{"id":16046,"date":"2023-03-16T11:56:54","date_gmt":"2023-03-16T10:56:54","guid":{"rendered":"https:\/\/www.whysecurity.it\/falcon-services\/"},"modified":"2023-03-22T17:22:20","modified_gmt":"2023-03-22T16:22:20","slug":"falcon-services","status":"publish","type":"page","link":"https:\/\/www.whysecurity.it\/en\/falcon-services\/","title":{"rendered":"Falcon Services"},"content":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;The tailor-made service for Italian Micro and Small Enterprises&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]The services for <strong>Micro and Small Enterprises<\/strong> have been studied, packaged and made accessible even by those companies that do not have budget availability such as medium-large companies, but have well understood the importance of cyber security, the legal requirements of their directors and want to equip themselves with <strong>everything necessary to protect their economic capacity<\/strong>.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css_animation=&#8221;none&#8221; bgimage=&#8221;12054&#8243; bgstyle=&#8221;jarallax&#8221; ptextcolor=&#8221;White&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1585664322371{margin-left: -15px !important;padding-top: 60px !important;padding-bottom: 80px !important;background-color: #231e1f !important;}&#8221; el_class=&#8221;bianco&#8221;][vc_column][vc_custom_heading text=&#8221;Features&#8221; font_container=&#8221;tag:h2|font_size:44|text_align:center&#8221; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; el_class=&#8221;equal-height-content&#8221; css=&#8221;.vc_custom_1539260614930{background-color: #231e1f !important;}&#8221;][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css_animation=&#8221;fadeInLeft&#8221; css=&#8221;.vc_custom_1629808442254{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;}&#8221;]<\/p>\n<div data-font-name=\"g_font_1\" data-angle=\"0\" data-canvas-width=\"371.25035629453674\">The IT Security services dedicated to Micro and Small Enterprises have the<\/div>\n<div data-font-name=\"g_font_1\" data-angle=\"0\" data-canvas-width=\"177.66769596199526\">following key features:<\/div>\n<ol>\n<li style=\"margin-bottom: 15px; margin-top: 15px;\" data-font-name=\"g_font_1\" data-angle=\"0\" data-canvas-width=\"9.476722090261283\"><strong>They use the same technologies that are used for large enterprises<\/strong>, and the levels of security offered are the same<\/li>\n<li style=\"margin-bottom: 15px;\" data-font-name=\"g_font_1\" data-angle=\"0\" data-canvas-width=\"9.476722090261283\">They are entirely managed by our teams, so the customer benefits from the service with the <strong>highest levels of security available<\/strong>, without being able to manage the technology included in the services in any way<\/li>\n<li style=\"margin-bottom: 15px;\" data-font-name=\"g_font_1\" data-angle=\"0\" data-canvas-width=\"9.476722090261283\">They are canon as a complete service <strong>is provided without the sale of any product<\/strong>. This gives the indispensable advantage of having completely delegated to specialists in the sector the part of computer security of what is most valuable there is.<\/li>\n<li style=\"margin-bottom: 15px;\" data-font-name=\"g_font_1\" data-angle=\"0\" data-canvas-width=\"9.476722090261283\">Falcon services have a <strong>dedicated service with Sales Specialist<\/strong> and a group of experts dedicated exclusively to this service.sono servizi a canone<\/li>\n<\/ol>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;industriaUno&#8221; width=&#8221;1\/6&#8243; offset=&#8221;vc_hidden-xs&#8221;][vc_single_image image=&#8221;12183&#8243; alignment=&#8221;right&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column gradient_colors=&#8221;%5B%7B%7D%5D&#8221; offset=&#8221;vc_hidden-xs&#8221;][vc_custom_heading text=&#8221;How to provide the service&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center&#8221; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][business_tabs tab_id=&#8221;1528961806088-8&#8243;][business_tab title=&#8221;Falcon Email&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_mail_alt&#8221; tab_id=&#8221;011496b1-15c0-10&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"text-align: left; font-size: 20px;\">Falcon Email<\/h3>\n<p>The email security through the massive use of <strong>artificial intelligence<\/strong> and the combination of the best technologies available on the international scene, combined with the implementation techniques of our special <strong>SOC Service<\/strong> for large companies.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Falcon Email + Microsoft 365 BB&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_mail&#8221; tab_id=&#8221;7444da1d-2a10-7&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"text-align: left; font-size: 20px;\">Falcon Email + Microsoft 365 Business Basic<\/h3>\n<p>The service includes the <strong>Falcon Email service plus the Microsoft 365 Business Basic package<\/strong>, so you can enjoy centralized management of Microsoft&#8217;s Cloud-based email services but protected by the Falcon Email service. It represents an excellent combination to make the customer&#8217;s life very simple and safe in the management of the most critical and business-sensitive service ever: email.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Falcon Wall&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_shield_alt&#8221; tab_id=&#8221;f1a4b465-91e5-5&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"text-align: left; font-size: 20px;\">Falcon Wall<\/h3>\n<p>Network security for a micro and small business is the <strong>main point of defense<\/strong> of the network. The service also includes the ability to manage secure Wifi access for all users, complete with <strong>compartmentalization of networks<\/strong> between operators and guests.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Falcon Endpoint&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_desktop&#8221; tab_id=&#8221;e118f360-1325-7&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"text-align: left; font-size: 20px;\">Falcon Endpoint<\/h3>\n<p>The security of PCs and Servers managed and protected from the terrible malware that are in circulation, making massive use of <strong>artificial intelligence<\/strong> and blocking everything that is not known and for which you have the absolute certainty of being good (or Goodware).[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Falcon Secrets&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_lock_alt&#8221; tab_id=&#8221;a0fc6c13-f2ba-10&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"text-align: left; font-size: 20px;\">Falcon Secrets<\/h3>\n<p>The management of documentation and customer files for which you want to guarantee absolute confidentiality and security. <strong>Every access to the files is tracked<\/strong> and not even the customer&#8217;s system administrators can access the protected files in any way. <strong>All files are protected with military encryption<\/strong>, allowing even particularly sensitive files with strategic management contents to be kept on centralized systems, thus relying on the <strong>highest IT security standards<\/strong>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Falcon Backup&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_archive_alt&#8221; tab_id=&#8221;68229915-60c3-5&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"text-align: left; font-size: 20px;\">Falcon Backup<\/h3>\n<p>Backup management is the <strong>last stronghold<\/strong> for a company&#8217;s survival in the event of a disaster. This service provides the management of all the software and hardware necessary for a company to have consistent and managed backups, both with a local copy and with an off-site copy, as required by the standard. We also manage <strong>immutable backups<\/strong> for a set period.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Falcon Nest&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_shield&#8221; tab_id=&#8221;c5d31091-9346-10&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"font-size: 20px;\">Falcon Nest<\/h3>\n<p>It is an offer that <strong>includes all the other modules<\/strong>. It represents the ultimate in cybersecurity for a small business.<\/p>\n<p>A customer who subscribes Falcon Nest service for their company will need to provide the number of computers, the total number of business emails and people who are part of the organization in order to have <strong>the complete package of the Falcon Services offer<\/strong>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][\/business_tabs][\/vc_column][\/vc_row][vc_row gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column gradient_colors=&#8221;%5B%7B%7D%5D&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221; css=&#8221;.vc_custom_1630484829294{margin-bottom: 10px !important;}&#8221;][vc_custom_heading text=&#8221;How to provide the service&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center&#8221; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221; css=&#8221;.vc_custom_1630484862130{margin-top: 30px !important;}&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][business_accordion tab_id=&#8221;1522427058260-58183-0ceef19c-e223&#8243;][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_mail_alt&#8221; tab_id=&#8221;727d3162-cc7c-108183-0ceef19c-e223&#8243; title=&#8221;Falcon email&#8221;]La sicurezza della Posta Elettronica mediante il massiccio uso di\u00a0<strong>intelligenza artificiale<\/strong>\u00a0e la combinazione delle migliori tecnologie disponibili sul panorama internazionale, unite alle tecniche di implementazione dei nostri speciali del\u00a0<strong>Servizio SOC<\/strong>\u00a0destinato alle grandi imprese.[\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_mail&#8221; tab_id=&#8221;829ad513-5a60-4f19c-e223&#8243; title=&#8221;Falcon email + Microsoft 365 BB&#8221;]Il servizio include il servizio\u00a0<strong>Falcon Email pi\u00f9 il pacchetto di Microsoft 365 Business Basic<\/strong>, per poter godere della gestione centralizzata anche dei servizi di posta elettronica basati sul Cloud di Microsoft ma protetti dal servizio Falcon Email. Rappresenta un ottimo connubio per rendere la vita del cliente molto semplice e sicura nella gestione del servizio pi\u00f9 critico e sensibile al business in assoluto: l\u2019email.[\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_shield_alt&#8221; tab_id=&#8221;da226428-9e91-88183-0ceef19c-e223&#8243; title=&#8221;Penetration Test&#8221;]La sicurezza della rete per una micro e piccola azienda \u00e8 il\u00a0<strong>principale punto di difesa<\/strong>\u00a0della rete. Il servizio include anche la possibilit\u00e0 gestire l\u2019accesso Wifi sicuro per tutti gli utenti, con tanto di\u00a0<strong>compartimentazione delle reti<\/strong>\u00a0tra operatori e ospiti[\/business_accordion_tab][business_accordion_tab type=&#8221;pixsimple&#8221; icon_pixsimple=&#8221;icon-screen-desktop&#8221; tab_id=&#8221;35728110-9647-18183-0ceef19c-e223&#8243; title=&#8221;Falcon Endpoint&#8221;]La sicurezza dei PC e dei Server gestiti e protetti dai malware terribili che ci sono in circolazione, facendo uso massiccio di\u00a0<strong>intelligenza artificiale<\/strong>\u00a0e bloccando tutto ci\u00f2 che non \u00e8 conosciuto e per il quale si abbia l\u2019assoluta certezza di essere buono (o Goodware).[\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_lock_alt&#8221; tab_id=&#8221;3ef301a7-a6b5-58183-0ceef19c-e223&#8243; title=&#8221;Falcon Secrets&#8221;]La gestione della documentazione e dei file del cliente per i quali si voglia garantire l\u2019assoluta riservatezza e sicurezza.\u00a0<strong>Ogni accesso ai file viene tracciato<\/strong>\u00a0e neanche gli amministratori di sistema del cliente possono accedere ai file protetti in alcun modo.\u00a0<strong>Tutti i file sono protetti con cifratura militare<\/strong>, permettendo di poter tenere conservati sui sistemi centralizzati anche i file particolarmente sensibili con anche contenuti strategici del management, facendo cosi affidamento ai\u00a0<strong>pi\u00f9 elevati standard di sicurezza informatica.<\/strong>[\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_archive_alt&#8221; tab_id=&#8221;3d843fd2-740e-0f19c-e223&#8243; title=&#8221;Falcon Backup&#8221;]La gestione dei backup \u00e8 l\u2019<strong>ultimo baluardo<\/strong>\u00a0per la sopravvivenza di un\u2019azienda in caso di disastro. Questo servizio prevede la gestione a servizio di tutto il software e hardware necessario affinch\u00e9 un\u2019azienda abbia i backup consistenti e gestiti, sia con una copia locale, che con una copia fuori sede, come previsto dalla norma. Gestiamo anche i\u00a0<strong>backup immutabili<\/strong>\u00a0per un periodo prefissato.[\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_shield&#8221; tab_id=&#8221;558e1cd4-0433-5f19c-e223&#8243; title=&#8221;Falcon Nest&#8221;]E\u2019 offerta che\u00a0<strong>include tutti gli altri moduli<\/strong>. Rappresenta il massimo della Sicurezza informatica per una piccola impresa.<\/p>\n<p>Un cliente che sottoscrive un servizio Falcon Nest per la propria azienda, dovr\u00e0 fornire il numero dei computer, il numero complessivo di email aziendali e di persone che fanno parte dell\u2019organizzazione per poter avere\u00a0<strong>il pacchetto completo dell\u2019offerta Falcon Services<\/strong>.[\/business_accordion_tab][\/business_accordion][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;The tailor-made service for Italian Micro and Small Enterprises&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]The services for Micro and Small Enterprises have been studied, packaged and made accessible even by those companies that do not have budget availability such as medium-large companies, but have well understood the [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":15958,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Falcon Services - Why Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.whysecurity.it\/en\/falcon-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Falcon Services - Why Security\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;The tailor-made service for Italian Micro and Small Enterprises&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]The services for Micro and Small Enterprises have been studied, packaged and made accessible even by those companies that do not have budget availability such as medium-large companies, but have well understood the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.whysecurity.it\/en\/falcon-services\/\" \/>\n<meta property=\"og:site_name\" content=\"Why Security\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-22T16:22:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.whysecurity.it\/wp-content\/uploads\/2021\/09\/iStock-1166272744-e1630580359932-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1264\" \/>\n\t<meta property=\"og:image:height\" content=\"368\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.whysecurity.it\/en\/falcon-services\/\",\"url\":\"https:\/\/www.whysecurity.it\/en\/falcon-services\/\",\"name\":\"Falcon Services - Why Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.whysecurity.it\/it\/#website\"},\"datePublished\":\"2023-03-16T10:56:54+00:00\",\"dateModified\":\"2023-03-22T16:22:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.whysecurity.it\/en\/falcon-services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.whysecurity.it\/en\/falcon-services\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.whysecurity.it\/en\/falcon-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.whysecurity.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Falcon Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.whysecurity.it\/it\/#website\",\"url\":\"https:\/\/www.whysecurity.it\/it\/\",\"name\":\"Why Security\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.whysecurity.it\/it\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Falcon Services - Why Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.whysecurity.it\/en\/falcon-services\/","og_locale":"en_US","og_type":"article","og_title":"Falcon Services - Why Security","og_description":"[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;The tailor-made service for Italian Micro and Small Enterprises&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]The services for Micro and Small Enterprises have been studied, packaged and made accessible even by those companies that do not have budget availability such as medium-large companies, but have well understood the [&hellip;]","og_url":"https:\/\/www.whysecurity.it\/en\/falcon-services\/","og_site_name":"Why Security","article_modified_time":"2023-03-22T16:22:20+00:00","og_image":[{"width":1264,"height":368,"url":"https:\/\/www.whysecurity.it\/wp-content\/uploads\/2021\/09\/iStock-1166272744-e1630580359932-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.whysecurity.it\/en\/falcon-services\/","url":"https:\/\/www.whysecurity.it\/en\/falcon-services\/","name":"Falcon Services - Why Security","isPartOf":{"@id":"https:\/\/www.whysecurity.it\/it\/#website"},"datePublished":"2023-03-16T10:56:54+00:00","dateModified":"2023-03-22T16:22:20+00:00","breadcrumb":{"@id":"https:\/\/www.whysecurity.it\/en\/falcon-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.whysecurity.it\/en\/falcon-services\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.whysecurity.it\/en\/falcon-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.whysecurity.it\/en\/"},{"@type":"ListItem","position":2,"name":"Falcon Services"}]},{"@type":"WebSite","@id":"https:\/\/www.whysecurity.it\/it\/#website","url":"https:\/\/www.whysecurity.it\/it\/","name":"Why Security","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.whysecurity.it\/it\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16046"}],"collection":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/comments?post=16046"}],"version-history":[{"count":6,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16046\/revisions"}],"predecessor-version":[{"id":16147,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16046\/revisions\/16147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/media\/15958"}],"wp:attachment":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/media?parent=16046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}