503184587{margin-bottom: 30px !important;}&#8221;]<\/p>\n<p align=\"center\">For big companies we offer <strong>specific services<\/strong> at a <strong>fixed recurring fee<\/strong>, or also as a &#8220;<strong>Global OutSourcing<\/strong>&#8221; service.<\/p>\n<p>[\/vc_column_text][business_tabs tab_id=&#8221;1528961806088-8&#8243;][business_tab title=&#8221;Helpdesk&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_desktop&#8221; tab_id=&#8221;96bdc8db-01dd-7&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"text-align: left; font-size: 20px;\">Helpdesk management with fixed SLAs<\/h3>\n<p>We provide <strong>first and second level assistance<\/strong>, both in Italian and in English in favor of our customers for all problems that require an engagement of the Information Technology department.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Large PC fleets&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_laptop&#8221; tab_id=&#8221;152f60bf-9714-6&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"text-align: left; font-size: 20px;\">Large PC fleets management<\/h3>\n<p>Each PC will be equipped with a remote <strong>management system<\/strong>, working wherever the PC is in the world as long as it is connected to an internet network.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Network infrastructures&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;social_rss&#8221; tab_id=&#8221;011496b1-15c0-10&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"text-align: left; font-size: 20px;\">Network infrastructure management<\/h3>\n<p>The service provides for the management of all network tools such as switches, routers, wireless antennas, radio links and anything else that can be included so that the <strong>constant functioning of the computer network is guaranteed<\/strong>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Cyber Security&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_shield&#8221; tab_id=&#8221;7444da1d-2a10-7&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"text-align: left; font-size: 20px;\">Cyber Security management<\/h3>\n<p>All first-line and second-line firewalls (where present), AntiSpam and Antiphishing systems, sandboxes, Forward proxies and Reverse Proxies, customers&#8217; Web Application Firewalls, AntiMalware systems evolved according to <strong>agreed security and business continuity objectives<\/strong> are managed.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Information Security&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_archive&#8221; tab_id=&#8221;f1a4b465-91e5-5&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"text-align: left; font-size: 20px;\">Enterprise Critical Information Security Management<\/h3>\n<p>It is <strong>the most critical service according to the company management<\/strong> and by the Board of Directors: the <strong>management of sensitive documents<\/strong>, that for no reason can be lost, or accessed by those who do not have title, for such as the tracking of access and changes and absolute security so that not even system administrators can intervene.<br \/>\nThe management of sensitive information, the processes that govern it and the advice needed to structure the platform to meet these objectives is an integral part of the service.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Server Infrastructures&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_drive&#8221; tab_id=&#8221;e118f360-1325-7&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"text-align: left; font-size: 20px;\">Server Infrastructure Management<\/h3>\n<p>Management of VMware and Microsoft <strong>virtualization infrastructure<\/strong>, Microsoft and Linux servers that application platforms are based on.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;VOIP Infrastructures&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_headphones&#8221; tab_id=&#8221;a0fc6c13-f2ba-10&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"text-align: left; font-size: 20px;\">IP Telephone Infrastructure Management<\/h3>\n<p>Network Telephony infrastructure management, with the planning of numbering plans, response groups and all forwarding policies expression of an organizational model. Management of <strong>geographic SIP trunks<\/strong> and management of integrations on geographically distant plants.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;NOC&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_search-2&#8243; tab_id=&#8221;68229915-60c3-5&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"text-align: left; font-size: 20px;\">NOC or Network Operation Center services both 8\u00d75 and 24 hours a day<\/h3>\n<p>The <strong>Network Operation Center<\/strong> service provides the following services in bulk:<\/p>\n<ul>\n<li>Management and monitoring of all PCs, whether fixed, portable and workstations installed in production environments<\/li>\n<li>Fault and reporting management<\/li>\n<li>Managing E-mail Services<\/li>\n<li>Managing local and remote backups<\/li>\n<li>Operating System Patch Management<\/li>\n<li>System and network performance management and monitoring<\/li>\n<li>Provides recommendations for the use of computer systems<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;SOC&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_error-triangle_alt&#8221; tab_id=&#8221;c5d31091-9346-10&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"font-size: 20px;\">SOC or Security Operation Center services both 8\u00d75 and 24 hours a day<\/h3>\n<p>The Security Operation Center service provides the following services<\/p>\n<ul>\n<li>Management of all alarms from the security sector<\/li>\n<li>Management of all alarms with security implications coming from the NOC service<\/li>\n<li>Investigation of all relevant events by means of the Second Level or &#8220;Tier 2&#8221; team<\/li>\n<li>Threat Detection and Incident Response<\/li>\n<li>Immediate notice from customer managers<\/li>\n<li>Initiation of all actions to mitigate the dangers to the integrity and security of IT systems and the information contained therein<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][\/business_tabs][\/vc_column][\/vc_row][vc_row gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column gradient_colors=&#8221;%5B%7B%7D%5D&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221; css=&#8221;.vc_custom_1630484463919{margin-bottom: 10px !important;}&#8221;][vc_custom_heading text=&#8221;Mid and big companies services&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center&#8221; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInLeft&#8221; css=&#8221;.vc_custom_1630481765629{margin-bottom: 30px !important;}&#8221;]<br \/>\nFor big companies we offer <strong>specific services<\/strong> at a <strong>fixed recurring fee<\/strong>, or also as a &#8220;<strong>Global OutSourcing<\/strong>&#8221; service.<br \/>\n[\/vc_column_text][business_accordion tab_id=&#8221;1522427058260-58183-0cee7c7b-afdd&#8221;][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_desktop&#8221; tab_id=&#8221;727d3162-cc7c-108183-0cee7c7b-afdd&#8221; title=&#8221;Helpdesk&#8221;]Forniamo\u00a0<strong>assistenza di primo e secondo livello<\/strong>, sia in lingua italiana che in lingua inglese a favore dei nostri clienti per tutte le problematiche che richiedono un ingaggio del dipartimento Information Technology.[\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_laptop&#8221; tab_id=&#8221;829ad513-5a60-47c7b-afdd&#8221; title=&#8221;Parchi PC estesi&#8221;]Ogni PC sar\u00e0 dotato di un\u00a0<strong>sistema di gestione remota<\/strong>, funzionante ovunque il PC sia al mondo purch\u00e9 sia collegato ad una rete internet.[\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;social_rss&#8221; tab_id=&#8221;da226428-9e91-88183-0cee7c7b-afdd&#8221; title=&#8221;Infrastrutture rete&#8221;]Il servizio prevede la gestione di tutti gli strumenti di rete come switch, router, antenne wireless, ponti radio e quant\u2019altro possa essere incluso affinch\u00e9 sia\u00a0<strong>garantito il costante funzionamento della rete informatica<\/strong>.[\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_shield&#8221; tab_id=&#8221;35728110-9647-18183-0cee7c7b-afdd&#8221; title=&#8221;Sicurezza informatica&#8221;]La sicurezza di rete oggi \u00e8 richiede un approccio completamente diverso dal passato. Il nostro approccio prevede di\u00a0<strong>mappare con cura<\/strong>\u00a0quali risorse devono essere disponibili a chi o a cosa. La compartimentazione della rete e l\u2019accesso alle sole risorse necessarie sia da utenti locali, utenti in smart working e terze parti \u00e8 la\u00a0<strong>prima regola fondamentale<\/strong>\u00a0avviare un valido processo di mitigazione dei rischi.[\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_archive&#8221; tab_id=&#8221;3ef301a7-a6b5-58183-0cee7c7b-afdd&#8221; title=&#8221;Sicurezza informazioni&#8221;]E\u2019\u00a0<strong>il servizio considerato pi\u00f9 critico da parte del management aziendale<\/strong>\u00a0e dal Board of Directors: la\u00a0<strong>gestione dei documenti sensibili<\/strong>\u00a0che per nessuna ragione possono essere persi, o acceduti a chi non ha titolo, peri quali la tracciabilit\u00e0 di accesso e modifiche e l\u2019assoluta sicurezza tanto che neanche gli amministratori di sistema possono intervenire.<br \/>\nLa gestione delle informazioni sensibili, i processi che le governano e la consulenza che occorre per strutturare la piattaforma per soddisfare tali obiettivi \u00e8 parte integrante del servizio.[\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_drive&#8221; tab_id=&#8221;3d843fd2-740e-07c7b-afdd&#8221; title=&#8221;Infrastrutture server&#8221;]Gestione delle\u00a0<strong>infrastrutture di virtualizzazione<\/strong>\u00a0Vmware e Microsoft, server Microsoft e Linux che sono alla base delle piattaforme applicative.[\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_headphones&#8221; tab_id=&#8221;558e1cd4-0433-57c7b-afdd&#8221; title=&#8221;Infrastrutture IP&#8221;]Gestione di infrastrutture di Telefonia di Rete, con la pianificazione dei piani di numerazione, gruppi di risposta e tutte le politiche di inoltro espressione di un modello organizzativo. Gestione dei\u00a0<strong>Trunk SIP geografici<\/strong>\u00a0e gestione delle integrazioni su impianti geograficamente distanti.[\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_search-2&#8243; tab_id=&#8221;95dbb6ad-452b-87c7b-afdd&#8221; title=&#8221;NOC&#8221;]Il servizio di\u00a0<strong>Network Operation Center<\/strong>\u00a0prevede l\u2019erogazione dei seguenti servizi in blocco:<\/p>\n<ul>\n<li>Gestione ed monitoraggio di tutti i pc, siano essi fissi, portatili e postazioni installati in ambienti produttivi<\/li>\n<li>Gestione dei guasti e delle segnalazioni<\/li>\n<li>Gestione dei servizi di posta elettronica<\/li>\n<li>Gestione dei backup locali e remoti<\/li>\n<li>Gestione delle Patch dei sistemi operativi<\/li>\n<li>Gestione e monitoraggio della performance dei sistemi e della rete<\/li>\n<li>Fornisce raccomandazioni di utilizzo dei sistemi informatici<\/li>\n<\/ul>\n<p>[\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_error-triangle_alt&#8221; tab_id=&#8221;b46236b0-3840-37c7b-afdd&#8221; title=&#8221;SOC&#8221;]I servizi SOC constano delle seguenti attivit\u00e0:<\/p>\n<ul>\n<li>Gestione di tutti gli allarmi provenienti dal comparto sicurezza<\/li>\n<li>Gestione dei tutti gli allarmi con risvolti sulla sicurezza provenienti dal servizio NOC<\/li>\n<li>Investigazioni di tutti gli eventi rilevanti per mezzo del team di Secondo Livello o \u201cTier 2\u201d<\/li>\n<li>Rilevazione delle Minacce e Risposta agli incidenti<\/li>\n<li>Avviso immediato dei responsabili dei clienti<\/li>\n<li>Avvio di tutte le azioni di mitigazione dei pericoli all\u2019integrit\u00e0 e alla sicurezza dei sistemi informatici e alle informazioni in esse contenute<\/li>\n<\/ul>\n<p>[\/business_accordion_tab][\/business_accordion][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column gradient_colors=&#8221;%5B%7B%7D%5D&#8221; offset=&#8221;vc_hidden-xs&#8221;][vc_custom_heading text=&#8221;Mid and big companies services&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center&#8221; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInLeft&#8221; css=&#8221;.vc_custom_1679503184587{margin-bottom: 30px !important;}&#8221;] For big companies we offer specific services at a fixed recurring fee, or also as a &#8220;Global OutSourcing&#8221; service. [\/vc_column_text][business_tabs tab_id=&#8221;1528961806088-8&#8243;][business_tab title=&#8221;Helpdesk&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_desktop&#8221; tab_id=&#8221;96bdc8db-01dd-7&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;] Helpdesk management with fixed SLAs We provide first and second level [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":15958,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mid &#038; Big Companies - Why Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.whysecurity.it\/en\/mid-and-big-companies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mid &#038; Big Companies - Why Security\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row_content&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column gradient_colors=&#8221;%5B%7B%7D%5D&#8221; offset=&#8221;vc_hidden-xs&#8221;][vc_custom_heading text=&#8221;Mid and big companies services&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center&#8221; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInLeft&#8221; css=&#8221;.vc_custom_1679503184587{margin-bottom: 30px !important;}&#8221;] For big companies we offer specific services at a fixed recurring fee, or also as a &#8220;Global OutSourcing&#8221; service. [\/vc_column_text][business_tabs tab_id=&#8221;1528961806088-8&#8243;][business_tab title=&#8221;Helpdesk&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_desktop&#8221; tab_id=&#8221;96bdc8db-01dd-7&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;] Helpdesk management with fixed SLAs We provide first and second level [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.whysecurity.it\/en\/mid-and-big-companies\/\" \/>\n<meta property=\"og:site_name\" content=\"Why Security\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-22T16:39:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.whysecurity.it\/wp-content\/uploads\/2021\/09\/iStock-1166272744-e1630580359932-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1264\" \/>\n\t<meta property=\"og:image:height\" content=\"368\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.whysecurity.it\/en\/mid-and-big-companies\/\",\"url\":\"https:\/\/www.whysecurity.it\/en\/mid-and-big-companies\/\",\"name\":\"Mid &#038; Big Companies - Why Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.whysecurity.it\/it\/#website\"},\"datePublished\":\"2023-03-16T10:41:25+00:00\",\"dateModified\":\"2023-03-22T16:39:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.whysecurity.it\/en\/mid-and-big-companies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.whysecurity.it\/en\/mid-and-big-companies\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.whysecurity.it\/en\/mid-and-big-companies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.whysecurity.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mid &#038; Big Companies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.whysecurity.it\/it\/#website\",\"url\":\"https:\/\/www.whysecurity.it\/it\/\",\"name\":\"Why Security\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.whysecurity.it\/it\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mid &#038; Big Companies - Why Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.whysecurity.it\/en\/mid-and-big-companies\/","og_locale":"en_US","og_type":"article","og_title":"Mid &#038; Big Companies - Why Security","og_description":"[vc_row full_width=&#8221;stretch_row_content&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column gradient_colors=&#8221;%5B%7B%7D%5D&#8221; offset=&#8221;vc_hidden-xs&#8221;][vc_custom_heading text=&#8221;Mid and big companies services&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center&#8221; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInLeft&#8221; css=&#8221;.vc_custom_1679503184587{margin-bottom: 30px !important;}&#8221;] For big companies we offer specific services at a fixed recurring fee, or also as a &#8220;Global OutSourcing&#8221; service. [\/vc_column_text][business_tabs tab_id=&#8221;1528961806088-8&#8243;][business_tab title=&#8221;Helpdesk&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_desktop&#8221; tab_id=&#8221;96bdc8db-01dd-7&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;] Helpdesk management with fixed SLAs We provide first and second level [&hellip;]","og_url":"https:\/\/www.whysecurity.it\/en\/mid-and-big-companies\/","og_site_name":"Why Security","article_modified_time":"2023-03-22T16:39:52+00:00","og_image":[{"width":1264,"height":368,"url":"https:\/\/www.whysecurity.it\/wp-content\/uploads\/2021\/09\/iStock-1166272744-e1630580359932-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.whysecurity.it\/en\/mid-and-big-companies\/","url":"https:\/\/www.whysecurity.it\/en\/mid-and-big-companies\/","name":"Mid &#038; Big Companies - Why Security","isPartOf":{"@id":"https:\/\/www.whysecurity.it\/it\/#website"},"datePublished":"2023-03-16T10:41:25+00:00","dateModified":"2023-03-22T16:39:52+00:00","breadcrumb":{"@id":"https:\/\/www.whysecurity.it\/en\/mid-and-big-companies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.whysecurity.it\/en\/mid-and-big-companies\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.whysecurity.it\/en\/mid-and-big-companies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.whysecurity.it\/en\/"},{"@type":"ListItem","position":2,"name":"Mid &#038; Big Companies"}]},{"@type":"WebSite","@id":"https:\/\/www.whysecurity.it\/it\/#website","url":"https:\/\/www.whysecurity.it\/it\/","name":"Why Security","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.whysecurity.it\/it\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16043"}],"collection":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/comments?post=16043"}],"version-history":[{"count":5,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16043\/revisions"}],"predecessor-version":[{"id":16152,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16043\/revisions\/16152"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/media\/15958"}],"wp:attachment":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/media?parent=16043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}