{"id":16064,"date":"2023-03-16T12:28:54","date_gmt":"2023-03-16T11:28:54","guid":{"rendered":"https:\/\/www.whysecurity.it\/centralized-security\/"},"modified":"2023-03-22T17:13:23","modified_gmt":"2023-03-22T16:13:23","slug":"centralized-security","status":"publish","type":"page","link":"https:\/\/www.whysecurity.it\/en\/centralized-security\/","title":{"rendered":"Centralized Security"},"content":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;PC and Server centralized security&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]In an era in which <strong>smartworking<\/strong> has become a standard, the last stronghold for a company&#8217;s IT security. The security of PCs has therefore become especially critical, much more than in the past, because today new habits require us to access business applications and above all to data and information wherever we are.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css_animation=&#8221;none&#8221; bgimage=&#8221;12054&#8243; bgstyle=&#8221;jarallax&#8221; ptextcolor=&#8221;White&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1585664322371{margin-left: -15px !important;padding-top: 60px !important;padding-bottom: 80px !important;background-color: #231e1f !important;}&#8221; el_class=&#8221;bianco&#8221;][vc_column][vc_custom_heading text=&#8221;Which Technologies?&#8221; font_container=&#8221;tag:h2|font_size:44|text_align:center&#8221; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; el_class=&#8221;equal-height-content&#8221; css=&#8221;.vc_custom_1539260614930{background-color: #231e1f !important;}&#8221;][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css_animation=&#8221;fadeInLeft&#8221; css=&#8221;.vc_custom_1629793621688{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;}&#8221;]The choice of the most suitable technologies that make massive use of <strong>artificial intelligence<\/strong> and the methods of implementation are the two <strong>fundamental pillars<\/strong> to ensure a good level of security.<\/p>\n<p>The preventive analysis of all operational needs, understood as the set of main software necessary for the company role, access to exclusively necessary resources are essential to <strong>identify the best system configuration<\/strong>, without having to manage too many exceptions to security controls, which could become a weak link or attack vector.<\/p>\n<p>All the technologies we choose to use, are subjected to an evaluation period of 6 months, in which they are <strong>analyzed and tested in depth<\/strong>, and then decide whether to implement them and integrate them to our. organizational model, which includes proactive monitoring of all events and alarms of our customers&#8217; systems.[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;industriaUno&#8221; width=&#8221;1\/6&#8243; css=&#8221;.vc_custom_1630412627054{padding-top: 30% !important;padding-bottom: 30% !important;}&#8221; offset=&#8221;vc_hidden-xs&#8221;][vc_single_image image=&#8221;12183&#8243; alignment=&#8221;right&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;PC and Server centralized security&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]In an era in which smartworking has become a standard, the last stronghold for a company&#8217;s IT security. The security of PCs has therefore become especially critical, much more than in the past, because today new habits [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":15958,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Centralized Security - Why Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.whysecurity.it\/en\/centralized-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Centralized Security - Why Security\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;PC and Server centralized security&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]In an era in which smartworking has become a standard, the last stronghold for a company&#8217;s IT security. The security of PCs has therefore become especially critical, much more than in the past, because today new habits [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.whysecurity.it\/en\/centralized-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Why Security\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-22T16:13:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.whysecurity.it\/wp-content\/uploads\/2021\/09\/iStock-1166272744-e1630580359932-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1264\" \/>\n\t<meta property=\"og:image:height\" content=\"368\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.whysecurity.it\/en\/centralized-security\/\",\"url\":\"https:\/\/www.whysecurity.it\/en\/centralized-security\/\",\"name\":\"Centralized Security - Why Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.whysecurity.it\/it\/#website\"},\"datePublished\":\"2023-03-16T11:28:54+00:00\",\"dateModified\":\"2023-03-22T16:13:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.whysecurity.it\/en\/centralized-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.whysecurity.it\/en\/centralized-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.whysecurity.it\/en\/centralized-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.whysecurity.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Centralized Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.whysecurity.it\/it\/#website\",\"url\":\"https:\/\/www.whysecurity.it\/it\/\",\"name\":\"Why Security\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.whysecurity.it\/it\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Centralized Security - Why Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.whysecurity.it\/en\/centralized-security\/","og_locale":"en_US","og_type":"article","og_title":"Centralized Security - Why Security","og_description":"[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;PC and Server centralized security&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]In an era in which smartworking has become a standard, the last stronghold for a company&#8217;s IT security. The security of PCs has therefore become especially critical, much more than in the past, because today new habits [&hellip;]","og_url":"https:\/\/www.whysecurity.it\/en\/centralized-security\/","og_site_name":"Why Security","article_modified_time":"2023-03-22T16:13:23+00:00","og_image":[{"width":1264,"height":368,"url":"https:\/\/www.whysecurity.it\/wp-content\/uploads\/2021\/09\/iStock-1166272744-e1630580359932-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.whysecurity.it\/en\/centralized-security\/","url":"https:\/\/www.whysecurity.it\/en\/centralized-security\/","name":"Centralized Security - Why Security","isPartOf":{"@id":"https:\/\/www.whysecurity.it\/it\/#website"},"datePublished":"2023-03-16T11:28:54+00:00","dateModified":"2023-03-22T16:13:23+00:00","breadcrumb":{"@id":"https:\/\/www.whysecurity.it\/en\/centralized-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.whysecurity.it\/en\/centralized-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.whysecurity.it\/en\/centralized-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.whysecurity.it\/en\/"},{"@type":"ListItem","position":2,"name":"Centralized Security"}]},{"@type":"WebSite","@id":"https:\/\/www.whysecurity.it\/it\/#website","url":"https:\/\/www.whysecurity.it\/it\/","name":"Why Security","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.whysecurity.it\/it\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16064"}],"collection":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/comments?post=16064"}],"version-history":[{"count":3,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16064\/revisions"}],"predecessor-version":[{"id":16144,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16064\/revisions\/16144"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/media\/15958"}],"wp:attachment":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/media?parent=16064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}