{"id":14008,"date":"2024-05-19T18:27:09","date_gmt":"2024-05-19T18:27:09","guid":{"rendered":"https:\/\/www.telda.it\/it\/?page_id=14008"},"modified":"2024-05-31T10:58:35","modified_gmt":"2024-05-31T10:58:35","slug":"vulnerability-assessment","status":"publish","type":"page","link":"https:\/\/www.telda.it\/it\/vulnerability-assessment\/","title":{"rendered":"Vulnerability Assessment"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; next_background_color=&#8221;#FFFFFF&#8221; admin_label=&#8221;Header&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#92a5ab&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;90deg&#8221; background_color_gradient_stops=&#8221;rgba(0,0,0,0) 50%|#92a5ab 50%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_color_gradient_start=&#8221;rgba(0,0,0,0)&#8221; background_color_gradient_start_position=&#8221;50%&#8221; background_color_gradient_end=&#8221;#92a5ab&#8221; background_color_gradient_end_position=&#8221;50%&#8221; background_image=&#8221;https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/11\/estate-planning-77.png&#8221; background_position=&#8221;top_left&#8221; custom_padding=&#8221;||||false|false&#8221; bottom_divider_style=&#8221;slant&#8221; bottom_divider_height=&#8221;10vw&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-af512a5f-530a-4e80-bfc4-3632d9174c8b%22:%91%93,%22gcid-b593ef39-6aba-4318-8d2d-133b31113704%22:%91%93}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;10%||8vw||false|false&#8221; custom_padding_tablet=&#8221;0vw||0vw||true|false&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#000000&#8243; divider_weight=&#8221;5px&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;50px&#8221; custom_margin=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;b3e3ff14-5f5c-4608-8ecf-1885ce3da7aa&#8221; header_font=&#8221;DM Serif Display||||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;70px&#8221; header_line_height=&#8221;1.1em&#8221; custom_margin=&#8221;||10px||false|false&#8221; header_font_size_tablet=&#8221;40px&#8221; header_font_size_phone=&#8221;24px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Vulnerability Assessment<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;da86b6f0-f83c-4c7c-bdd8-3019777ddffe&#8221; text_font=&#8221;Josefin Sans||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;15px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Effettua un Vulnerability Assessment per prevenire le minaccie, scopri le vulnerabilit\u00e0 nei tuoi sistemi in modo da poterle eliminare prima che queste vengano sfruttate da malintenzionati.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;94303537-339d-484d-8204-fdaf972d663a&#8221; header_font=&#8221;||||||||&#8221; header_3_font=&#8221;DM Serif Display||||||||&#8221; header_3_text_color=&#8221;#000000&#8243; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;||30px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; header_3_font_size_tablet=&#8221;20px&#8221; header_3_font_size_phone=&#8221;16px&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>A partire da \u20ac 500,00<\/h3>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.telda.it\/it\/consulenza-informatica\/&#8221; button_text=&#8221;Richiedi un Preventivo&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;4449fc3b-b2e1-457d-bd50-c55d5be30f46&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;20px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#000000&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;50px&#8221; button_letter_spacing=&#8221;2px&#8221; button_font=&#8221;Josefin Sans|700|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; custom_padding=&#8221;16px|40px|16px|40px|true|true&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/11\/estate-planning-09.png&#8221; title_text=&#8221;estate-planning-09&#8243; align=&#8221;right&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-40%||||false|false&#8221; custom_margin_tablet=&#8221;0%||||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.telda.it\/it\/wp-content\/uploads\/2024\/05\/estate-planning-30.jpg&#8221; alt=&#8221;Vulnerability Assessment&#8221; title_text=&#8221;Vulnerability Assessment&#8221; align=&#8221;right&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-40%||||false|false&#8221; custom_margin_tablet=&#8221;||||false|false&#8221; custom_margin_phone=&#8221;-80%||||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; border_radii=&#8221;on|50%|50%|50%|50%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/11\/estate-planning-10.png&#8221; title_text=&#8221;estate-planning-10&#8243; align=&#8221;right&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-40%||||false|false&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;-80%||||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;About&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;90865f4d-2cce-42a7-b40e-d3fbad25605a&#8221; header_2_font=&#8221;DM Serif Display||||||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;48px&#8221; header_2_line_height=&#8221;1.2em&#8221; custom_margin=&#8221;||10px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Overview<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;da86b6f0-f83c-4c7c-bdd8-3019777ddffe&#8221; text_font=&#8221;Josefin Sans||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.6em&#8221; module_alignment=&#8221;center&#8221; text_font_size_tablet=&#8221;15px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Nell\u2019ultimo anno sono stati registrati 2.779 incidenti in Italia, il numero pi\u00f9 alto di sempre.<\/p>\n<p>I settori pi\u00f9 colpiti sono la sanit\u00e0, la finanza e il manufatturiero, ma nessuna azienda pu\u00f2 ritenersi al sicuro, in quanto anche una configurazione errata o un mancato aggiornamento possono esporre l\u2019azienda ad attacchi informatici visto che i malintenzionati sfruttano proprio le vulnerabilit\u00e0 presenti nei sistemi per sferrare i propri attacchi.<\/p>\n<p>Un Vulnerability Assessment \u00e8 il processo di test che identifica difetti di sicurezza a cui vengono assegnati livelli di gravit\u00e0. Questo processo pu\u00f2 comportare tecniche automatizzate e\/o manuali utilizzando un approccio basato sul rischio. Le valutazioni sulle vulnerabilit\u00e0 possono essere effettuate su diversi livelli di tecnologia, i pi\u00f9 comuni sono a livello di host, rete e applicazione.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;94303537-339d-484d-8204-fdaf972d663a&#8221; header_font=&#8221;||||||||&#8221; header_3_font=&#8221;DM Serif Display||||||||&#8221; header_3_text_color=&#8221;#000000&#8243; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; header_3_font_size_tablet=&#8221;20px&#8221; header_3_font_size_phone=&#8221;16px&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Benefici<\/h3>\n<p>[\/et_pb_text][et_pb_blurb title=&#8221;Trova le Vulnerabilit\u00e0&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x35;||divi||400&#8243; icon_color=&#8221;#000000&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Josefin Sans||||||||&#8221; header_font_size=&#8221;16px&#8221; header_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;||0px||false|false&#8221; header_font_size_tablet=&#8221;15px&#8221; header_font_size_phone=&#8221;14px&#8221; header_font_size_last_edited=&#8221;on|tablet&#8221; icon_font_size=&#8221;24px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Scopri come Risolverle&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x35;||divi||400&#8243; icon_color=&#8221;#000000&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Josefin Sans||||||||&#8221; header_font_size=&#8221;16px&#8221; header_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;||0px||false|false&#8221; header_font_size_tablet=&#8221;15px&#8221; header_font_size_phone=&#8221;14px&#8221; header_font_size_last_edited=&#8221;on|tablet&#8221; icon_font_size=&#8221;24px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Difendi la tua reputazione&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x35;||divi||400&#8243; icon_color=&#8221;#000000&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Josefin Sans||||||||&#8221; header_font_size=&#8221;16px&#8221; header_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;||0px||false|false&#8221; header_font_size_tablet=&#8221;15px&#8221; header_font_size_phone=&#8221;14px&#8221; header_font_size_last_edited=&#8221;on|tablet&#8221; icon_font_size=&#8221;24px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Proteggi i dati&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x35;||divi||400&#8243; icon_color=&#8221;#000000&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Josefin Sans||||||||&#8221; header_font_size=&#8221;16px&#8221; header_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;||0px||false|false&#8221; header_font_size_tablet=&#8221;15px&#8221; header_font_size_phone=&#8221;14px&#8221; header_font_size_last_edited=&#8221;on|tablet&#8221; icon_font_size=&#8221;24px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Evita multe dal Garante Privacy&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x35;||divi||400&#8243; icon_color=&#8221;#000000&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Josefin Sans||||||||&#8221; header_font_size=&#8221;16px&#8221; header_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;||0px||false|false&#8221; header_font_size_tablet=&#8221;15px&#8221; header_font_size_phone=&#8221;14px&#8221; header_font_size_last_edited=&#8221;on|tablet&#8221; icon_font_size=&#8221;24px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_blurb title=&#8221;Metti al sicuro il tuo Business&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#x35;||divi||400&#8243; icon_color=&#8221;#000000&#8243; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;24px&#8221; content_max_width=&#8221;100%&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Josefin Sans||||||||&#8221; header_font_size=&#8221;16px&#8221; header_line_height=&#8221;1.8em&#8221; custom_margin=&#8221;||0px||false|false&#8221; header_font_size_tablet=&#8221;15px&#8221; header_font_size_phone=&#8221;14px&#8221; header_font_size_last_edited=&#8221;on|tablet&#8221; icon_font_size=&#8221;24px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blurb][et_pb_image src=&#8221;https:\/\/www.telda.it\/it\/wp-content\/uploads\/2022\/07\/CEH-logo.jpg&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; alt=&#8221;Certified Ethical Hacker&#8221; title_text=&#8221;Certified Ethical Hacker&#8221; width=&#8221;50%&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; prev_background_color=&#8221;#FFFFFF&#8221; admin_label=&#8221;How It Works&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#E8E8E9&#8243; background_image=&#8221;https:\/\/www.telda.it\/it\/wp-content\/uploads\/2021\/11\/estate-planning-76.png&#8221; background_size=&#8221;initial&#8221; top_divider_style=&#8221;slant&#8221; top_divider_height=&#8221;10vw&#8221; top_divider_flip=&#8221;horizontal&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;90865f4d-2cce-42a7-b40e-d3fbad25605a&#8221; header_2_font=&#8221;DM Serif Display||||||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_2_font_size=&#8221;48px&#8221; header_2_line_height=&#8221;1.2em&#8221; max_width=&#8221;700px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||10px||false|false&#8221; header_2_font_size_tablet=&#8221;32px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Come Funziona<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;da86b6f0-f83c-4c7c-bdd8-3019777ddffe&#8221; text_font=&#8221;Josefin Sans||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.6em&#8221; module_alignment=&#8221;center&#8221; text_font_size_tablet=&#8221;15px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Per prima cosa bisogna stabilire l&#8217;ambito del Vulnerability Assessment cio\u00e8 identificare il sistema, la rete, l&#8217;applicazione o l&#8217;intera organizzazione. Di seguito i tre principali obiettivi di un Vulnerability Assessment<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#92a5ab&#8221; custom_padding=&#8221;50px|80px|50px|80px|true|true&#8221; custom_padding_tablet=&#8221;40px|30px|40px|30px|true|true&#8221; custom_padding_phone=&#8221;|20px||20px|true|true&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; border_radii=&#8221;on|15px|15px|15px|15px&#8221; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;15px&#8221; box_shadow_vertical=&#8221;42px&#8221; box_shadow_blur=&#8221;60px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;rgba(0,0,0,0.08)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;DM Serif Display||||||||&#8221; text_text_color=&#8221;rgba(0,0,0,0.1)&#8221; text_font_size=&#8221;48px&#8221; text_line_height=&#8221;1.1em&#8221; header_font=&#8221;DM Serif Display||||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;70px&#8221; header_line_height=&#8221;1.1em&#8221; custom_margin=&#8221;||10px||false|false&#8221; header_font_size_tablet=&#8221;40px&#8221; header_font_size_phone=&#8221;24px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]01[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;94303537-339d-484d-8204-fdaf972d663a&#8221; header_font=&#8221;||||||||&#8221; header_3_font=&#8221;DM Serif Display||||||||&#8221; header_3_text_color=&#8221;#000000&#8243; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; header_3_font_size_tablet=&#8221;20px&#8221; header_3_font_size_phone=&#8221;16px&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Identifica le vulnerabilit\u00e0<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;da86b6f0-f83c-4c7c-bdd8-3019777ddffe&#8221; text_font=&#8221;Josefin Sans||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;15px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Queste possono andare da critici difetti di progettazione a semplici errori di configurazione.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_5,3_5,1_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#d2d6e3&#8243; custom_padding=&#8221;50px|80px|50px|80px|true|true&#8221; custom_padding_tablet=&#8221;40px|30px|40px|30px|true|true&#8221; custom_padding_phone=&#8221;|20px||20px|true|true&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; border_radii=&#8221;on|15px|15px|15px|15px&#8221; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;15px&#8221; box_shadow_vertical=&#8221;42px&#8221; box_shadow_blur=&#8221;60px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;rgba(0,0,0,0.08)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;DM Serif Display||||||||&#8221; text_text_color=&#8221;rgba(0,0,0,0.1)&#8221; text_font_size=&#8221;48px&#8221; text_line_height=&#8221;1.1em&#8221; header_font=&#8221;DM Serif Display||||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;70px&#8221; header_line_height=&#8221;1.1em&#8221; custom_margin=&#8221;||10px||false|false&#8221; header_font_size_tablet=&#8221;40px&#8221; header_font_size_phone=&#8221;24px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]02[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;94303537-339d-484d-8204-fdaf972d663a&#8221; header_font=&#8221;||||||||&#8221; header_3_font=&#8221;DM Serif Display||||||||&#8221; header_3_text_color=&#8221;#000000&#8243; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; header_3_font_size_tablet=&#8221;20px&#8221; header_3_font_size_phone=&#8221;16px&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Analisi<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;da86b6f0-f83c-4c7c-bdd8-3019777ddffe&#8221; text_font=&#8221;Josefin Sans||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;15px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Analisi dei risultati per distinguere i falsi positivi dai veri problemi di sicurezza, le vulnerabilit\u00e0 identificate vengono valutate in base alla loro gravit\u00e0, impatto potenziale e sfruttabilit\u00e0.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;50px|80px|50px|80px|true|true&#8221; custom_padding_tablet=&#8221;40px|30px|40px|30px|true|true&#8221; custom_padding_phone=&#8221;|20px||20px|true|true&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; border_radii=&#8221;on|15px|15px|15px|15px&#8221; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;15px&#8221; box_shadow_vertical=&#8221;42px&#8221; box_shadow_blur=&#8221;60px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;rgba(0,0,0,0.08)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;DM Serif Display||||||||&#8221; text_text_color=&#8221;rgba(0,0,0,0.1)&#8221; text_font_size=&#8221;48px&#8221; text_line_height=&#8221;1.1em&#8221; header_font=&#8221;DM Serif Display||||||||&#8221; header_text_color=&#8221;#000000&#8243; header_font_size=&#8221;70px&#8221; header_line_height=&#8221;1.1em&#8221; custom_margin=&#8221;||10px||false|false&#8221; header_font_size_tablet=&#8221;40px&#8221; header_font_size_phone=&#8221;24px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]03[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;94303537-339d-484d-8204-fdaf972d663a&#8221; header_font=&#8221;||||||||&#8221; header_3_font=&#8221;DM Serif Display||||||||&#8221; header_3_text_color=&#8221;#000000&#8243; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;||5px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; header_3_font_size_tablet=&#8221;20px&#8221; header_3_font_size_phone=&#8221;16px&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Report<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;da86b6f0-f83c-4c7c-bdd8-3019777ddffe&#8221; text_font=&#8221;Josefin Sans||||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;16px&#8221; text_line_height=&#8221;1.6em&#8221; text_font_size_tablet=&#8221;15px&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>Stesura di report dettagliati che elencano le vulnerabilit\u00e0 trovate con indicazioni della gravit\u00e0 e su come mitigarle o risolverle.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 style=\"text-align: center;\">Vulnerability Assessment<\/h3>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.telda.it\/it\/consulenza-informatica\/&#8221; button_text=&#8221;Richiedi un Preventivo&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#0C71C3&#8243; button_border_color=&#8221;#0C71C3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Approfondisci l&#8217;importanza della sicurezza dei dati sul sito del <a href=\"https:\/\/www.garanteprivacy.it\/home\/autorita\">Garante Privacy<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability AssessmentEffettua un Vulnerability Assessment per prevenire le minaccie, scopri le vulnerabilit\u00e0 nei tuoi sistemi in modo da poterle eliminare prima che queste vengano sfruttate da malintenzionati.A partire da \u20ac 500,00OverviewNell\u2019ultimo anno sono stati registrati 2.779 incidenti in Italia, il numero pi\u00f9 alto di sempre. I settori pi\u00f9 colpiti sono la sanit\u00e0, la finanza e [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:divi\/placeholder \/-->","_et_gb_content_width":"","footnotes":""},"class_list":["post-14008","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Assessment - Telda - Telecom &amp; Data Protection<\/title>\n<meta name=\"description\" content=\"Vulnerability Assessment \u00e8 il processoutilizzato per identificare e assegnare livelli di gravit\u00e0 a difetti di sicurezza\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.telda.it\/it\/vulnerability-assessment\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Assessment - Telda - Telecom &amp; Data Protection\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Assessment \u00e8 il processoutilizzato per identificare e assegnare livelli di gravit\u00e0 a difetti di sicurezza\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.telda.it\/it\/vulnerability-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"Telda - Telecom &amp; Data Protection\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-31T10:58:35+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.telda.it\/it\/vulnerability-assessment\/\",\"url\":\"https:\/\/www.telda.it\/it\/vulnerability-assessment\/\",\"name\":\"Vulnerability Assessment - Telda - Telecom &amp; Data Protection\",\"isPartOf\":{\"@id\":\"https:\/\/www.telda.it\/it\/#website\"},\"datePublished\":\"2024-05-19T18:27:09+00:00\",\"dateModified\":\"2024-05-31T10:58:35+00:00\",\"description\":\"Vulnerability Assessment \u00e8 il processoutilizzato per identificare e assegnare livelli di gravit\u00e0 a difetti di sicurezza\",\"breadcrumb\":{\"@id\":\"https:\/\/www.telda.it\/it\/vulnerability-assessment\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.telda.it\/it\/vulnerability-assessment\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.telda.it\/it\/vulnerability-assessment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.telda.it\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Assessment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.telda.it\/it\/#website\",\"url\":\"https:\/\/www.telda.it\/it\/\",\"name\":\"Telda - Telecom & Data Protection\",\"description\":\"IT Company\",\"publisher\":{\"@id\":\"https:\/\/www.telda.it\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.telda.it\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.telda.it\/it\/#organization\",\"name\":\"TELDA\",\"url\":\"https:\/\/www.telda.it\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.telda.it\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/03\/logoTeldaT114.png\",\"contentUrl\":\"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/03\/logoTeldaT114.png\",\"width\":114,\"height\":114,\"caption\":\"TELDA\"},\"image\":{\"@id\":\"https:\/\/www.telda.it\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/telda_it\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Assessment - Telda - Telecom &amp; Data Protection","description":"Vulnerability Assessment \u00e8 il processoutilizzato per identificare e assegnare livelli di gravit\u00e0 a difetti di sicurezza","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.telda.it\/it\/vulnerability-assessment\/","og_locale":"it_IT","og_type":"article","og_title":"Vulnerability Assessment - Telda - Telecom &amp; Data Protection","og_description":"Vulnerability Assessment \u00e8 il processoutilizzato per identificare e assegnare livelli di gravit\u00e0 a difetti di sicurezza","og_url":"https:\/\/www.telda.it\/it\/vulnerability-assessment\/","og_site_name":"Telda - Telecom &amp; Data Protection","article_modified_time":"2024-05-31T10:58:35+00:00","twitter_card":"summary_large_image","twitter_misc":{"Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.telda.it\/it\/vulnerability-assessment\/","url":"https:\/\/www.telda.it\/it\/vulnerability-assessment\/","name":"Vulnerability Assessment - Telda - Telecom &amp; Data Protection","isPartOf":{"@id":"https:\/\/www.telda.it\/it\/#website"},"datePublished":"2024-05-19T18:27:09+00:00","dateModified":"2024-05-31T10:58:35+00:00","description":"Vulnerability Assessment \u00e8 il processoutilizzato per identificare e assegnare livelli di gravit\u00e0 a difetti di sicurezza","breadcrumb":{"@id":"https:\/\/www.telda.it\/it\/vulnerability-assessment\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.telda.it\/it\/vulnerability-assessment\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.telda.it\/it\/vulnerability-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.telda.it\/it\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Assessment"}]},{"@type":"WebSite","@id":"https:\/\/www.telda.it\/it\/#website","url":"https:\/\/www.telda.it\/it\/","name":"Telda - Telecom & Data Protection","description":"IT Company","publisher":{"@id":"https:\/\/www.telda.it\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.telda.it\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.telda.it\/it\/#organization","name":"TELDA","url":"https:\/\/www.telda.it\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.telda.it\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/03\/logoTeldaT114.png","contentUrl":"https:\/\/www.telda.it\/it\/wp-content\/uploads\/2019\/03\/logoTeldaT114.png","width":114,"height":114,"caption":"TELDA"},"image":{"@id":"https:\/\/www.telda.it\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/telda_it"]}]}},"_links":{"self":[{"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/pages\/14008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/comments?post=14008"}],"version-history":[{"count":13,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/pages\/14008\/revisions"}],"predecessor-version":[{"id":14061,"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/pages\/14008\/revisions\/14061"}],"wp:attachment":[{"href":"https:\/\/www.telda.it\/it\/wp-json\/wp\/v2\/media?parent=14008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}