{"id":16088,"date":"2023-03-16T14:55:23","date_gmt":"2023-03-16T13:55:23","guid":{"rendered":"https:\/\/www.whysecurity.it\/home\/"},"modified":"2023-03-23T13:55:31","modified_gmt":"2023-03-23T12:55:31","slug":"home","status":"publish","type":"page","link":"https:\/\/www.whysecurity.it\/en\/","title":{"rendered":"Home"},"content":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column 0=&#8221;&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;]<link href=\"https:\/\/fonts.googleapis.com\/css?family=Raleway:500%2C700%2C400\" rel=\"stylesheet\" property=\"stylesheet\" type=\"text\/css\" media=\"all\">\n<div id=\"rev_slider_6_1_wrapper\" class=\"rev_slider_wrapper fullscreen-container\" data-source=\"gallery\" style=\"background:transparent;padding:0px;\">\n<!-- START REVOLUTION SLIDER 5.4.7 fullscreen mode -->\n\t<div id=\"rev_slider_6_1\" class=\"rev_slider fullscreenbanner\" style=\"display:none;\" data-version=\"5.4.7\">\n<ul>\t<!-- SLIDE  -->\n\t<li data-index=\"rs-110\" data-transition=\"fade\" data-slotamount=\"default\" data-hideafterloop=\"0\" data-hideslideonmobile=\"off\"  data-easein=\"default\" data-easeout=\"default\" data-masterspeed=\"300\"  data-thumb=\"https:\/\/www.whysecurity.it\/wp-content\/uploads\/2021\/09\/copertina_1920x1280px-100x50.jpg\"  data-rotate=\"0\"  data-saveperformance=\"off\"  data-title=\"Slide\" data-param1=\"\" data-param2=\"\" data-param3=\"\" data-param4=\"\" data-param5=\"\" data-param6=\"\" data-param7=\"\" data-param8=\"\" data-param9=\"\" data-param10=\"\" data-description=\"\">\n\t\t<!-- MAIN IMAGE -->\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.whysecurity.it\/wp-content\/plugins\/revslider\/admin\/assets\/images\/dummy.png\"  alt=\"\" title=\"copertina_1920x1280px\"  width=\"1920\" height=\"1280\" data-lazyload=\"https:\/\/www.whysecurity.it\/wp-content\/uploads\/2021\/09\/copertina_1920x1280px.jpg\" data-bgposition=\"center center\" data-kenburns=\"on\" data-duration=\"10000\" data-ease=\"Linear.easeNone\" data-scalestart=\"100\" data-scaleend=\"120\" data-rotatestart=\"0\" data-rotateend=\"0\" data-blurstart=\"0\" data-blurend=\"0\" data-offsetstart=\"0 0\" data-offsetend=\"0 0\" class=\"rev-slidebg\" data-no-retina>\n\t\t<!-- LAYERS -->\n\n\t\t<!-- LAYER NR. 1 -->\n\t\t<div class=\"tp-caption tp-shape tp-shapewrapper tp-layer-selectable  tp-resizeme\" \n\t\t\t id=\"slide-110-layer-22\" \n\t\t\t data-x=\"['left','left','left','left']\" data-hoffset=\"['0','0','0','0']\" \n\t\t\t data-y=\"['top','top','top','top']\" data-voffset=\"['0','0','0','0']\" \n\t\t\t\t\t\tdata-width=\"['full','full','full','full']\"\n\t\t\tdata-height=\"['full','full','full','full']\"\n\t\t\tdata-whitespace=\"nowrap\"\n \n\t\t\tdata-type=\"shape\" \n\t\t\tdata-basealign=\"slide\" \n\t\t\tdata-responsive_offset=\"off\" \n\n\t\t\tdata-frames='[{\"delay\":10,\"speed\":300,\"frame\":\"0\",\"from\":\"opacity:0;\",\"to\":\"o:1;\",\"ease\":\"Power3.easeInOut\"},{\"delay\":\"wait\",\"speed\":300,\"frame\":\"999\",\"to\":\"opacity:0;\",\"ease\":\"Power3.easeInOut\"}]'\n\t\t\tdata-textAlign=\"['inherit','inherit','inherit','inherit']\"\n\t\t\tdata-paddingtop=\"[0,0,0,0]\"\n\t\t\tdata-paddingright=\"[0,0,0,0]\"\n\t\t\tdata-paddingbottom=\"[0,0,0,0]\"\n\t\t\tdata-paddingleft=\"[0,0,0,0]\"\n\n\t\t\tstyle=\"z-index: 5;background-color:rgba(63,63,63,0.1);\"> <\/div>\n\n\t\t<!-- LAYER NR. 2 -->\n\t\t<div class=\"tp-caption rev-btn tp-layer-selectable \" \n\t\t\t id=\"slide-110-layer-9\" \n\t\t\t data-x=\"['left','left','center','center']\" data-hoffset=\"['4','0','0','0']\" \n\t\t\t data-y=\"['middle','middle','middle','middle']\" data-voffset=\"['85','125','115','155']\" \n\t\t\t\t\t\tdata-fontsize=\"['14','15','15','15']\"\n\t\t\tdata-fontweight=\"['500','700','500','500']\"\n\t\t\tdata-color=\"['rgb(36,31,32)','rgb(255,255,255)','rgb(255,255,255)','rgb(255,255,255)']\"\n\t\t\tdata-width=\"none\"\n\t\t\tdata-height=\"none\"\n\t\t\tdata-whitespace=\"nowrap\"\n\t\t\tdata-visibility=\"['off','off','off','off']\"\n \n\t\t\tdata-type=\"button\" \n\t\t\tdata-actions='[{\"event\":\"click\",\"action\":\"simplelink\",\"target\":\"_self\",\"url\":\"\\\/settori\\\/sistemi-sicurezza-industria\\\/\",\"delay\":\"\"}]'\n\t\t\tdata-responsive_offset=\"on\" \n\t\t\tdata-responsive=\"off\"\n\t\t\tdata-frames='[{\"delay\":10,\"speed\":300,\"frame\":\"0\",\"from\":\"opacity:0;\",\"to\":\"o:1;\",\"ease\":\"Power3.easeInOut\"},{\"delay\":\"wait\",\"speed\":300,\"frame\":\"999\",\"to\":\"opacity:0;\",\"ease\":\"Power3.easeInOut\"},{\"frame\":\"hover\",\"speed\":\"0\",\"ease\":\"Linear.easeNone\",\"to\":\"o:1;rX:0;rY:0;rZ:0;z:0;\",\"style\":\"c:rgb(255,255,255);bg:rgb(243,169,0);bc:rgba(0,0,0,1);bw:0 0 0 0;background-color:#241f20;\"}]'\n\t\t\tdata-textAlign=\"['inherit','inherit','inherit','inherit']\"\n\t\t\tdata-paddingtop=\"[18,18,18,12]\"\n\t\t\tdata-paddingright=\"[35,35,35,35]\"\n\t\t\tdata-paddingbottom=\"[18,18,18,12]\"\n\t\t\tdata-paddingleft=\"[35,35,35,35]\"\n\n\t\t\tstyle=\"z-index: 6; white-space: nowrap; font-size: 14px; line-height: 17px; font-weight: 500; color: #241f20; letter-spacing: px;font-family:Raleway;text-transform:uppercase;background-color:#aa9467!important;border-color:rgb(255,255,255);border-style:solid;border-width:1px 1px 1px 1px;border-radius:3px 3px 3px 3px;outline:none;box-shadow:none;box-sizing:border-box;-moz-box-sizing:border-box;-webkit-box-sizing:border-box;border:0px!important;color:white!important;cursor:pointer;\">Scopri di pi\u00f9 <\/div>\n\n\t\t<!-- LAYER NR. 3 -->\n\t\t<div class=\"tp-caption tp-layer-selectable  tp-resizeme\" \n\t\t\t id=\"slide-110-layer-18\" \n\t\t\t data-x=\"['left','left','center','center']\" data-hoffset=\"['10','0','0','0']\" \n\t\t\t data-y=\"['bottom','middle','middle','middle']\" data-voffset=\"['322','6','-6','22']\" \n\t\t\t\t\t\tdata-fontsize=\"['60','50','40','40']\"\n\t\t\tdata-lineheight=\"['60','50','50','50']\"\n\t\t\tdata-width=\"['415','558','457','309']\"\n\t\t\tdata-height=\"none\"\n\t\t\tdata-whitespace=\"normal\"\n \n\t\t\tdata-type=\"text\" \n\t\t\tdata-responsive_offset=\"on\" \n\n\t\t\tdata-frames='[{\"delay\":500,\"speed\":300,\"frame\":\"0\",\"from\":\"x:left;\",\"to\":\"o:1;\",\"ease\":\"Power2.easeInOut\"},{\"delay\":\"wait\",\"speed\":300,\"frame\":\"999\",\"to\":\"opacity:0;\",\"ease\":\"nothing\"}]'\n\t\t\tdata-textAlign=\"['left','left','center','center']\"\n\t\t\tdata-paddingtop=\"[0,0,0,0]\"\n\t\t\tdata-paddingright=\"[0,0,0,0]\"\n\t\t\tdata-paddingbottom=\"[0,0,0,0]\"\n\t\t\tdata-paddingleft=\"[0,0,0,0]\"\n\n\t\t\tstyle=\"z-index: 7; min-width: 415px; max-width: 415px; white-space: normal; font-size: 60px; line-height: 60px; font-weight: 400; color: #ffffff; letter-spacing: px;font-family:Raleway;text-transform:uppercase;\">CYBER \nSECURITY <\/div>\n\t<\/li>\n<\/ul>\n<div class=\"tp-bannertimer tp-bottom\" style=\"visibility: hidden !important;\"><\/div>\t<\/div>\n<script>var htmlDiv = document.getElementById(\"rs-plugin-settings-inline-css\"); var htmlDivCss=\"\";\r\n\t\t\t\tif(htmlDiv) {\r\n\t\t\t\t\thtmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss;\r\n\t\t\t\t}else{\r\n\t\t\t\t\tvar htmlDiv = document.createElement(\"div\");\r\n\t\t\t\t\thtmlDiv.innerHTML = \"<style>\" + htmlDivCss + \"<\/style>\";\r\n\t\t\t\t\tdocument.getElementsByTagName(\"head\")[0].appendChild(htmlDiv.childNodes[0]);\r\n\t\t\t\t}\r\n\t\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\r\nif (setREVStartSize!==undefined) setREVStartSize(\r\n\t{c: '#rev_slider_6_1', responsiveLevels: [1240,1024,778,480], gridwidth: [1240,1024,778,480], gridheight: [800,700,560,520], sliderLayout: 'fullscreen', fullScreenAutoWidth:'off', fullScreenAlignForce:'off', fullScreenOffsetContainer:'', fullScreenOffset:''});\r\n\t\t\t\r\nvar revapi6,\r\n\ttpj;\t\r\n(function() {\t\t\t\r\n\tif (!\/loaded|interactive|complete\/.test(document.readyState)) document.addEventListener(\"DOMContentLoaded\",onLoad)\r\n\t\telse\r\n\tonLoad();\r\n\t\r\n\tfunction onLoad() {\t\t\t\t\r\n\t\tif (tpj===undefined) {\r\n\t\t\ttpj = jQuery;\r\n\r\n\t\t\tif(\"off\" == \"on\") tpj.noConflict();\t\t\r\n\t\t}\r\n\tif(tpj(\"#rev_slider_6_1\").revolution == undefined){\n\t\trevslider_showDoubleJqueryError(\"#rev_slider_6_1\");\n\t}else{\n\t\trevapi6 = tpj(\"#rev_slider_6_1\").show().revolution({\n\t\t\tsliderType:\"hero\",\n\t\t\tjsFileLocation:\"\/\/www.whysecurity.it\/wp-content\/plugins\/revslider\/public\/assets\/js\/\",\n\t\t\tsliderLayout:\"fullscreen\",\n\t\t\tdottedOverlay:\"none\",\n\t\t\tdelay:9000,\n\t\t\tresponsiveLevels:[1240,1024,778,480],\n\t\t\tvisibilityLevels:[1240,1024,778,480],\n\t\t\tgridwidth:[1240,1024,778,480],\n\t\t\tgridheight:[800,700,560,520],\n\t\t\tlazyType:\"all\",\n\t\t\tshadow:0,\n\t\t\tspinner:\"off\",\n\t\t\tautoHeight:\"off\",\n\t\t\tfullScreenAutoWidth:\"off\",\n\t\t\tfullScreenAlignForce:\"off\",\n\t\t\tfullScreenOffsetContainer: \"\",\n\t\t\tfullScreenOffset: \"\",\n\t\t\tdisableProgressBar:\"on\",\n\t\t\thideThumbsOnMobile:\"off\",\n\t\t\thideSliderAtLimit:0,\n\t\t\thideCaptionAtLimit:0,\n\t\t\thideAllCaptionAtLilmit:0,\n\t\t\tdebugMode:false,\n\t\t\tfallbacks: {\n\t\t\t\tsimplifyAll:\"off\",\n\t\t\t\tdisableFocusListener:false,\n\t\t\t}\n\t\t});\n\t}; \/* END OF revapi call *\/\n\t\n }; \/* END OF ON LOAD FUNCTION *\/\r\n}()); \/* END OF WRAPPING FUNCTION *\/\r\n<\/script>\r\n\t\t<script>\r\n\t\t\t\t\tvar htmlDivCss = unescape(\".tp-caption.tp-layer-selectable.tp-resizeme%7Bleft%3A0px%21important%3B%7D\");\r\n\t\t\t\t\tvar htmlDiv = document.getElementById('rs-plugin-settings-inline-css');\r\n\t\t\t\t\tif(htmlDiv) {\r\n\t\t\t\t\t\thtmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss;\r\n\t\t\t\t\t}\r\n\t\t\t\t\telse{\r\n\t\t\t\t\t\tvar htmlDiv = document.createElement('div');\r\n\t\t\t\t\t\thtmlDiv.innerHTML = '<style>' + htmlDivCss + '<\/style>';\r\n\t\t\t\t\t\tdocument.getElementsByTagName('head')[0].appendChild(htmlDiv.childNodes[0]);\r\n\t\t\t\t\t}\r\n\t\t\t\t  <\/script><\/div><!-- END REVOLUTION SLIDER -->[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css_animation=&#8221;none&#8221; ppadding=&#8221;vc_row-padding-both&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1617706090610{background-color: #f6f6f5 !important;}&#8221;][vc_column width=&#8221;2\/3&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; offset=&#8221;vc_col-lg-6 vc_col-md-6 vc_col-xs-12&#8243;][vc_custom_heading text=&#8221;SECURITY TRUST GROUP&#8221; font_container=&#8221;tag:h3|font_size:18|text_align:left|color:%23183346&#8243; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css_animation=&#8221;none&#8221; css=&#8221;.vc_custom_1618482378901{padding-bottom: 15px !important;}&#8221;][vc_column_text 0=&#8221;&#8221; css_animation=&#8221;none&#8221;]Whysecurity is part of the Security Trust Group, the <strong>ideal partner in the field of security<\/strong>, physical and logical, able to offer a highly specialized service.<\/p>\n<p>Thanks to the synergies between the individual specializations, we are able to guarantee the best technologies on the market and face complex projects with a high degree of innovation, from <strong>integrated security systems<\/strong> to <strong>remote surveillance<\/strong> and <strong>cybersecurity<\/strong>.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; offset=&#8221;vc_col-lg-6 vc_col-md-6 vc_col-xs-12&#8243; el_class=&#8221;colonna_icone&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column_inner][vc_single_image image=&#8221;15275&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;.vc_custom_1619605647557{margin-bottom: 30px !important;}&#8221;][vc_single_image image=&#8221;15581&#8243; img_size=&#8221;250&#215;73&#8243; alignment=&#8221;center&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; ppadding=&#8221;vc_row-padding-both&#8221; gradient_colors=&#8221;%5B%7B%22gradient_color%22%3A%22%23e78214%22%7D%5D&#8221; gradient_opacity=&#8221;0.8&#8243; poverlay=&#8221;no-overlay&#8221; css=&#8221;.vc_custom_1635164250538{padding-bottom: 30px !important;background: #e78214 url(https:\/\/www.whysecurity.it\/wp-content\/uploads\/2021\/09\/iStock-1216520784.jpg?id=15955) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_id=&#8221;center-bg&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_custom_heading text=&#8221;GET IN TOUCH&#8221; font_container=&#8221;tag:h2|font_size:44|text_align:left|color:%23ffffff&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal&#8221;][vc_custom_heading text=&#8221;WITH US&#8221; font_container=&#8221;tag:h2|font_size:44|text_align:left|color:%23ffffff&#8221; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:900%20bold%20regular%3A900%3Anormal&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/2&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; el_class=&#8221;form_header&#8221; css=&#8221;.vc_custom_1635175382139{padding-bottom: 30px !important;}&#8221;]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f16169-o1\" lang=\"en-US\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/16088#wpcf7-f16169-o1\" method=\"post\" class=\"wpcf7-form init wpcf7-acceptance-as-validation\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"16169\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.8.7\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f16169-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/div>\n<div class=\"row section-form form-preventive\">\n\t<div class=\"col-sm-12\">\n\t\t<div class=\"row\">\n\t\t\t<div class=\"col-sm-12 col-md-6 \" style=\"color:red\">\n\t\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name-cfh\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" placeholder=\"Name &amp; Surname\" value=\"\" type=\"text\" name=\"your-name-cfh\" \/><\/span>\n\t\t\t\t<\/p>\n\t\t\t<\/div>\n\t\t\t<div class=\"col-sm-12 col-md-6 \">\n\t\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-phone-cfh\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone Number *\" value=\"\" type=\"tel\" name=\"your-phone-cfh\" \/><\/span>\n\t\t\t\t<\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"col-sm-12\">\n\t\t<div class=\"row\">\n\t\t\t<div class=\"col-sm-12 col-md-6 \">\n\t\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"email-cfh\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-email wpcf7-text wpcf7-validates-as-email\" aria-invalid=\"false\" placeholder=\"Email\" value=\"\" type=\"email\" name=\"email-cfh\" \/><\/span>\n\t\t\t\t<\/p>\n\t\t\t<\/div>\n\t\t\t<div class=\"col-sm-12 col-md-6 \">\n\t\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"company-cfh\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" placeholder=\"Company\" value=\"\" type=\"text\" name=\"company-cfh\" \/><\/span>\n\t\t\t\t<\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"col-sm-12\">\n\t\t<div class=\"row\">\n\t\t\t<div class=\"col-sm-12 col-md-12 \">\n\t\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-message-cfh\"><textarea cols=\"40\" rows=\"10\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" placeholder=\"Message\" name=\"your-message-cfh\"><\/textarea><\/span>\n\t\t\t\t<\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"col-sm-12\" style=\"color:white;\">\n\t\t<p>I declare to have read and understood the privacy policy, and I accept the conditions. <a href=\"https:\/\/www.whysecurity.it\/en\/privacy\/\" target=\"_blank\" style=\"color:white;\">Click here for more information. <\/a>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-sm-12\" id=\"esprimo2\" style=\"color:white;\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"accetto\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"accetto\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">I Consent<\/span><\/label><\/span><\/span><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-sm-12\">\n\t\t<div class=\"row\">\n\t\t\t<div class=\"col-sm-12 col-md-4\">\n\t\t\t\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send Message\" \/>\n\t\t\t\t<\/p>\n\t\t\t<\/div>\n\t\t\t<div class=\"col-sm-12 col-md-8 \">\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; poverlay=&#8221;no-overlay&#8221; css=&#8221;.vc_custom_1619605683735{margin-top: -100px !important;padding-bottom: 70px !important;background-color: #f6f6f5 !important;}&#8221;][vc_column 0=&#8221;&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][common_title title=&#8221;Our Application Fields&#8221; title_before=&#8221;Cyber Security&#8221; show_decor=&#8221;true&#8221; css_animation=&#8221;bounceIn&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_icon type=&#8221;material&#8221; icon_material=&#8221;vc-material vc-material-security&#8221; color=&#8221;custom&#8221; background_style=&#8221;rounded&#8221; background_color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221; custom_color=&#8221;#ffffff&#8221; custom_background_color=&#8221;#e78214&#8243; css=&#8221;.vc_custom_1679495849421{margin-bottom: 20px !important;}&#8221; link=&#8221;url:https%3A%2F%2Fwww.whysecurity.it%2Fen%2Frisk-assessment%2F|title:Risk%20Assessment&#8221;][\/vc_icon][vc_custom_heading text=&#8221;RISK ASSESSMENT&#8221; font_container=&#8221;tag:h4|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeIn&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_icon type=&#8221;material&#8221; icon_material=&#8221;vc-material vc-material-lock&#8221; color=&#8221;custom&#8221; background_style=&#8221;rounded&#8221; background_color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221; custom_color=&#8221;#ffffff&#8221; custom_background_color=&#8221;#e78214&#8243; css=&#8221;.vc_custom_1679502318261{margin-bottom: 20px !important;}&#8221; link=&#8221;url:https%3A%2F%2Fwww.whysecurity.it%2Fen%2Fvulnerability-assessment%2F|title:Vulnerability%20Assessment&#8221;][\/vc_icon][vc_custom_heading text=&#8221;VULNERABILITY ASSESSMENT&#8221; font_container=&#8221;tag:h4|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeIn&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_icon type=&#8221;material&#8221; icon_material=&#8221;vc-material vc-material-open_in_browser&#8221; color=&#8221;custom&#8221; background_style=&#8221;rounded&#8221; background_color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221; custom_color=&#8221;#ffffff&#8221; custom_background_color=&#8221;#e78214&#8243; css=&#8221;.vc_custom_1679502333087{margin-bottom: 20px !important;}&#8221; link=&#8221;url:https%3A%2F%2Fwww.whysecurity.it%2Fen%2Fpenetration-test%2F|title:Penetration%20Test&#8221;][\/vc_icon][vc_custom_heading text=&#8221;PENETRATION TESTING&#8221; font_container=&#8221;tag:h4|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeIn&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_icon type=&#8221;material&#8221; icon_material=&#8221;vc-material vc-material-vpn_lock&#8221; color=&#8221;custom&#8221; background_style=&#8221;rounded&#8221; background_color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221; custom_color=&#8221;#ffffff&#8221; custom_background_color=&#8221;#e78214&#8243; css=&#8221;.vc_custom_1679502346706{margin-bottom: 20px !important;}&#8221; link=&#8221;url:https%3A%2F%2Fwww.whysecurity.it%2Fen%2Fnetwork-security%2F|title:Network%20Security&#8221;][\/vc_icon][vc_custom_heading text=&#8221;NETWORK SECURITY&#8221; font_container=&#8221;tag:h4|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeIn&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_icon type=&#8221;material&#8221; icon_material=&#8221;vc-material vc-material-settings_backup_restore&#8221; color=&#8221;custom&#8221; background_style=&#8221;rounded&#8221; background_color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221; custom_color=&#8221;#ffffff&#8221; custom_background_color=&#8221;#e78214&#8243; css=&#8221;.vc_custom_1679502356162{margin-bottom: 20px !important;}&#8221; link=&#8221;url:https%3A%2F%2Fwww.whysecurity.it%2Fen%2Fbackup-aziendale%2F|title:Backup%20Sicuri&#8221;][\/vc_icon][vc_custom_heading text=&#8221;BACKUP&#8221; font_container=&#8221;tag:h4|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeIn&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_icon type=&#8221;material&#8221; icon_material=&#8221;vc-material vc-material-airplay&#8221; color=&#8221;custom&#8221; background_style=&#8221;rounded&#8221; background_color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221; custom_color=&#8221;#ffffff&#8221; custom_background_color=&#8221;#e78214&#8243; css=&#8221;.vc_custom_1679502366182{margin-bottom: 20px !important;}&#8221; link=&#8221;url:https%3A%2F%2Fwww.whysecurity.it%2Fen%2Ftransizione-40%2F|title:Video%20intelligence&#8221;][\/vc_icon][vc_custom_heading text=&#8221;TRANSITION 4.0&#8243; font_container=&#8221;tag:h4|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeIn&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_icon type=&#8221;material&#8221; icon_material=&#8221;vc-material vc-material-blur_on&#8221; color=&#8221;custom&#8221; background_style=&#8221;rounded&#8221; background_color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221; custom_color=&#8221;#ffffff&#8221; custom_background_color=&#8221;#e78214&#8243; css=&#8221;.vc_custom_1679502377857{margin-bottom: 20px !important;}&#8221; link=&#8221;url:https%3A%2F%2Fwww.whysecurity.it%2Fen%2Fsicurezza-centralizzata%2F|title:Sicurezza%20centralizzata&#8221;][\/vc_icon][vc_custom_heading text=&#8221;CENTRALIZED SECURITY&#8221; font_container=&#8221;tag:h4|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeIn&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_icon type=&#8221;material&#8221; icon_material=&#8221;vc-material vc-material-mail_outline&#8221; color=&#8221;custom&#8221; background_style=&#8221;rounded&#8221; background_color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221; custom_color=&#8221;#ffffff&#8221; custom_background_color=&#8221;#e78214&#8243; css=&#8221;.vc_custom_1679502387299{margin-bottom: 20px !important;}&#8221; link=&#8221;url:https%3A%2F%2Fwww.whysecurity.it%2Fen%2Fsicurezza-email%2F|title:Sicurezza%20Email&#8221;][\/vc_icon][vc_custom_heading text=&#8221;E-MAIL SECURITY&#8221; font_container=&#8221;tag:h4|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeIn&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_icon type=&#8221;material&#8221; icon_material=&#8221;vc-material vc-material-screen_share&#8221; color=&#8221;custom&#8221; background_style=&#8221;rounded&#8221; background_color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css_animation=&#8221;fadeIn&#8221; custom_color=&#8221;#ffffff&#8221; custom_background_color=&#8221;#e78214&#8243; css=&#8221;.vc_custom_1679502397064{margin-bottom: 20px !important;}&#8221; link=&#8221;url:https%3A%2F%2Fwww.whysecurity.it%2Fen%2Fservizi-noc-soc%2F|title:Servizi%20di%20NOC%20e%20SOC&#8221;][\/vc_icon][vc_custom_heading text=&#8221;NOC &amp; SOC SERVICES&#8221; font_container=&#8221;tag:h4|text_align:center&#8221; use_theme_fonts=&#8221;yes&#8221; css_animation=&#8221;fadeIn&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][vc_column 0=&#8221;&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; content_placement=&#8221;middle&#8221; css_animation=&#8221;none&#8221; ppadding=&#8221;vc_row-padding-both&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1617706090610{background-color: #f6f6f5 !important;}&#8221;][vc_column width=&#8221;2\/3&#8243; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; offset=&#8221;vc_col-lg-6 vc_col-md-6 vc_col-xs-12&#8243;][vc_custom_heading text=&#8221;SECURITY TRUST GROUP&#8221; font_container=&#8221;tag:h3|font_size:18|text_align:left|color:%23183346&#8243; google_fonts=&#8221;font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css_animation=&#8221;none&#8221; css=&#8221;.vc_custom_1618482378901{padding-bottom: 15px !important;}&#8221;][vc_column_text 0=&#8221;&#8221; css_animation=&#8221;none&#8221;]Whysecurity is part of the Security Trust Group, the ideal partner in the field of security, physical and logical, able to offer a highly specialized service. [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-home.php","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security &amp; Cyber Vigilance - Whysecurity | Contact us for Business Consulting<\/title>\n<meta name=\"description\" content=\"Whysecurity guarantees the delivery of efficient cyber security services, integrated security and cyber vigilance systems by making the use of leading-edge technologies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.whysecurity.it\/en\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security &amp; Cyber Vigilance - Whysecurity | Contact us for Business Consulting\" \/>\n<meta property=\"og:description\" content=\"Whysecurity guarantees the delivery of efficient cyber security services, integrated security and cyber vigilance systems by making the use of leading-edge technologies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.whysecurity.it\/en\/\" \/>\n<meta property=\"og:site_name\" content=\"Why Security\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-23T12:55:31+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.whysecurity.it\/en\/\",\"url\":\"https:\/\/www.whysecurity.it\/en\/\",\"name\":\"Cyber Security & Cyber Vigilance - Whysecurity | Contact us for Business Consulting\",\"isPartOf\":{\"@id\":\"https:\/\/www.whysecurity.it\/it\/#website\"},\"datePublished\":\"2023-03-16T13:55:23+00:00\",\"dateModified\":\"2023-03-23T12:55:31+00:00\",\"description\":\"Whysecurity guarantees the delivery of efficient cyber security services, integrated security and cyber vigilance systems by making the use of leading-edge technologies.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.whysecurity.it\/en\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.whysecurity.it\/en\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.whysecurity.it\/en\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.whysecurity.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.whysecurity.it\/it\/#website\",\"url\":\"https:\/\/www.whysecurity.it\/it\/\",\"name\":\"Why Security\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.whysecurity.it\/it\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security & Cyber Vigilance - Whysecurity | Contact us for Business Consulting","description":"Whysecurity guarantees the delivery of efficient cyber security services, integrated security and cyber vigilance systems by making the use of leading-edge technologies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.whysecurity.it\/en\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security & Cyber Vigilance - Whysecurity | Contact us for Business Consulting","og_description":"Whysecurity guarantees the delivery of efficient cyber security services, integrated security and cyber vigilance systems by making the use of leading-edge technologies.","og_url":"https:\/\/www.whysecurity.it\/en\/","og_site_name":"Why Security","article_modified_time":"2023-03-23T12:55:31+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.whysecurity.it\/en\/","url":"https:\/\/www.whysecurity.it\/en\/","name":"Cyber Security & Cyber Vigilance - Whysecurity | Contact us for Business Consulting","isPartOf":{"@id":"https:\/\/www.whysecurity.it\/it\/#website"},"datePublished":"2023-03-16T13:55:23+00:00","dateModified":"2023-03-23T12:55:31+00:00","description":"Whysecurity guarantees the delivery of efficient cyber security services, integrated security and cyber vigilance systems by making the use of leading-edge technologies.","breadcrumb":{"@id":"https:\/\/www.whysecurity.it\/en\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.whysecurity.it\/en\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.whysecurity.it\/en\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.whysecurity.it\/en\/"},{"@type":"ListItem","position":2,"name":"Home"}]},{"@type":"WebSite","@id":"https:\/\/www.whysecurity.it\/it\/#website","url":"https:\/\/www.whysecurity.it\/it\/","name":"Why Security","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.whysecurity.it\/it\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16088"}],"collection":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/comments?post=16088"}],"version-history":[{"count":12,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16088\/revisions"}],"predecessor-version":[{"id":16171,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16088\/revisions\/16171"}],"wp:attachment":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/media?parent=16088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}