{"id":16082,"date":"2023-03-16T14:36:24","date_gmt":"2023-03-16T13:36:24","guid":{"rendered":"https:\/\/www.whysecurity.it\/company\/"},"modified":"2023-03-22T17:58:50","modified_gmt":"2023-03-22T16:58:50","slug":"company","status":"publish","type":"page","link":"https:\/\/www.whysecurity.it\/en\/company\/","title":{"rendered":"Company"},"content":{"rendered":"<p>[vc_row][vc_column][vc_custom_heading text=&#8221;WHO&#8221; font_container=&#8221;tag:h3|font_size:20px|text_align:center&#8221; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221; css=&#8221;.vc_custom_1629721750884{padding-bottom: 20px !important;}&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][\/vc_column][\/vc_row][vc_row gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1528984345229{margin-bottom: 40px !important;}&#8221;][vc_column][vc_column_text]<strong>Founded in 2013<\/strong>, it was born with the vision of bringing talents on board, made up of people with great experience in the field of Information Security, with experiences strongly developed in large environments and abroad, together with young people capable of realizing <strong>ideas and approaches still partially unexplored<\/strong>.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1629712113404{margin-bottom: 15px !important;padding-top: 20px !important;padding-bottom: 40px !important;background-color: #e78214 !important;}&#8221;][vc_column width=&#8221;2\/3&#8243;][vc_column_text css_animation=&#8221;bounceIn&#8221;]<\/p>\n<h3 style=\"color: white !important; font-size: 20px;\">VALUES<\/h3>\n<p style=\"color: #fff;\">Our values are dedication, open-mindedness, questioning ourselves every day because what until now we have believed right and correct, tomorrow may no longer be. All the achieved results in terms of research and development are made available to our customers, and all our customers are part of a community where every introduced improvement for one benefits all.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;12176&#8243; alignment=&#8221;center&#8221; css_animation=&#8221;bounceIn&#8221;][\/vc_column][\/vc_row][vc_row gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1528986025729{margin-bottom: 40px !important;}&#8221;][vc_column][vc_column_text css_animation=&#8221;fadeInRight&#8221;]<\/p>\n<h3 style=\"text-align: center; font-size: 20px;\">TALENTED PEOPLE WANTED<\/h3>\n<p>We are always looking for <strong>young<\/strong> people of all nationalities, able to contribute to the development of this project that till today has given us great satisfaction. <strong>Great talents are hidden in the most unexpected people<\/strong>: our task is to discover them and put them to serve a larger project.<\/p>\n<p>Our goals are to continue to <strong>innovate<\/strong>, in science and conscience, in a world where difficulties are always increasing and challenging.<\/p>\n<p>&nbsp;<\/p>\n<h3 style=\"text-align: center; font-size: 20px;\">APPLICATION FIELDS<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column gradient_colors=&#8221;%5B%7B%7D%5D&#8221; offset=&#8221;vc_hidden-xs&#8221;][business_tabs tab_id=&#8221;1528961806088-8&#8243;][business_tab title=&#8221;Risk Assessment&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_shield_alt&#8221; tab_id=&#8221;68229915-60c3-5&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"font-size: 20px;\"><a href=\"https:\/\/www.whysecurity.it\/risk-assessment\/\">Risk Assessment<\/a><\/h3>\n<p>This service has been designed to offer a timely <strong>analysis of the economic risks<\/strong> from IT risks based on objective criteria, related to the needs of security, business continuity and flexibility suitable for managing business processes.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_icon icon_fontawesome=&#8221;fa fa-shield&#8221; color=&#8221;black&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeInLeft&#8221; el_class=&#8221;icon-dimension&#8221;][\/vc_icon][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Vulnerability Assessment&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_lock_alt&#8221; tab_id=&#8221;c5d31091-9346-10&#8243;][vc_row_inner gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"font-size: 20px;\"><a href=\"https:\/\/www.whysecurity.it\/vulnerability-assessment\/\">Vulnerability Assessment<\/a><\/h3>\n<p>The analysis of the vulnerabilities of the system are contextualized to the <strong>REAL<\/strong> actual client\u2019needs, or the analysis of the vulnerabilities that could be exploited in relation to the economic risk at stake that could actually weigh on the company in case of discovery.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_icon icon_fontawesome=&#8221;fa fa-lock&#8221; color=&#8221;black&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeInLeft&#8221; el_class=&#8221;icon-dimension&#8221;][\/vc_icon][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Penetration Test&#8221; type=&#8221;pixsimple&#8221; icon_pixsimple=&#8221;icon-screen-desktop&#8221; tab_id=&#8221;f148f95e-1e94-4&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]<\/p>\n<h3 style=\"font-size: 20px;\"><a href=\"https:\/\/www.whysecurity.it\/penetration-test\/\">Penetration Test<\/a><\/h3>\n<p>The penetration test is a kind of activity that needs a <strong>careful risk assessment<\/strong> first. Penetration testing activities can be non-disruptive or disruptive. The customer can choose the tests they want to be conducted in order to their nature or type or also to the type of the result to be observed.[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;flex-col&#8221; width=&#8221;1\/2&#8243;][vc_icon icon_fontawesome=&#8221;fa fa-desktop&#8221; color=&#8221;black&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeInLeft&#8221; el_class=&#8221;icon-dimension&#8221;][\/vc_icon][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Network Security&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_globe-2&#8243; tab_id=&#8221;21f912dc-bdc1-5&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"font-size: 20px;\"><a href=\"https:\/\/www.whysecurity.it\/network-security\/\">Network Security<\/a><\/h3>\n<p>Network security today requires a completely different approach than in the past. Our approach is to<strong> carefully map<\/strong> what resources should be available to whom or what. The subdivision of the network and access only to the resources necessary both by local users, smart working users and third parties is the <strong>first fundamental rule<\/strong> to start a valid risk mitigation process.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_icon type=&#8221;linecons&#8221; icon_linecons=&#8221;vc_li vc_li-world&#8221; color=&#8221;black&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeInLeft&#8221; el_class=&#8221;icon-dimension&#8221;][\/vc_icon][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Safe Backup&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_refresh&#8221; tab_id=&#8221;7df65e4d-a5bc-4&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"font-size: 20px;\"><a href=\"https:\/\/www.whysecurity.it\/backup-aziendale\/\">Backup<\/a><\/h3>\n<p><strong>Backups of computer systems<\/strong>, data and information are the <strong>last chance<\/strong> before facing a real disaster. The management of backups of computer systems and data has been underestimated countless times, so much so as to send entire companies into crisis, because following a <strong>Ransomware<\/strong> attack, therefore an attack in which data has been encrypted for ransom purpose, backups are be also encrypted.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_icon icon_fontawesome=&#8221;fa fa-refresh&#8221; color=&#8221;black&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeInLeft&#8221; el_class=&#8221;icon-dimension&#8221;][\/vc_icon][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Transition 4.0&#8243; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_drive&#8221; tab_id=&#8221;a2fa20cd-51c1-8&#8243;][vc_row_inner gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"font-size: 20px;\"><a href=\"https:\/\/www.whysecurity.it\/transizione-40\/\">Transition 4.0<\/a><\/h3>\n<p>For the transition 4.0, the WhyTech division of WhySecurity designs and developes projects such as Enhanced CRM, IP Telephony, IOT Integration, Video Intelligence.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_icon icon_fontawesome=&#8221;fa fa-television&#8221; color=&#8221;black&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeInLeft&#8221; el_class=&#8221;icon-dimension&#8221;][\/vc_icon][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Centralized Security&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_flowchart_alt&#8221; tab_id=&#8221;aff96814-c6be-7&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"font-size: 20px;\"><a href=\"https:\/\/www.whysecurity.it\/sicurezza-centralizzata\/\">Centralized Security<\/a><\/h3>\n<p>In an era in which <strong>smartworking<\/strong> has become a standard, the last stronghold for a company&#8217;s IT security. The security of PCs has therefore become especially critical, much more than in the past, because today new habits require us to access business applications and above all to data and information wherever we are.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_icon icon_fontawesome=&#8221;fa fa-sitemap&#8221; color=&#8221;black&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeInLeft&#8221; el_class=&#8221;icon-dimension&#8221;][\/vc_icon][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;Email Security&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_mail_alt&#8221; tab_id=&#8221;82ea8045-dc73-8&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"font-size: 20px;\"><a href=\"https:\/\/www.whysecurity.it\/sicurezza-email\/\">Email security<\/a><\/h3>\n<p>E-mail is still the first vector of cyber attacks, due to the fact that e-mail today is used to send any kind of information. We are used to using e-mail to send documents of any kind, very often even <strong>sensitive documents that should never be transmitted<\/strong>.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_icon icon_fontawesome=&#8221;fa fa-envelope-o&#8221; color=&#8221;black&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeInLeft&#8221; el_class=&#8221;icon-dimension&#8221;][\/vc_icon][\/vc_column_inner][\/vc_row_inner][\/business_tab][business_tab title=&#8221;NOC e SOC&#8221; type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_search_alt&#8221; tab_id=&#8221;0fecf6f0-044c-6&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text css_animation=&#8221;fadeInLeft&#8221;]<\/p>\n<h3 style=\"font-size: 20px;\"><a href=\"https:\/\/www.whysecurity.it\/servizi-noc-soc\/\">NOC &amp; SOC Services<\/a><\/h3>\n<p>From January 2021 the <strong>Security Operation Center<\/strong> has been realized. The service is carried out within an operations center with ministerial authorization, organized on two levels or &#8220;<strong>Tier<\/strong>&#8221; of organization.<\/p>\n<p>First-level or &#8220;Tier 1&#8221; operators perform call center functions, receive notifications from all systems, carry out an initial analysis according to the model adopted. It is the job of Tier 1 operators to monitor all open sources for <strong>updates and alerts of recognized threats<\/strong> or discovered vulnerabilities that could be used as attacks.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_icon icon_fontawesome=&#8221;fa fa-search&#8221; color=&#8221;black&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeInLeft&#8221; el_class=&#8221;icon-dimension&#8221;][\/vc_icon][\/vc_column_inner][\/vc_row_inner][\/business_tab][\/business_tabs][\/vc_column][\/vc_row][vc_row gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column gradient_colors=&#8221;%5B%7B%7D%5D&#8221; offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221; css=&#8221;.vc_custom_1630483165234{margin-bottom: 10px !important;}&#8221;][business_accordion tab_id=&#8221;1522427058260-58183-0cee&#8221;][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_shield_alt&#8221; tab_id=&#8221;727d3162-cc7c-108183-0cee&#8221; title=&#8221;Risk Assessment&#8221;] This service has been designed to offer a timely <strong>analysis of the economic risks<\/strong> from IT risks based on objective criteria, related to the needs of security, business continuity and flexibility suitable for managing business processes. [\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_lock_alt&#8221; tab_id=&#8221;829ad513-5a60-4&#8243; title=&#8221;Vulnerability Assessment&#8221;] The analysis of the vulnerabilities of the system are contextualized to the <strong>REAL<\/strong> actual client\u2019needs, or the analysis of the vulnerabilities that could be exploited in relation to the economic risk at stake that could actually weigh on the company in case of discovery. [\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_desktop&#8221; tab_id=&#8221;da226428-9e91-88183-0cee&#8221; title=&#8221;Penetration Test&#8221;] The penetration test is a kind of activity that needs a <strong>careful risk assessment<\/strong> first. Penetration testing activities can be non-disruptive or disruptive. The customer can choose the tests they want to be conducted in order to their nature or type or also to the type of the result to be observed. [\/business_accordion_tab][business_accordion_tab type=&#8221;pixsimple&#8221; icon_pixsimple=&#8221;icon-globe&#8221; tab_id=&#8221;35728110-9647-18183-0cee&#8221; title=&#8221;Network Security&#8221;] Network security today requires a completely different approach than in the past. Our approach is to<strong> carefully map<\/strong> what resources should be available to whom or what. The subdivision of the network and access only to the resources necessary both by local users, smart working users and third parties is the <strong>first fundamental rule<\/strong> to start a valid risk mitigation process. [\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_refresh&#8221; tab_id=&#8221;3ef301a7-a6b5-58183-0cee&#8221; title=&#8221;Centrale operativa di Sicurezza&#8221;] <strong>Backups of computer systems<\/strong>, data and information are the <strong>last chance<\/strong> before facing a real disaster. The management of backups of computer systems and data has been underestimated countless times, so much so as to send entire companies into crisis, because following a <strong>Ransomware<\/strong> attack, therefore an attack in which data has been encrypted for ransom purpose, backups are be also encrypted. [\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_drive&#8221; tab_id=&#8221;3d843fd2-740e-0&#8243; title=&#8221;Transizione 4.0&#8243;] For the transition 4.0, the WhyTech division of WhySecurity designs and developes projects such as Enhanced CRM, IP Telephony, IOT Integration, Video Intelligence. [\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_flowchart&#8221; tab_id=&#8221;558e1cd4-0433-5&#8243; title=&#8221;Sicurezza centralizzata&#8221;] In an era in which <strong>smartworking<\/strong> has become a standard, the last stronghold for a company&#8217;s IT security. The security of PCs has therefore become especially critical, much more than in the past, because today new habits require us to access business applications and above all to data and information wherever we are. [\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_mail_alt&#8221; tab_id=&#8221;95dbb6ad-452b-8&#8243; title=&#8221;Sicurezza email&#8221;] E-mail is still the first vector of cyber attacks, due to the fact that e-mail today is used to send any kind of information. We are used to using e-mail to send documents of any kind, very often even <strong>sensitive documents that should never be transmitted<\/strong>. [\/business_accordion_tab][business_accordion_tab type=&#8221;pixcustom1&#8243; icon_pixcustom1=&#8221;icon_search_alt&#8221; tab_id=&#8221;b46236b0-3840-3&#8243; title=&#8221;NOC e SOC&#8221;] From January 2021 the <strong>Security Operation Center<\/strong> has been realized. The service is carried out within an operations center with ministerial authorization, organized on two levels or &#8220;<strong>Tier<\/strong>&#8221; of organization.<\/p>\n<p>First-level or &#8220;Tier 1&#8221; operators perform call center functions, receive notifications from all systems, carry out an initial analysis according to the model adopted. It is the job of Tier 1 operators to monitor all open sources for <strong>updates and alerts of recognized threats<\/strong> or discovered vulnerabilities that could be used as attacks.[\/business_accordion_tab][\/business_accordion][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_custom_heading text=&#8221;WHO&#8221; font_container=&#8221;tag:h3|font_size:20px|text_align:center&#8221; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221; css=&#8221;.vc_custom_1629721750884{padding-bottom: 20px !important;}&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][\/vc_column][\/vc_row][vc_row gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1528984345229{margin-bottom: 40px !important;}&#8221;][vc_column][vc_column_text]Founded in 2013, it was born with the vision of bringing talents on board, made up of people with great experience in the field of Information Security, with experiences strongly developed in large environments and abroad, together with young people capable of realizing [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":15958,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Security - The Company | Contact us for Business Consulting<\/title>\n<meta name=\"description\" content=\"Security Trust is a Security Service Institute based in Brescia that operates throughout Italy thanks to the know-how gained on integrated security systems\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.whysecurity.it\/en\/company\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Security - The Company | Contact us for Business Consulting\" \/>\n<meta property=\"og:description\" content=\"Security Trust is a Security Service Institute based in Brescia that operates throughout Italy thanks to the know-how gained on integrated security systems\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.whysecurity.it\/en\/company\/\" \/>\n<meta property=\"og:site_name\" content=\"Why Security\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-22T16:58:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.whysecurity.it\/wp-content\/uploads\/2021\/09\/iStock-1166272744-e1630580359932-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1264\" \/>\n\t<meta property=\"og:image:height\" content=\"368\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.whysecurity.it\/en\/company\/\",\"url\":\"https:\/\/www.whysecurity.it\/en\/company\/\",\"name\":\"Why Security - The Company | Contact us for Business Consulting\",\"isPartOf\":{\"@id\":\"https:\/\/www.whysecurity.it\/it\/#website\"},\"datePublished\":\"2023-03-16T13:36:24+00:00\",\"dateModified\":\"2023-03-22T16:58:50+00:00\",\"description\":\"Security Trust is a Security Service Institute based in Brescia that operates throughout Italy thanks to the know-how gained on integrated security systems\",\"breadcrumb\":{\"@id\":\"https:\/\/www.whysecurity.it\/en\/company\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.whysecurity.it\/en\/company\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.whysecurity.it\/en\/company\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.whysecurity.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Company\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.whysecurity.it\/it\/#website\",\"url\":\"https:\/\/www.whysecurity.it\/it\/\",\"name\":\"Why Security\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.whysecurity.it\/it\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Security - The Company | Contact us for Business Consulting","description":"Security Trust is a Security Service Institute based in Brescia that operates throughout Italy thanks to the know-how gained on integrated security systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.whysecurity.it\/en\/company\/","og_locale":"en_US","og_type":"article","og_title":"Why Security - The Company | Contact us for Business Consulting","og_description":"Security Trust is a Security Service Institute based in Brescia that operates throughout Italy thanks to the know-how gained on integrated security systems","og_url":"https:\/\/www.whysecurity.it\/en\/company\/","og_site_name":"Why Security","article_modified_time":"2023-03-22T16:58:50+00:00","og_image":[{"width":1264,"height":368,"url":"https:\/\/www.whysecurity.it\/wp-content\/uploads\/2021\/09\/iStock-1166272744-e1630580359932-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.whysecurity.it\/en\/company\/","url":"https:\/\/www.whysecurity.it\/en\/company\/","name":"Why Security - The Company | Contact us for Business Consulting","isPartOf":{"@id":"https:\/\/www.whysecurity.it\/it\/#website"},"datePublished":"2023-03-16T13:36:24+00:00","dateModified":"2023-03-22T16:58:50+00:00","description":"Security Trust is a Security Service Institute based in Brescia that operates throughout Italy thanks to the know-how gained on integrated security systems","breadcrumb":{"@id":"https:\/\/www.whysecurity.it\/en\/company\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.whysecurity.it\/en\/company\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.whysecurity.it\/en\/company\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.whysecurity.it\/en\/"},{"@type":"ListItem","position":2,"name":"Company"}]},{"@type":"WebSite","@id":"https:\/\/www.whysecurity.it\/it\/#website","url":"https:\/\/www.whysecurity.it\/it\/","name":"Why Security","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.whysecurity.it\/it\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16082"}],"collection":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/comments?post=16082"}],"version-history":[{"count":6,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16082\/revisions"}],"predecessor-version":[{"id":16160,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16082\/revisions\/16160"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/media\/15958"}],"wp:attachment":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/media?parent=16082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}