{"id":16052,"date":"2023-03-16T12:09:55","date_gmt":"2023-03-16T11:09:55","guid":{"rendered":"https:\/\/www.whysecurity.it\/transition-4-0\/"},"modified":"2023-03-22T17:52:16","modified_gmt":"2023-03-22T16:52:16","slug":"transition-4-0","status":"publish","type":"page","link":"https:\/\/www.whysecurity.it\/en\/transition-4-0\/","title":{"rendered":"Transition 4.0"},"content":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; disable_element=&#8221;yes&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1629797907373{padding-top: 80px !important;padding-bottom: 80px !important;background-color: #f6f6f6 !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Assessment of economic risks rising from cyber risk.&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]This service has been designed to offer a timely <strong>analysis of the economic risks<\/strong> from IT risks based on objective criteria, related to the needs of security, business continuity and flexibility suitable for managing business processes.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css_animation=&#8221;none&#8221; disable_element=&#8221;yes&#8221; bgimage=&#8221;12054&#8243; bgstyle=&#8221;jarallax&#8221; ptextcolor=&#8221;White&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1629797564657{margin-left: -15px !important;padding-top: 60px !important;padding-bottom: 80px !important;background-color: #231e1f !important;}&#8221; el_class=&#8221;bianco&#8221;][vc_column][vc_custom_heading text=&#8221;Role Model&#8221; font_container=&#8221;tag:h2|font_size:44|text_align:center&#8221; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; el_class=&#8221;equal-height-content&#8221; css=&#8221;.vc_custom_1539260614930{background-color: #231e1f !important;}&#8221;][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css_animation=&#8221;fadeInLeft&#8221; css=&#8221;.vc_custom_1629726348901{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;}&#8221;]The reference model used is the <strong>National Framework of CyberSecurity and Data Protection version 2.0<\/strong>, developed by the <strong>Research Center for Cyber intelligence and Information Security of the Sapienza University of Rome<\/strong> (CIS Sapienza for short), in collaboration with the National Interuniversity Consortium for Informatics and the support of the Authority for the Protection of Personal Data and the Department of Information for Security of the Presidency of the Council of Ministers.<\/p>\n<p>The model is inspired by the CyberSecurity Framework developed by the NIST (National Institute of Standards and Technology) of the United States of America, also integrating a series of controls derived from Legislative Decree 101\/2018, which summarizes the regulatory obligations regarding privacy and processing of personal data.[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;industriaUno&#8221; width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;12183&#8243; alignment=&#8221;right&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column gradient_colors=&#8221;%5B%7B%7D%5D&#8221; offset=&#8221;vc_hidden-xs&#8221;][vc_custom_heading text=&#8221;Fields of project&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center&#8221; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221; css=&#8221;.vc_custom_1630424095982{margin-bottom: 35px !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\">For the <strong>transition 4.0<\/strong>, the <strong>WhyTech<\/strong> division of WhySecurity designs and developes projects such as Enhanced CRM, IP Telephony, IOT Integration, Video Intelligence.<\/p>\n<p>[\/vc_column_text][business_tabs tab_id=&#8221;1528961806088-8&#8243;][business_tab title=&#8221;Enhanced CRM&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_archive_alt&#8221; tab_id=&#8221;68229915-60c3-5&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"text-align: left;\">Enhanced CRM<\/h3>\n<p>&#8220;Enhancing CRM&#8221; or &#8220;Enhanced CRM&#8221; projects in which systems and data reside exclusively <strong>on the customer&#8217;s servers or in Datacenters with very high IT Security standard<\/strong>s. Keeping strategic business information in a place where the customer feels truly safe is an absolute value for us.<\/p>\n<p>We develop customizations for the management of <strong>ISO 9001<\/strong> processes, the automation of Customer Care or Customer Service services interfaced with production systems.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;IP Telephony&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_phone&#8221; tab_id=&#8221;c5d31091-9346-10&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3>IP Telephony<\/h3>\n<p>IP Telephony projects, i.e. telephone exchanges with integration with CRM software and <strong>unified communication<\/strong> software, commonly called &#8220;Unified Communication&#8221;: the integration for data exchange between telephone systems and management software.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;IoT Integration&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_cloud_alt&#8221; tab_id=&#8221;f9be7c6d-5db3-6&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3>IOT Integration\u00a0 Projects<\/h3>\n<p>Integration projects with the IoT (<strong>Internet of Things<\/strong>) world, i.e. the design and development of computer networks suitable for data exchange between production machinery and IT systems[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;VideoIntelligence&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_desktop&#8221; tab_id=&#8221;95e9952e-71b6-8&#8243;][vc_row_inner][vc_column_inner][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3>Video Intelligence Systems<\/h3>\n<p>Intelligent Video Surveillance or VideoIntelligence systems for systems that require high flexibility and immediate warning in case of crossing areas, darkening of the cameras by means of<strong> powerful Video analysis systems<\/strong>.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/business_tab][\/business_tabs][\/vc_column][\/vc_row][vc_row gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column gradient_colors=&#8221;%5B%7B%7D%5D&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221; css=&#8221;.vc_custom_1630483165234{margin-bottom: 10px !important;}&#8221;][vc_custom_heading text=&#8221;Fields of project&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center&#8221; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221; css=&#8221;.vc_custom_1630424095982{margin-bottom: 35px !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\">For the <strong>transition 4.0<\/strong>, the <strong>WhyTech<\/strong> division of WhySecurity designs and developes projects such as Enhanced CRM, IP Telephony, IOT Integration, Video Intelligence.<\/p>\n<p>[\/vc_column_text][business_accordion tab_id=&#8221;1522427058260-58183-0cee0fc7-fca9&#8243;][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_archive_alt&#8221; tab_id=&#8221;727d3162-cc7c-108183-0cee0fc7-fca9&#8243; title=&#8221;CRM Potenziati&#8221;]Progetti \u201cCRM Potenzianti\u201d o \u201cEnhanced CRM\u201d in cui i sistemi ed i dati risiedono esclusivamente\u00a0<strong>sui server del cliente o in Datacenter con elevatissimi standard<\/strong>\u00a0<strong>di Sicurezza Informatica<\/strong>. La conservazione delle informazioni strategiche aziendali in un luogo in cui il cliente si senta veramente al sicuro \u00e8 per noi un valore assoluto. Sviluppiamo Personalizzazioni per la gestione dei processi\u00a0<strong>ISO 9001<\/strong>, l\u2019automazione dei servizi di Customer Care o Assistenza Clienti interfacciati con i sistemi produttivi.[\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_phone&#8221; tab_id=&#8221;829ad513-5a60-40fc7-fca9&#8243; title=&#8221;Telefonia IP&#8221;]Progetti di Telefonia IP, ovvero centrali telefoniche con integrazione con i software CRM e software per la\u00a0<strong>comunicazione unificata<\/strong>, chiamati comunemente \u201cUnified Communication\u201d, ovvero l\u2019integrazione per lo scambio dati tra sistemi telefonici e software gestionali[\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_cloud_alt&#8221; tab_id=&#8221;da226428-9e91-88183-0cee0fc7-fca9&#8243; title=&#8221;Integrazione IOT&#8221;]Progetti di integrazione con il mondo IoT (<strong>Internet of Things<\/strong>), ovvero la progettazione e lo sviluppo di reti informatiche idonee a far si che lo scambio dati tra macchinari produttivi e sistemi informatici[\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_desktop&#8221; tab_id=&#8221;35728110-9647-18183-0cee0fc7-fca9&#8243; title=&#8221;Sistemi di Videointelligence&#8221;]Sistemi di VideoSorveglianza Intelligente o VideoIntelligence per impianti che necessitano un\u2019elevata flessibilit\u00e0 ed avviso immediato in caso di attraversamento di aree, oscuramento delle telecamere a mezzo di\u00a0<strong>potenti sistemi di analisi Video<\/strong>.[\/business_accordion_tab][\/business_accordion][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; disable_element=&#8221;yes&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1629797907373{padding-top: 80px !important;padding-bottom: 80px !important;background-color: #f6f6f6 !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Assessment of economic risks rising from cyber risk.&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]This service has been designed to offer a timely analysis of the economic risks from IT risks based on objective criteria, related to the needs of security, business continuity and flexibility [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":15958,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Transition 4.0 - Why Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.whysecurity.it\/en\/transition-4-0\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Transition 4.0 - Why Security\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; disable_element=&#8221;yes&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1629797907373{padding-top: 80px !important;padding-bottom: 80px !important;background-color: #f6f6f6 !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Assessment of economic risks rising from cyber risk.&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]This service has been designed to offer a timely analysis of the economic risks from IT risks based on objective criteria, related to the needs of security, business continuity and flexibility [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.whysecurity.it\/en\/transition-4-0\/\" \/>\n<meta property=\"og:site_name\" content=\"Why Security\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-22T16:52:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.whysecurity.it\/wp-content\/uploads\/2021\/09\/iStock-1166272744-e1630580359932-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1264\" \/>\n\t<meta property=\"og:image:height\" content=\"368\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.whysecurity.it\/en\/transition-4-0\/\",\"url\":\"https:\/\/www.whysecurity.it\/en\/transition-4-0\/\",\"name\":\"Transition 4.0 - Why Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.whysecurity.it\/it\/#website\"},\"datePublished\":\"2023-03-16T11:09:55+00:00\",\"dateModified\":\"2023-03-22T16:52:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.whysecurity.it\/en\/transition-4-0\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.whysecurity.it\/en\/transition-4-0\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.whysecurity.it\/en\/transition-4-0\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.whysecurity.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Transition 4.0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.whysecurity.it\/it\/#website\",\"url\":\"https:\/\/www.whysecurity.it\/it\/\",\"name\":\"Why Security\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.whysecurity.it\/it\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Transition 4.0 - Why Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.whysecurity.it\/en\/transition-4-0\/","og_locale":"en_US","og_type":"article","og_title":"Transition 4.0 - Why Security","og_description":"[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; disable_element=&#8221;yes&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1629797907373{padding-top: 80px !important;padding-bottom: 80px !important;background-color: #f6f6f6 !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Assessment of economic risks rising from cyber risk.&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]This service has been designed to offer a timely analysis of the economic risks from IT risks based on objective criteria, related to the needs of security, business continuity and flexibility [&hellip;]","og_url":"https:\/\/www.whysecurity.it\/en\/transition-4-0\/","og_site_name":"Why Security","article_modified_time":"2023-03-22T16:52:16+00:00","og_image":[{"width":1264,"height":368,"url":"https:\/\/www.whysecurity.it\/wp-content\/uploads\/2021\/09\/iStock-1166272744-e1630580359932-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.whysecurity.it\/en\/transition-4-0\/","url":"https:\/\/www.whysecurity.it\/en\/transition-4-0\/","name":"Transition 4.0 - Why Security","isPartOf":{"@id":"https:\/\/www.whysecurity.it\/it\/#website"},"datePublished":"2023-03-16T11:09:55+00:00","dateModified":"2023-03-22T16:52:16+00:00","breadcrumb":{"@id":"https:\/\/www.whysecurity.it\/en\/transition-4-0\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.whysecurity.it\/en\/transition-4-0\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.whysecurity.it\/en\/transition-4-0\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.whysecurity.it\/en\/"},{"@type":"ListItem","position":2,"name":"Transition 4.0"}]},{"@type":"WebSite","@id":"https:\/\/www.whysecurity.it\/it\/#website","url":"https:\/\/www.whysecurity.it\/it\/","name":"Why Security","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.whysecurity.it\/it\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16052"}],"collection":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/comments?post=16052"}],"version-history":[{"count":9,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16052\/revisions"}],"predecessor-version":[{"id":16157,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16052\/revisions\/16157"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/media\/15958"}],"wp:attachment":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/media?parent=16052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}