{"id":32828,"date":"2024-06-18T11:45:30","date_gmt":"2024-06-18T10:45:30","guid":{"rendered":"https:\/\/cybersecservices.ch\/?page_id=32828"},"modified":"2025-05-12T15:16:27","modified_gmt":"2025-05-12T14:16:27","slug":"cubo-building","status":"publish","type":"page","link":"https:\/\/cybersecservices.ch\/en\/cubo-building\/","title":{"rendered":"CUBO Building"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;rgba(255, 255, 255, 0.66) 61%|rgba(255,255,255,0.66) 75%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/05\/Sfondo-hero-css.jpg&#8221; background_enable_video_mp4=&#8221;off&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;100px||100px||true|false&#8221; custom_padding_tablet=&#8221;60px||75px||false|false&#8221; custom_padding_phone=&#8221;40px||40px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;95%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;1125px&#8221; max_width_tablet=&#8221;2560%&#8221; max_width_phone=&#8221;2560%&#8221; max_width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||||true|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; animation_direction=&#8221;right&#8221; border_color_bottom=&#8221;rgba(0,0,0,0.33)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;1100ms&#8221; animation_intensity_slide=&#8221;22%&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text disabled_on=&#8221;on|on|on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Poppins|700|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;35px&#8221; background_color=&#8221;#EC8F0E&#8221; text_orientation=&#8221;center&#8221; width=&#8221;47px&#8221; module_alignment=&#8221;left&#8221; height=&#8221;47px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;7px||||false|true&#8221; custom_padding_tablet=&#8221;7px||7px||true|true&#8221; custom_padding_phone=&#8221;8px||8px||true|true&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;40px&#8221; text_font_size_phone=&#8221;32px&#8221; text_font_size_last_edited=&#8221;on|tablet&#8221; border_radii=&#8221;on|3008px|3008px|3008px|3008px&#8221; disabled=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]1<br \/>\n[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_text_color=&#8221;#19191b&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_font_size=&#8221;35px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;35px&#8221; min_height=&#8221;130.1px&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_margin_tablet=&#8221;0px||35px||false|false&#8221; custom_margin_phone=&#8221;0px||35px||false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; border_color_left=&#8221;#EC8F0E&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>CUBO Building<\/h2>\n<p>CUBO Building is an offering tailored to meet the needs of any type of customer from Large, Medium, and Small Businesses. It is a block construction, like bricks.<\/p>\n<p>The goal is to provide, after an analysis of needs and IT infrastructure, the most suitable and complementary tools for perfecting Information Security, designed and created in collaboration with your Company.<\/p>\n<p>The concept behind our Managed Service is that of BYOT (Bring Your Own Technology) which allows you to enhance every technological tool already present in your Business Asset.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_duration=&#8221;1100ms&#8221; animation_intensity_slide=&#8221;22%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2025\/01\/CUBO-Building.png&#8221; title_text=&#8221;CUBO Building&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_css_after=&#8221;content: &#8221;;|| position: absolute;|| width: 40px;|| height: 30vh;|| bottom: 7vh;||background-color: #EC8F0E;&#8221; global_colors_info=&#8221;{}&#8221; custom_css_after_last_edited=&#8221;on|phone&#8221; custom_css_after_tablet=&#8221;content: &#8221;;|| position: absolute;|| width: 20px;|| height: 30vh;|| bottom: 7vh;||background-color: #EC8F0E;&#8221; custom_css_after_phone=&#8221;content: &#8221;;|| position: absolute;|| width: 15px;|| height: 20vh;|| bottom: 7vh;||background-color: #EC8F0E;&#8221;][\/et_pb_image][et_pb_divider color=&#8221;#dadbda&#8221; divider_weight=&#8221;36px&#8221; divider_weight_tablet=&#8221;36px&#8221; divider_weight_phone=&#8221;20px&#8221; divider_weight_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; transform_scale_linked=&#8221;off&#8221; transform_translate=&#8221;4vh|0px&#8221; transform_translate_linked=&#8221;off&#8221; max_width=&#8221;68%&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; module_id=&#8221;protezione&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f2f2f2&#8243; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;100px||100px||true|false&#8221; custom_padding_tablet=&#8221;60px||60px||true|false&#8221; custom_padding_phone=&#8221;35px||0px||false|false&#8221; border_color_top=&#8221;rgba(116,116,116,0.34)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;95%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;1301px&#8221; max_width_tablet=&#8221;2560%&#8221; max_width_phone=&#8221;2560%&#8221; max_width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; animation_direction=&#8221;right&#8221; border_color_bottom=&#8221;rgba(0,0,0,0.33)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_text_color=&#8221;#EC8F0E&#8221; text_line_height=&#8221;1.4em&#8221; header_2_font_size=&#8221;35px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_text_color=&#8221;#EC8F0E&#8221; header_3_font_size=&#8221;30px&#8221; max_width=&#8221;75%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_margin_tablet=&#8221;0px||35px||false|false&#8221; custom_margin_phone=&#8221;0px||35px||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; animation_style=&#8221;fade&#8221; animation_duration=&#8221;1250ms&#8221; text_font_size_tablet=&#8221;25px&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;21px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;25px&#8221; header_3_font_size_phone=&#8221;20px&#8221; header_3_font_size_last_edited=&#8221;on|tablet&#8221; border_color_left=&#8221;#EC8F0E&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3 style=\"text-align: center;\">Here is the list of our Services, through which we can build your ad hoc Defense:<\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;95%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;1125px&#8221; max_width_tablet=&#8221;2560%&#8221; max_width_phone=&#8221;2560%&#8221; max_width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||||true|false&#8221; custom_padding=&#8221;60px||60px||true|false&#8221; animation_direction=&#8221;right&#8221; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;rgba(0,0,0,0.13)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/sos-syber-attack.jpg&#8221; title_text=&#8221;sos syber attack&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;1300ms&#8221; animation_intensity_slide=&#8221;15%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_duration=&#8221;1300ms&#8221; animation_intensity_slide=&#8221;15%&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_text_color=&#8221;#19191b&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;25px&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; animation_direction=&#8221;right&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;20px&#8221; header_3_font_size_phone=&#8221;20px&#8221; header_3_font_size_last_edited=&#8221;on|tablet&#8221; border_color_left=&#8221;#EC8F0E&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h3>SOS Cyber Attack<\/h3>\n<p>The service includes the definition and construction of the Cybersecurity Crisis Management Plan (CCMP) and 24\/7 operational intervention. Assistance is provided by qualified personnel specialised in managing cyber emergencies, available either on-site or remotely, depending on the severity and nature of the incident.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;95%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;1125px&#8221; max_width_tablet=&#8221;2560%&#8221; max_width_phone=&#8221;2560%&#8221; max_width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||||true|false&#8221; custom_padding=&#8221;60px||60px||true|false&#8221; animation_direction=&#8221;right&#8221; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;rgba(0,0,0,0.13)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/extended-detection-and-response.jpg&#8221; title_text=&#8221;extended detection and response&#8221; disabled_on=&#8221;off|off|on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_duration=&#8221;1300ms&#8221; animation_intensity_slide=&#8221;15%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_text_color=&#8221;#19191b&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;25px&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; animation_direction=&#8221;left&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;20px&#8221; header_3_font_size_phone=&#8221;20px&#8221; header_3_font_size_last_edited=&#8221;on|tablet&#8221; border_color_left=&#8221;#EC8F0E&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>XDR Extended Detection and Response<\/h3>\n<p>XDR is a security solution that extends and integrates threat detection and response capabilities beyond traditional endpoints to include networks, cloud, and email. This technology uses advanced data analytics and artificial intelligence to provide comprehensive visibility and improve the ability to prevent, detect, and respond to cyber threats in a more effective and coordinated manner;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/extended-detection-and-response.jpg&#8221; title_text=&#8221;extended detection and response&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_duration=&#8221;1300ms&#8221; animation_intensity_slide=&#8221;15%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;95%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;1125px&#8221; max_width_tablet=&#8221;2560%&#8221; max_width_phone=&#8221;2560%&#8221; max_width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||||true|false&#8221; custom_padding=&#8221;60px||60px||true|false&#8221; animation_direction=&#8221;right&#8221; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;rgba(0,0,0,0.13)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/NDR-network-detection-response.jpg&#8221; title_text=&#8221;NDR network detection response&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;1300ms&#8221; animation_intensity_slide=&#8221;15%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_text_color=&#8221;#19191b&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;25px&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; animation_direction=&#8221;right&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;20px&#8221; header_3_font_size_phone=&#8221;20px&#8221; header_3_font_size_last_edited=&#8221;on|tablet&#8221; border_color_left=&#8221;#EC8F0E&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>NDR Network Detection and Response<\/h3>\n<p>NDR is a security technology that focuses on monitoring network traffic and detecting suspicious behavior or anomalies that could show the presence of malware. This tool continuously analyzes data traffic traversing the network, using advanced algorithms and artificial intelligence to show potentially dangerous activities, such as intrusions, malware spread through the network, or data exfiltration attempts;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;95%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;1125px&#8221; max_width_tablet=&#8221;2560%&#8221; max_width_phone=&#8221;2560%&#8221; max_width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||||true|false&#8221; custom_padding=&#8221;60px||60px||true|false&#8221; animation_direction=&#8221;right&#8221; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;rgba(0,0,0,0.13)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/Cyber-security-awareness.jpg&#8221; title_text=&#8221;Cyber security awareness&#8221; disabled_on=&#8221;off|off|on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_duration=&#8221;1300ms&#8221; animation_intensity_slide=&#8221;15%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_text_color=&#8221;#19191b&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;25px&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; animation_direction=&#8221;left&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;20px&#8221; header_3_font_size_phone=&#8221;20px&#8221; header_3_font_size_last_edited=&#8221;on|tablet&#8221; border_color_left=&#8221;#EC8F0E&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>CYBER SECURITY AWARENESS<\/h3>\n<p>Activities and training courses on proper Safety Posture and Best Practices for company personnel on behaviors in the use of computer and network tools;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/Cyber-security-awareness.jpg&#8221; title_text=&#8221;Cyber security awareness&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_duration=&#8221;1300ms&#8221; animation_intensity_slide=&#8221;15%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;95%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;1125px&#8221; max_width_tablet=&#8221;2560%&#8221; max_width_phone=&#8221;2560%&#8221; max_width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||||true|false&#8221; custom_padding=&#8221;60px||60px||true|false&#8221; animation_direction=&#8221;right&#8221; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;rgba(0,0,0,0.13)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/mail-attack-simulation.jpg&#8221; title_text=&#8221;mail attack simulation&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;1300ms&#8221; animation_intensity_slide=&#8221;15%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_text_color=&#8221;#19191b&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;25px&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; animation_direction=&#8221;right&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;20px&#8221; header_3_font_size_phone=&#8221;20px&#8221; header_3_font_size_last_edited=&#8221;on|tablet&#8221; border_color_left=&#8221;#EC8F0E&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>MAIL ATTACK SIMULATION<\/h3>\n<p>A simulated e-mail attack is a security practice in which an organization sends e-mails simulating phishing techniques or other forms of cyber-attacks to its employees to test their awareness and preparedness. The goal is to assess employees&#8217; ability to recognize and respond correctly to email deception attempts, thereby reducing the risk of real security incidents;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;95%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;1125px&#8221; max_width_tablet=&#8221;2560%&#8221; max_width_phone=&#8221;2560%&#8221; max_width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||||true|false&#8221; custom_padding=&#8221;60px||60px||true|false&#8221; animation_direction=&#8221;right&#8221; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;rgba(0,0,0,0.13)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/VM-vulnerability-management.jpg&#8221; title_text=&#8221;VM vulnerability management&#8221; disabled_on=&#8221;off|off|on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_duration=&#8221;1300ms&#8221; animation_intensity_slide=&#8221;15%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_text_color=&#8221;#19191b&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;25px&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; animation_direction=&#8221;left&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;20px&#8221; header_3_font_size_phone=&#8221;20px&#8221; header_3_font_size_last_edited=&#8221;on|tablet&#8221; border_color_left=&#8221;#EC8F0E&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>VM Vulnerability Management<\/h3>\n<p>Vulnerability Management is a proactive process of identifying, classifying, prioritizing, remediating, and mitigating vulnerabilities within an organization&#8217;s information systems;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/VM-vulnerability-management.jpg&#8221; title_text=&#8221;VM vulnerability management&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_duration=&#8221;1300ms&#8221; animation_intensity_slide=&#8221;15%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;95%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;1125px&#8221; max_width_tablet=&#8221;2560%&#8221; max_width_phone=&#8221;2560%&#8221; max_width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||||true|false&#8221; custom_padding=&#8221;60px||60px||true|false&#8221; animation_direction=&#8221;right&#8221; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;rgba(0,0,0,0.13)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/05\/Css-7.jpg&#8221; title_text=&#8221;Css-7&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;1300ms&#8221; animation_intensity_slide=&#8221;15%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_text_color=&#8221;#19191b&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;25px&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; animation_direction=&#8221;right&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;20px&#8221; header_3_font_size_phone=&#8221;20px&#8221; header_3_font_size_last_edited=&#8221;on|tablet&#8221; border_color_left=&#8221;#EC8F0E&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>VA Vulnerability Assessment<\/h3>\n<p>The VA is a security service that performs periodic scans by finding vulnerabilities in computer systems. An ongoing process that ensures timely warning and constant protection;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;95%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;1125px&#8221; max_width_tablet=&#8221;2560%&#8221; max_width_phone=&#8221;2560%&#8221; max_width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||||true|false&#8221; custom_padding=&#8221;60px||60px||true|false&#8221; animation_direction=&#8221;right&#8221; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;rgba(0,0,0,0.13)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/Penetration-test.jpg&#8221; title_text=&#8221;Penetration test&#8221; disabled_on=&#8221;off|off|on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_duration=&#8221;1300ms&#8221; animation_intensity_slide=&#8221;15%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_text_color=&#8221;#19191b&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;25px&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; animation_direction=&#8221;left&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;20px&#8221; header_3_font_size_phone=&#8221;20px&#8221; header_3_font_size_last_edited=&#8221;on|tablet&#8221; border_color_left=&#8221;#EC8F0E&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>PEN TEST Penetration Test<\/h3>\n<p>PEN TEST is a targeted attack simulation designed to exploit vulnerabilities to assess the actual resilience of the system against cyber-attacks. Pen tests are often conducted manually by experts who adopt the perspective of a potential attacker, trying to infiltrate and \u201cpenetrate\u201d system defenses using any vulnerabilities found during the assessment or other techniques;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/Penetration-test.jpg&#8221; title_text=&#8221;Penetration test&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_duration=&#8221;1300ms&#8221; animation_intensity_slide=&#8221;15%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;95%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;1125px&#8221; max_width_tablet=&#8221;2560%&#8221; max_width_phone=&#8221;2560%&#8221; max_width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||||true|false&#8221; custom_padding=&#8221;60px||60px||true|false&#8221; animation_direction=&#8221;right&#8221; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;rgba(0,0,0,0.13)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/05\/Il-perimetro-da-difendere.jpg&#8221; title_text=&#8221;Il perimetro da difendere&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;1300ms&#8221; animation_intensity_slide=&#8221;15%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_text_color=&#8221;#19191b&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;25px&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; animation_direction=&#8221;right&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;20px&#8221; header_3_font_size_phone=&#8221;20px&#8221; header_3_font_size_last_edited=&#8221;on|tablet&#8221; border_color_left=&#8221;#EC8F0E&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>INFRASTRUCTURE HONEYPOT<\/h3>\n<p>Honeypot is a cyber security service based on a digital trap that appears to be a legitimate part of an organization&#8217;s infrastructure but is isolated and closely watched. It allows ongoing intrusions to be investigated and neutralized on a vulnerability created ad hoc to attract hackers and trigger a false-positive-free alert;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;95%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;1125px&#8221; max_width_tablet=&#8221;2560%&#8221; max_width_phone=&#8221;2560%&#8221; max_width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||||true|false&#8221; custom_padding=&#8221;60px||60px||true|false&#8221; animation_direction=&#8221;right&#8221; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;rgba(0,0,0,0.13)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/CTI-cyber-threat-intelligence.jpg&#8221; title_text=&#8221;CTI cyber threat intelligence&#8221; disabled_on=&#8221;off|off|on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_duration=&#8221;1300ms&#8221; animation_intensity_slide=&#8221;15%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_text_color=&#8221;#19191b&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;25px&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; animation_direction=&#8221;left&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;20px&#8221; header_3_font_size_phone=&#8221;20px&#8221; header_3_font_size_last_edited=&#8221;on|tablet&#8221; border_color_left=&#8221;#EC8F0E&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Cyber Threat Intelligence<\/h3>\n<p>The CTI is an advanced radar on the Dark Web that constantly monitors the threat landscape and finds new modes of cyber break-ins. It also contributes to the constant updating of defense systems;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/CTI-cyber-threat-intelligence.jpg&#8221; title_text=&#8221;CTI cyber threat intelligence&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_duration=&#8221;1300ms&#8221; animation_intensity_slide=&#8221;15%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;95%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;85%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;1125px&#8221; max_width_tablet=&#8221;2560%&#8221; max_width_phone=&#8221;2560%&#8221; max_width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;||||true|false&#8221; custom_padding=&#8221;60px||||false|false&#8221; animation_direction=&#8221;right&#8221; border_color_bottom=&#8221;rgba(0,0,0,0.13)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/Attack-surface-management.jpg&#8221; title_text=&#8221;Attack surface management&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;1300ms&#8221; animation_intensity_slide=&#8221;15%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_text_color=&#8221;#19191b&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.4em&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_font_size=&#8221;28px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;25px&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; animation_direction=&#8221;right&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_2_font_size_tablet=&#8221;25px&#8221; header_2_font_size_phone=&#8221;20px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;20px&#8221; header_3_font_size_phone=&#8221;20px&#8221; header_3_font_size_last_edited=&#8221;on|tablet&#8221; border_color_left=&#8221;#EC8F0E&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>ATTACK SURFACE MANAGEMENT<\/h3>\n<p>Attack Surface Management is an ongoing process that organizations use to show, catalog, and watch all exposed IT assets, both internal and external, that could be exploited by an attacker. This includes servers, mobile devices, web applications, APIs, and any other entry points that might be publicly accessible.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#2d2d2d&#8221; width=&#8221;95%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;1125px&#8221; max_width_tablet=&#8221;2560%&#8221; max_width_phone=&#8221;2560%&#8221; max_width_last_edited=&#8221;on|tablet&#8221; custom_margin=&#8221;50px||||false|false&#8221; custom_padding=&#8221;50px|50px|50px|50px|true|true&#8221; custom_padding_tablet=&#8221;50px|50px|50px|50px|false|true&#8221; custom_padding_phone=&#8221;30px|30px|30px|30px|true|true&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_duration=&#8221;1200ms&#8221; animation_intensity_slide=&#8221;6%&#8221; border_color_bottom=&#8221;rgba(0,0,0,0.33)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; max_width__hover_enabled=&#8221;off|desktop&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/Tecnologia-allavanguardia.jpg&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_padding_tablet=&#8221;182px|0px|182px|0px|true|true&#8221; custom_padding_phone=&#8221;108px||108px||true|true&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; border_width_right=&#8221;35px&#8221; border_color_right=&#8221;#2d2d2d&#8221; border_width_right_tablet=&#8221;0px&#8221; border_width_right_phone=&#8221;0px&#8221; border_width_right_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.25.1&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; custom_padding=&#8221;0px|0px|0px|0px|true|true&#8221; custom_css_main_element=&#8221;||display: flex;||flex-direction: column;||justify-content: center;||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|300|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;18px&#8221; text_line_height=&#8221;1.4em&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_text_color=&#8221;#FFFFFF&#8221; header_3_font_size=&#8221;30px&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_margin_tablet=&#8221;32px||29px||false|false&#8221; custom_margin_phone=&#8221;0px||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;16px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;30px&#8221; header_3_font_size_phone=&#8221;20px&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; border_color_left=&#8221;#EC8F0E&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Schedule a meeting<\/h3>\n<p>The CUBO Building solution starts with a free consultation to assess the suitability of this solution for the client concerned.<\/p>\n<p><strong>Having assessed suitability, we go ahead with these steps:<\/strong><\/p>\n<ul>\n<li>First appointment to get to know the infrastructure and the client&#8217;s needs;<\/li>\n<li>Presentation of the technical-economic offer;<\/li>\n<li>Evaluation by the customer;<\/li>\n<li>Possible modifications to the proposed solution;<\/li>\n<li>Implementation and activation of the shared ad hoc solution.<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMyMjk5In19@&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221; Contact us now to schedule a meeting&#8221; button_alignment=&#8221;left&#8221; button_alignment_tablet=&#8221;left&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.27.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;18px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#EC8F0E&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#FFFFFF&#8221; button_border_radius=&#8221;0px&#8221; button_font=&#8221;||||||||&#8221; button_icon=&#8221;&#xe076;||divi||400&#8243; custom_margin=&#8221;17px||||false|false&#8221; custom_margin_tablet=&#8221;17px|||96px|false|false&#8221; custom_margin_phone=&#8221;17px|||0px|false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;11px|19px|11px|19px|true|true&#8221; custom_padding_last_edited=&#8221;off|phone&#8221; button_text_size_tablet=&#8221;18px&#8221; button_text_size_phone=&#8221;16px&#8221; button_text_size_last_edited=&#8221;on|phone&#8221; button_letter_spacing_tablet=&#8221;&#8221; button_letter_spacing_phone=&#8221;-1px&#8221; button_letter_spacing_last_edited=&#8221;on|phone&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover_enabled=&#8221;on|hover&#8221; custom_padding__hover=&#8221;|38px|||true|false&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;RGBA(255,255,255,0)&#8221; button_bg_enable_color__hover=&#8221;on&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1 CUBO Building CUBO Building is an offering tailored to meet the needs of any type of customer from Large, Medium, and Small Businesses. It is a block construction, like bricks. The goal is to provide, after an analysis of needs and IT infrastructure, the most suitable and complementary tools for perfecting Information Security, designed [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p>[et_pb_section fb_built=\"1\" custom_padding_last_edited=\"on|tablet\" disabled_on=\"off|off|off\" _builder_version=\"4.25.2\" _module_preset=\"default\" background_enable_color=\"off\" use_background_color_gradient=\"on\" background_color_gradient_stops=\"rgba(255, 255, 255, 0.66) 61%|rgba(255,255,255,0.66) 75%\" background_color_gradient_overlays_image=\"on\" background_image=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/05\/Sfondo-hero-css.jpg\" background_enable_video_mp4=\"off\" custom_margin=\"0px||0px||false|false\" custom_padding=\"100px||100px||true|false\" custom_padding_tablet=\"60px||75px||false|false\" custom_padding_phone=\"40px||40px||true|false\" locked=\"off\" global_colors_info=\"{}\"][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.25.2\" _module_preset=\"default\" width=\"95%\" width_tablet=\"80%\" width_phone=\"85%\" width_last_edited=\"on|tablet\" max_width=\"1125px\" max_width_tablet=\"2560%\" max_width_phone=\"2560%\" max_width_last_edited=\"on|tablet\" custom_margin=\"||||true|false\" custom_padding=\"0px||0px||true|false\" animation_direction=\"right\" border_color_bottom=\"rgba(0,0,0,0.33)\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" animation_style=\"slide\" animation_direction=\"left\" animation_duration=\"1100ms\" animation_intensity_slide=\"22%\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_text disabled_on=\"on|on|on\" _builder_version=\"4.25.2\" _module_preset=\"default\" text_font=\"Poppins|700|||||||\" text_text_color=\"#FFFFFF\" text_font_size=\"35px\" background_color=\"#EC8F0E\" text_orientation=\"center\" width=\"47px\" module_alignment=\"left\" height=\"47px\" custom_margin=\"||||false|false\" custom_padding=\"7px||||false|true\" custom_padding_tablet=\"7px||7px||true|true\" custom_padding_phone=\"8px||8px||true|true\" custom_padding_last_edited=\"on|desktop\" text_font_size_tablet=\"40px\" text_font_size_phone=\"32px\" text_font_size_last_edited=\"on|tablet\" border_radii=\"on|3008px|3008px|3008px|3008px\" disabled=\"on\" global_colors_info=\"{}\"]<\/p><p>1<\/p><p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_font=\"|300|||||||\" text_text_color=\"#19191b\" text_font_size=\"18px\" text_line_height=\"1.4em\" header_2_font=\"|600|||||||\" header_2_font_size=\"35px\" header_3_font=\"|600|||||||\" header_3_font_size=\"35px\" min_height=\"130.1px\" custom_margin=\"0px||0px||false|false\" custom_margin_tablet=\"0px||35px||false|false\" custom_margin_phone=\"0px||35px||false|false\" custom_margin_last_edited=\"on|tablet\" custom_padding=\"0px||0px||false|false\" text_font_size_tablet=\"18px\" text_font_size_phone=\"16px\" text_font_size_last_edited=\"on|phone\" header_2_font_size_tablet=\"25px\" header_2_font_size_phone=\"20px\" header_2_font_size_last_edited=\"on|phone\" border_color_left=\"#EC8F0E\" global_colors_info=\"{}\"]<\/p><h2>CUBO Building<\/h2><p>CUBO Building \u00e8 l\u2019offerta che risponde in maniera <em>modulabile<\/em> alle esigenze di qualsiasi tipologia di cliente: dalla Grande, alla Media e alla Piccola Impresa.<\/p><p>Una costruzione a blocchi, che ha l\u2019obiettivo di fornire, previa analisi dei bisogni e dell\u2019infrastruttura IT, gli strumenti pi\u00f9 adatti e complementari al <em>perfezionamento della Sicurezza Informatica<\/em>, pensata e creata in collaborazione con il cliente.<\/p><p>Il concetto alla base del nostro Servizio Gestito \u00e8 quello del <em>BYOT - Bring Your Own Technology<\/em>, che permette di valorizzare ogni strumento tecnologico gi\u00e0 presente nell'Asset Aziendale.<\/p><p>\u00a0<\/p><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" animation_style=\"slide\" animation_direction=\"right\" animation_duration=\"1100ms\" animation_intensity_slide=\"22%\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2025\/01\/CUBO-Building.png\" title_text=\"CUBO Building\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||0px||false|false\" custom_css_after=\"content: '';|| position: absolute;|| width: 40px;|| height: 30vh;|| bottom: 7vh;||background-color: #EC8F0E;\" global_colors_info=\"{}\" custom_css_after_last_edited=\"on|phone\" custom_css_after_tablet=\"content: '';|| position: absolute;|| width: 20px;|| height: 30vh;|| bottom: 7vh;||background-color: #EC8F0E;\" custom_css_after_phone=\"content: '';|| position: absolute;|| width: 15px;|| height: 20vh;|| bottom: 7vh;||background-color: #EC8F0E;\"][\/et_pb_image][et_pb_divider color=\"#dadbda\" divider_weight=\"36px\" divider_weight_tablet=\"36px\" divider_weight_phone=\"20px\" divider_weight_last_edited=\"on|phone\" _builder_version=\"4.25.2\" _module_preset=\"default\" background_enable_color=\"off\" transform_scale_linked=\"off\" transform_translate=\"4vh|0px\" transform_translate_linked=\"off\" max_width=\"68%\" module_alignment=\"left\" custom_margin=\"0px||||false|false\" custom_padding=\"0px||0px||true|false\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" custom_padding_last_edited=\"on|tablet\" module_id=\"protezione\" _builder_version=\"4.25.2\" _module_preset=\"default\" background_color=\"#f2f2f2\" custom_margin=\"0px||0px||false|false\" custom_padding=\"100px||100px||true|false\" custom_padding_tablet=\"60px||60px||true|false\" custom_padding_phone=\"35px||0px||false|false\" border_color_top=\"rgba(116,116,116,0.34)\" global_colors_info=\"{}\"][et_pb_row make_equal=\"on\" _builder_version=\"4.25.2\" _module_preset=\"default\" width=\"95%\" width_tablet=\"100%\" width_phone=\"100%\" width_last_edited=\"on|tablet\" max_width=\"1301px\" max_width_tablet=\"2560%\" max_width_phone=\"2560%\" max_width_last_edited=\"on|tablet\" custom_margin=\"||||false|false\" custom_padding=\"||0px||false|false\" animation_direction=\"right\" border_color_bottom=\"rgba(0,0,0,0.33)\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_font=\"||||||||\" text_text_color=\"#EC8F0E\" text_line_height=\"1.4em\" header_2_font_size=\"35px\" header_3_font=\"|600|||||||\" header_3_text_color=\"#EC8F0E\" header_3_font_size=\"30px\" max_width=\"75%\" module_alignment=\"center\" custom_margin=\"0px||0px||false|false\" custom_margin_tablet=\"0px||35px||false|false\" custom_margin_phone=\"0px||35px||false|false\" custom_margin_last_edited=\"off|desktop\" custom_padding=\"0px||0px||false|false\" animation_style=\"fade\" animation_duration=\"1250ms\" text_font_size_tablet=\"25px\" text_font_size_phone=\"16px\" text_font_size_last_edited=\"on|phone\" header_2_font_size_tablet=\"30px\" header_2_font_size_phone=\"21px\" header_2_font_size_last_edited=\"on|phone\" header_3_font_size_tablet=\"25px\" header_3_font_size_phone=\"20px\" header_3_font_size_last_edited=\"on|tablet\" border_color_left=\"#EC8F0E\" global_colors_info=\"{}\"]<\/p><h3 style=\"text-align: center;\">Ecco l\u2019elenco dei Servizi attraverso i quali possiamo costruire la tua Difesa <em>su misura<\/em>:<\/h3><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.25.2\" _module_preset=\"default\" width=\"95%\" width_tablet=\"80%\" width_phone=\"85%\" width_last_edited=\"on|tablet\" max_width=\"1125px\" max_width_tablet=\"2560%\" max_width_phone=\"2560%\" max_width_last_edited=\"on|tablet\" custom_margin=\"||||true|false\" custom_padding=\"60px||60px||true|false\" animation_direction=\"right\" border_width_bottom=\"1px\" border_color_bottom=\"rgba(0,0,0,0.13)\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/sos-syber-attack.jpg\" title_text=\"sos syber attack\" _builder_version=\"4.25.2\" _module_preset=\"default\" animation_style=\"slide\" animation_direction=\"left\" animation_duration=\"1300ms\" animation_intensity_slide=\"15%\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" animation_style=\"slide\" animation_direction=\"right\" animation_duration=\"1300ms\" animation_intensity_slide=\"15%\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.25.2\" _module_preset=\"default\" text_font=\"|300|||||||\" text_text_color=\"#19191b\" text_font_size=\"18px\" text_line_height=\"1.4em\" header_2_font=\"|600|||||||\" header_2_font_size=\"28px\" header_3_font=\"|600|||||||\" header_3_font_size=\"25px\" custom_margin=\"0px||0px||false|false\" custom_margin_tablet=\"0px||||false|false\" custom_margin_phone=\"0px||0px||false|false\" custom_margin_last_edited=\"on|tablet\" custom_padding=\"0px||0px||false|false\" animation_direction=\"right\" text_font_size_tablet=\"18px\" text_font_size_phone=\"16px\" text_font_size_last_edited=\"on|phone\" header_2_font_size_tablet=\"25px\" header_2_font_size_phone=\"20px\" header_2_font_size_last_edited=\"on|phone\" header_3_font_size_tablet=\"20px\" header_3_font_size_phone=\"20px\" header_3_font_size_last_edited=\"on|tablet\" border_color_left=\"#EC8F0E\" locked=\"off\" global_colors_info=\"{}\"]<\/p><h3>SOS Cyber Attack<\/h3><p>Il Servizio di Pronto Intervento Cyber h24 per ogni tipo di attacco informatico.<\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.25.2\" _module_preset=\"default\" width=\"95%\" width_tablet=\"80%\" width_phone=\"85%\" width_last_edited=\"on|tablet\" max_width=\"1125px\" max_width_tablet=\"2560%\" max_width_phone=\"2560%\" max_width_last_edited=\"on|tablet\" custom_margin=\"||||true|false\" custom_padding=\"60px||60px||true|false\" animation_direction=\"right\" border_width_bottom=\"1px\" border_color_bottom=\"rgba(0,0,0,0.13)\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/extended-detection-and-response.jpg\" title_text=\"extended detection and response\" disabled_on=\"off|off|on\" _builder_version=\"4.25.2\" _module_preset=\"default\" animation_style=\"slide\" animation_direction=\"right\" animation_duration=\"1300ms\" animation_intensity_slide=\"15%\" locked=\"off\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.25.1\" _module_preset=\"default\" text_font=\"|300|||||||\" text_text_color=\"#19191b\" text_font_size=\"18px\" text_line_height=\"1.4em\" header_2_font=\"|600|||||||\" header_2_font_size=\"28px\" header_3_font=\"|600|||||||\" header_3_font_size=\"25px\" custom_margin=\"0px||0px||false|false\" custom_margin_tablet=\"0px||||false|false\" custom_margin_phone=\"0px||0px||false|false\" custom_margin_last_edited=\"on|tablet\" custom_padding=\"0px||0px||false|false\" animation_direction=\"left\" text_font_size_tablet=\"18px\" text_font_size_phone=\"16px\" text_font_size_last_edited=\"on|phone\" header_2_font_size_tablet=\"25px\" header_2_font_size_phone=\"20px\" header_2_font_size_last_edited=\"on|phone\" header_3_font_size_tablet=\"20px\" header_3_font_size_phone=\"20px\" header_3_font_size_last_edited=\"on|tablet\" border_color_left=\"#EC8F0E\" locked=\"off\" global_colors_info=\"{}\"]<\/p><h3>XDR Extended Detection and Response<\/h3><p>L'XDR \u00e8 una soluzione di sicurezza che estende e integra le capacit\u00e0 di rilevamento e risposta alle minacce oltre i tradizionali endpoint, includendo anche reti, cloud e e-mail. Questa tecnologia utilizza l'analisi avanzata dei dati e l'intelligenza artificiale per fornire una visibilit\u00e0 completa e migliorare la capacit\u00e0 di prevenire, rilevare e rispondere a minacce informatiche in modo pi\u00f9 efficace e coordinato.<\/p><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/extended-detection-and-response.jpg\" title_text=\"extended detection and response\" disabled_on=\"on|on|off\" _builder_version=\"4.25.2\" _module_preset=\"default\" animation_style=\"slide\" animation_direction=\"right\" animation_duration=\"1300ms\" animation_intensity_slide=\"15%\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.25.2\" _module_preset=\"default\" width=\"95%\" width_tablet=\"80%\" width_phone=\"85%\" width_last_edited=\"on|tablet\" max_width=\"1125px\" max_width_tablet=\"2560%\" max_width_phone=\"2560%\" max_width_last_edited=\"on|tablet\" custom_margin=\"||||true|false\" custom_padding=\"60px||60px||true|false\" animation_direction=\"right\" border_width_bottom=\"1px\" border_color_bottom=\"rgba(0,0,0,0.13)\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/NDR-network-detection-response.jpg\" title_text=\"NDR network detection response\" _builder_version=\"4.25.2\" _module_preset=\"default\" animation_style=\"slide\" animation_direction=\"left\" animation_duration=\"1300ms\" animation_intensity_slide=\"15%\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.25.1\" _module_preset=\"default\" text_font=\"|300|||||||\" text_text_color=\"#19191b\" text_font_size=\"18px\" text_line_height=\"1.4em\" header_2_font=\"|600|||||||\" header_2_font_size=\"28px\" header_3_font=\"|600|||||||\" header_3_font_size=\"25px\" custom_margin=\"0px||0px||false|false\" custom_margin_tablet=\"0px||||false|false\" custom_margin_phone=\"0px||0px||false|false\" custom_margin_last_edited=\"on|tablet\" custom_padding=\"0px||0px||false|false\" animation_direction=\"right\" text_font_size_tablet=\"18px\" text_font_size_phone=\"16px\" text_font_size_last_edited=\"on|phone\" header_2_font_size_tablet=\"25px\" header_2_font_size_phone=\"20px\" header_2_font_size_last_edited=\"on|phone\" header_3_font_size_tablet=\"20px\" header_3_font_size_phone=\"20px\" header_3_font_size_last_edited=\"on|tablet\" border_color_left=\"#EC8F0E\" locked=\"off\" global_colors_info=\"{}\"]<\/p><h3>NDR Network Detection and Response<\/h3><p>L'NDR \u00e8 una tecnologia di sicurezza che si focalizza sul monitoraggio del traffico di rete e sulla rilevazione di comportamenti sospetti o anomalie che potrebbero indicare la presenza di minacce informatiche. Questo strumento analizza in modo continuativo il traffico dati che attraversa la rete, utilizzando algoritmi avanzati e intelligenza artificiale per identificare attivit\u00e0 potenzialmente pericolose, come intrusioni, malware diffuso attraverso la rete o tentativi di esfiltrazione dei dati.<\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.25.2\" _module_preset=\"default\" width=\"95%\" width_tablet=\"80%\" width_phone=\"85%\" width_last_edited=\"on|tablet\" max_width=\"1125px\" max_width_tablet=\"2560%\" max_width_phone=\"2560%\" max_width_last_edited=\"on|tablet\" custom_margin=\"||||true|false\" custom_padding=\"60px||60px||true|false\" animation_direction=\"right\" border_width_bottom=\"1px\" border_color_bottom=\"rgba(0,0,0,0.13)\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/Cyber-security-awareness.jpg\" title_text=\"Cyber security awareness\" disabled_on=\"off|off|on\" _builder_version=\"4.25.2\" _module_preset=\"default\" animation_style=\"slide\" animation_direction=\"right\" animation_duration=\"1300ms\" animation_intensity_slide=\"15%\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.25.1\" _module_preset=\"default\" text_font=\"|300|||||||\" text_text_color=\"#19191b\" text_font_size=\"18px\" text_line_height=\"1.4em\" header_2_font=\"|600|||||||\" header_2_font_size=\"28px\" header_3_font=\"|600|||||||\" header_3_font_size=\"25px\" custom_margin=\"0px||0px||false|false\" custom_margin_tablet=\"0px||||false|false\" custom_margin_phone=\"0px||0px||false|false\" custom_margin_last_edited=\"on|tablet\" custom_padding=\"0px||0px||false|false\" animation_direction=\"left\" text_font_size_tablet=\"18px\" text_font_size_phone=\"16px\" text_font_size_last_edited=\"on|phone\" header_2_font_size_tablet=\"25px\" header_2_font_size_phone=\"20px\" header_2_font_size_last_edited=\"on|phone\" header_3_font_size_tablet=\"20px\" header_3_font_size_phone=\"20px\" header_3_font_size_last_edited=\"on|tablet\" border_color_left=\"#EC8F0E\" locked=\"off\" global_colors_info=\"{}\"]<\/p><h3>CYBER SECURITY AWARENESS<\/h3><p>Attivit\u00e0 e corsi di formazione sulla corretta Postura di Sicurezza e sulle Best Practice per il personale dell\u2019azienda sui comportamenti nell\u2019uso degli strumenti informatici e di rete.<\/p><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/Cyber-security-awareness.jpg\" title_text=\"Cyber security awareness\" disabled_on=\"on|on|off\" _builder_version=\"4.25.2\" _module_preset=\"default\" animation_style=\"slide\" animation_direction=\"right\" animation_duration=\"1300ms\" animation_intensity_slide=\"15%\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.25.2\" _module_preset=\"default\" width=\"95%\" width_tablet=\"80%\" width_phone=\"85%\" width_last_edited=\"on|tablet\" max_width=\"1125px\" max_width_tablet=\"2560%\" max_width_phone=\"2560%\" max_width_last_edited=\"on|tablet\" custom_margin=\"||||true|false\" custom_padding=\"60px||60px||true|false\" animation_direction=\"right\" border_width_bottom=\"1px\" border_color_bottom=\"rgba(0,0,0,0.13)\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/mail-attack-simulation.jpg\" title_text=\"mail attack simulation\" _builder_version=\"4.25.2\" _module_preset=\"default\" animation_style=\"slide\" animation_direction=\"left\" animation_duration=\"1300ms\" animation_intensity_slide=\"15%\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.25.1\" _module_preset=\"default\" text_font=\"|300|||||||\" text_text_color=\"#19191b\" text_font_size=\"18px\" text_line_height=\"1.4em\" header_2_font=\"|600|||||||\" header_2_font_size=\"28px\" header_3_font=\"|600|||||||\" header_3_font_size=\"25px\" custom_margin=\"0px||0px||false|false\" custom_margin_tablet=\"0px||||false|false\" custom_margin_phone=\"0px||0px||false|false\" custom_margin_last_edited=\"on|tablet\" custom_padding=\"0px||0px||false|false\" animation_direction=\"right\" text_font_size_tablet=\"18px\" text_font_size_phone=\"16px\" text_font_size_last_edited=\"on|phone\" header_2_font_size_tablet=\"25px\" header_2_font_size_phone=\"20px\" header_2_font_size_last_edited=\"on|phone\" header_3_font_size_tablet=\"20px\" header_3_font_size_phone=\"20px\" header_3_font_size_last_edited=\"on|tablet\" border_color_left=\"#EC8F0E\" locked=\"off\" global_colors_info=\"{}\"]<\/p><h3>MAIL ATTACK SIMULATION<\/h3><p>La simulazione di attacchi via e-mail \u00e8 una pratica di sicurezza in cui un'organizzazione invia e-mail che simulano tecniche di phishing o altre forme di attacchi informatici ai propri dipendenti per testare la loro consapevolezza e preparazione. L'obiettivo \u00e8 valutare la capacit\u00e0 dei dipendenti di riconoscere e rispondere correttamente a tentativi di inganno via e-mail, riducendo cos\u00ec il rischio di incidenti di sicurezza reali.<\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.25.2\" _module_preset=\"default\" width=\"95%\" width_tablet=\"80%\" width_phone=\"85%\" width_last_edited=\"on|tablet\" max_width=\"1125px\" max_width_tablet=\"2560%\" max_width_phone=\"2560%\" max_width_last_edited=\"on|tablet\" custom_margin=\"||||true|false\" custom_padding=\"60px||60px||true|false\" animation_direction=\"right\" border_width_bottom=\"1px\" border_color_bottom=\"rgba(0,0,0,0.13)\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/VM-vulnerability-management.jpg\" title_text=\"VM vulnerability management\" disabled_on=\"off|off|on\" _builder_version=\"4.25.2\" _module_preset=\"default\" animation_style=\"slide\" animation_direction=\"right\" animation_duration=\"1300ms\" animation_intensity_slide=\"15%\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.25.1\" _module_preset=\"default\" text_font=\"|300|||||||\" text_text_color=\"#19191b\" text_font_size=\"18px\" text_line_height=\"1.4em\" header_2_font=\"|600|||||||\" header_2_font_size=\"28px\" header_3_font=\"|600|||||||\" header_3_font_size=\"25px\" custom_margin=\"0px||0px||false|false\" custom_margin_tablet=\"0px||||false|false\" custom_margin_phone=\"0px||0px||false|false\" custom_margin_last_edited=\"on|tablet\" custom_padding=\"0px||0px||false|false\" animation_direction=\"left\" text_font_size_tablet=\"18px\" text_font_size_phone=\"16px\" text_font_size_last_edited=\"on|phone\" header_2_font_size_tablet=\"25px\" header_2_font_size_phone=\"20px\" header_2_font_size_last_edited=\"on|phone\" header_3_font_size_tablet=\"20px\" header_3_font_size_phone=\"20px\" header_3_font_size_last_edited=\"on|tablet\" border_color_left=\"#EC8F0E\" locked=\"off\" global_colors_info=\"{}\"]<\/p><h3>VM Vulnerability Management<\/h3><p>Il Vulnerability Management \u00e8 un processo proattivo di identificazione, classificazione, prioritizzazione, rimedio e mitigazione delle vulnerabilit\u00e0 all'interno dei sistemi informatici di un'organizzazione.<\/p><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/VM-vulnerability-management.jpg\" title_text=\"VM vulnerability management\" disabled_on=\"on|on|off\" _builder_version=\"4.25.2\" _module_preset=\"default\" animation_style=\"slide\" animation_direction=\"right\" animation_duration=\"1300ms\" animation_intensity_slide=\"15%\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.25.2\" _module_preset=\"default\" width=\"95%\" width_tablet=\"80%\" width_phone=\"85%\" width_last_edited=\"on|tablet\" max_width=\"1125px\" max_width_tablet=\"2560%\" max_width_phone=\"2560%\" max_width_last_edited=\"on|tablet\" custom_margin=\"||||true|false\" custom_padding=\"60px||60px||true|false\" animation_direction=\"right\" border_width_bottom=\"1px\" border_color_bottom=\"rgba(0,0,0,0.13)\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/05\/Css-7.jpg\" title_text=\"Css-7\" _builder_version=\"4.25.2\" _module_preset=\"default\" animation_style=\"slide\" animation_direction=\"left\" animation_duration=\"1300ms\" animation_intensity_slide=\"15%\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.25.1\" _module_preset=\"default\" text_font=\"|300|||||||\" text_text_color=\"#19191b\" text_font_size=\"18px\" text_line_height=\"1.4em\" header_2_font=\"|600|||||||\" header_2_font_size=\"28px\" header_3_font=\"|600|||||||\" header_3_font_size=\"25px\" custom_margin=\"0px||0px||false|false\" custom_margin_tablet=\"0px||||false|false\" custom_margin_phone=\"0px||0px||false|false\" custom_margin_last_edited=\"on|tablet\" custom_padding=\"0px||0px||false|false\" animation_direction=\"right\" text_font_size_tablet=\"18px\" text_font_size_phone=\"16px\" text_font_size_last_edited=\"on|phone\" header_2_font_size_tablet=\"25px\" header_2_font_size_phone=\"20px\" header_2_font_size_last_edited=\"on|phone\" header_3_font_size_tablet=\"20px\" header_3_font_size_phone=\"20px\" header_3_font_size_last_edited=\"on|tablet\" border_color_left=\"#EC8F0E\" locked=\"off\" global_colors_info=\"{}\"]<\/p><h3>VA Vulnerability Assessment<\/h3><p>Il VA \u00e8 un servizio di sicurezza che effettua scansioni periodiche identificando le vulnerabilit\u00e0 nei sistemi informatici. Un processo continuo che garantisce un avviso tempestivo e una protezione costante.<\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.25.2\" _module_preset=\"default\" width=\"95%\" width_tablet=\"80%\" width_phone=\"85%\" width_last_edited=\"on|tablet\" max_width=\"1125px\" max_width_tablet=\"2560%\" max_width_phone=\"2560%\" max_width_last_edited=\"on|tablet\" custom_margin=\"||||true|false\" custom_padding=\"60px||60px||true|false\" animation_direction=\"right\" border_width_bottom=\"1px\" border_color_bottom=\"rgba(0,0,0,0.13)\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/Penetration-test.jpg\" title_text=\"Penetration test\" disabled_on=\"off|off|on\" _builder_version=\"4.25.2\" _module_preset=\"default\" animation_style=\"slide\" animation_direction=\"right\" animation_duration=\"1300ms\" animation_intensity_slide=\"15%\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.25.1\" _module_preset=\"default\" text_font=\"|300|||||||\" text_text_color=\"#19191b\" text_font_size=\"18px\" text_line_height=\"1.4em\" header_2_font=\"|600|||||||\" header_2_font_size=\"28px\" header_3_font=\"|600|||||||\" header_3_font_size=\"25px\" custom_margin=\"0px||0px||false|false\" custom_margin_tablet=\"0px||||false|false\" custom_margin_phone=\"0px||0px||false|false\" custom_margin_last_edited=\"on|tablet\" custom_padding=\"0px||0px||false|false\" animation_direction=\"left\" text_font_size_tablet=\"18px\" text_font_size_phone=\"16px\" text_font_size_last_edited=\"on|phone\" header_2_font_size_tablet=\"25px\" header_2_font_size_phone=\"20px\" header_2_font_size_last_edited=\"on|phone\" header_3_font_size_tablet=\"20px\" header_3_font_size_phone=\"20px\" header_3_font_size_last_edited=\"on|tablet\" border_color_left=\"#EC8F0E\" locked=\"off\" global_colors_info=\"{}\"]<\/p><h3>PEN TEST Penetration Test<\/h3><p>Il PEN TEST \u00e8 una simulazione di attacco mirata, progettata per sfruttare le vulnerabilit\u00e0 in modo da valutare la resilienza effettiva del sistema contro gli attacchi informatici. I pen test sono spesso condotti manualmente da esperti che adottano il punto di vista di un potenziale attaccante, cercando di infiltrarsi e \"penetrare\" le difese del sistema utilizzando qualsiasi vulnerabilit\u00e0 trovata durante l'assessment o altre tecniche.<\/p><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/Penetration-test.jpg\" title_text=\"Penetration test\" disabled_on=\"on|on|off\" _builder_version=\"4.25.2\" _module_preset=\"default\" animation_style=\"slide\" animation_direction=\"right\" animation_duration=\"1300ms\" animation_intensity_slide=\"15%\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.25.2\" _module_preset=\"default\" width=\"95%\" width_tablet=\"80%\" width_phone=\"85%\" width_last_edited=\"on|tablet\" max_width=\"1125px\" max_width_tablet=\"2560%\" max_width_phone=\"2560%\" max_width_last_edited=\"on|tablet\" custom_margin=\"||||true|false\" custom_padding=\"60px||60px||true|false\" animation_direction=\"right\" border_width_bottom=\"1px\" border_color_bottom=\"rgba(0,0,0,0.13)\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/05\/Il-perimetro-da-difendere.jpg\" title_text=\"Il perimetro da difendere\" _builder_version=\"4.25.2\" _module_preset=\"default\" animation_style=\"slide\" animation_direction=\"left\" animation_duration=\"1300ms\" animation_intensity_slide=\"15%\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.25.2\" _module_preset=\"default\" text_font=\"|300|||||||\" text_text_color=\"#19191b\" text_font_size=\"18px\" text_line_height=\"1.4em\" header_2_font=\"|600|||||||\" header_2_font_size=\"28px\" header_3_font=\"|600|||||||\" header_3_font_size=\"25px\" custom_margin=\"0px||0px||false|false\" custom_margin_tablet=\"0px||||false|false\" custom_margin_phone=\"0px||0px||false|false\" custom_margin_last_edited=\"on|tablet\" custom_padding=\"0px||0px||false|false\" animation_direction=\"right\" text_font_size_tablet=\"18px\" text_font_size_phone=\"16px\" text_font_size_last_edited=\"on|phone\" header_2_font_size_tablet=\"25px\" header_2_font_size_phone=\"20px\" header_2_font_size_last_edited=\"on|phone\" header_3_font_size_tablet=\"20px\" header_3_font_size_phone=\"20px\" header_3_font_size_last_edited=\"on|tablet\" border_color_left=\"#EC8F0E\" locked=\"off\" global_colors_info=\"{}\"]<\/p><h3>HONEYPOT INFRASTRUTTURALI<\/h3><p>L\u2019Honeypot \u00e8 un servizio di cyber security basato su una trappola digitale che sembra essere una parte legittima dell'infrastruttura di un'organizzazione, ma \u00e8 in realt\u00e0 isolata e monitorata attentamente. Consente di studiare e neutralizzare intrusioni in corso su una vulnerabilit\u00e0 creata ad hoc per attirare gli hacker e attivare un allarme privo di falso positivo.<\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.25.2\" _module_preset=\"default\" width=\"95%\" width_tablet=\"80%\" width_phone=\"85%\" width_last_edited=\"on|tablet\" max_width=\"1125px\" max_width_tablet=\"2560%\" max_width_phone=\"2560%\" max_width_last_edited=\"on|tablet\" custom_margin=\"||||true|false\" custom_padding=\"60px||60px||true|false\" animation_direction=\"right\" border_width_bottom=\"1px\" border_color_bottom=\"rgba(0,0,0,0.13)\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/CTI-cyber-threat-intelligence.jpg\" title_text=\"CTI cyber threat intelligence\" disabled_on=\"off|off|on\" _builder_version=\"4.25.2\" _module_preset=\"default\" animation_style=\"slide\" animation_direction=\"right\" animation_duration=\"1300ms\" animation_intensity_slide=\"15%\" global_colors_info=\"{}\"][\/et_pb_image][et_pb_text _builder_version=\"4.25.2\" _module_preset=\"default\" text_font=\"|300|||||||\" text_text_color=\"#19191b\" text_font_size=\"18px\" text_line_height=\"1.4em\" header_2_font=\"|600|||||||\" header_2_font_size=\"28px\" header_3_font=\"|600|||||||\" header_3_font_size=\"25px\" custom_margin=\"0px||0px||false|false\" custom_margin_tablet=\"0px||||false|false\" custom_margin_phone=\"0px||0px||false|false\" custom_margin_last_edited=\"on|tablet\" custom_padding=\"0px||0px||false|false\" animation_direction=\"left\" text_font_size_tablet=\"18px\" text_font_size_phone=\"16px\" text_font_size_last_edited=\"on|phone\" header_2_font_size_tablet=\"25px\" header_2_font_size_phone=\"20px\" header_2_font_size_last_edited=\"on|phone\" header_3_font_size_tablet=\"20px\" header_3_font_size_phone=\"20px\" header_3_font_size_last_edited=\"on|tablet\" border_color_left=\"#EC8F0E\" locked=\"off\" global_colors_info=\"{}\"]<\/p><h3>CTI Cyber Threat Intelligence<\/h3><p>Il CTI \u00e8 un radar avanzato sul Dark Web che monitora costantemente il panorama delle minacce e identifica nuove modalit\u00e0 di effrazione informatica. Inoltre, contribuisce all\u2019aggiornamento costante dei sistemi di difesa.<\/p><p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/CTI-cyber-threat-intelligence.jpg\" title_text=\"CTI cyber threat intelligence\" disabled_on=\"on|on|off\" _builder_version=\"4.25.2\" _module_preset=\"default\" animation_style=\"slide\" animation_direction=\"right\" animation_duration=\"1300ms\" animation_intensity_slide=\"15%\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.25.2\" _module_preset=\"default\" width=\"95%\" width_tablet=\"80%\" width_phone=\"85%\" width_last_edited=\"on|tablet\" max_width=\"1125px\" max_width_tablet=\"2560%\" max_width_phone=\"2560%\" max_width_last_edited=\"on|tablet\" custom_margin=\"||||true|false\" custom_padding=\"60px||||false|false\" animation_direction=\"right\" border_color_bottom=\"rgba(0,0,0,0.13)\" global_colors_info=\"{}\"][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_image src=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/Attack-surface-management.jpg\" title_text=\"Attack surface management\" _builder_version=\"4.25.2\" _module_preset=\"default\" animation_style=\"slide\" animation_direction=\"left\" animation_duration=\"1300ms\" animation_intensity_slide=\"15%\" global_colors_info=\"{}\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.25.2\" _module_preset=\"default\" text_font=\"|300|||||||\" text_text_color=\"#19191b\" text_font_size=\"18px\" text_line_height=\"1.4em\" header_2_font=\"|600|||||||\" header_2_font_size=\"28px\" header_3_font=\"|600|||||||\" header_3_font_size=\"25px\" custom_margin=\"0px||0px||false|false\" custom_margin_tablet=\"0px||||false|false\" custom_margin_phone=\"0px||||false|false\" custom_margin_last_edited=\"on|tablet\" custom_padding=\"0px||0px||false|false\" animation_direction=\"right\" text_font_size_tablet=\"18px\" text_font_size_phone=\"16px\" text_font_size_last_edited=\"on|phone\" header_2_font_size_tablet=\"25px\" header_2_font_size_phone=\"20px\" header_2_font_size_last_edited=\"on|phone\" header_3_font_size_tablet=\"20px\" header_3_font_size_phone=\"20px\" header_3_font_size_last_edited=\"on|tablet\" border_color_left=\"#EC8F0E\" locked=\"off\" global_colors_info=\"{}\"]<\/p><h3>ATTACK SURFACE MANAGEMENT<\/h3><p>La Gestione della Superficie di Attacco \u00e8 un processo continuo che le organizzazioni utilizzano per identificare, catalogare e monitorare tutti gli asset IT esposti, sia interni che esterni, che potrebbero essere sfruttati da un attaccante. Questo include server, dispositivi mobili, applicazioni web, API, e qualsiasi altro punto di ingresso che possa essere accessibile pubblicamente.<\/p><p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" custom_padding_last_edited=\"on|phone\" _builder_version=\"4.25.2\" _module_preset=\"default\" background_color=\"#2d2d2d\" width=\"95%\" width_tablet=\"80%\" width_phone=\"100%\" width_last_edited=\"on|tablet\" max_width=\"1125px\" max_width_tablet=\"2560%\" max_width_phone=\"2560%\" max_width_last_edited=\"on|tablet\" custom_margin=\"50px||||false|false\" custom_padding=\"50px|50px|50px|50px|true|true\" custom_padding_tablet=\"50px|50px|50px|50px|false|true\" custom_padding_phone=\"30px|30px|30px|30px|true|true\" animation_style=\"slide\" animation_direction=\"right\" animation_duration=\"1200ms\" animation_intensity_slide=\"6%\" border_color_bottom=\"rgba(0,0,0,0.33)\" locked=\"off\" global_colors_info=\"{}\" max_width__hover_enabled=\"off|desktop\"][et_pb_column type=\"1_2\" _builder_version=\"4.25.2\" _module_preset=\"default\" background_enable_color=\"off\" background_image=\"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/06\/Tecnologia-allavanguardia.jpg\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_padding_tablet=\"182px|0px|182px|0px|true|true\" custom_padding_phone=\"108px||108px||true|true\" custom_padding_last_edited=\"on|tablet\" border_width_right=\"35px\" border_color_right=\"#2d2d2d\" border_width_right_tablet=\"0px\" border_width_right_phone=\"0px\" border_width_right_last_edited=\"on|tablet\" global_colors_info=\"{}\"][et_pb_divider show_divider=\"off\" _builder_version=\"4.25.1\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_divider][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.25.1\" _module_preset=\"default\" background_enable_color=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" custom_css_main_element=\"||display: flex;||flex-direction: column;||justify-content: center;||||\" global_colors_info=\"{}\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_font=\"|300|||||||\" text_text_color=\"#FFFFFF\" text_font_size=\"18px\" text_line_height=\"1.4em\" header_3_font=\"|600|||||||\" header_3_text_color=\"#FFFFFF\" header_3_font_size=\"30px\" custom_margin=\"0px||0px||false|false\" custom_margin_tablet=\"32px||29px||false|false\" custom_margin_phone=\"0px||0px||false|false\" custom_margin_last_edited=\"on|tablet\" custom_padding=\"0px||0px||false|false\" hover_enabled=\"0\" text_font_size_tablet=\"18px\" text_font_size_phone=\"16px\" text_font_size_last_edited=\"on|phone\" header_3_font_size_tablet=\"30px\" header_3_font_size_phone=\"20px\" header_3_font_size_last_edited=\"on|phone\" border_color_left=\"#EC8F0E\" global_colors_info=\"{}\" sticky_enabled=\"0\"]<\/p><h3>Fissa un incontro<\/h3><p>La soluzione CUBO Building parte da una consulenza gratuita per valutare l'adeguatezza di questa soluzione per il cliente interessato.<\/p><p><strong>Valutata l\u2019adeguatezza si procede con queste fasi:<\/strong><\/p><ul><li>Primo appuntamento di conoscenza dell\u2019infrastruttura e delle esigenze del cliente<\/li><li>Presentazione dell\u2019offerta tecnico-economica<\/li><li>Valutazione da parte del cliente<\/li><li>Eventuali modifiche alla soluzione proposta<\/li><li>Implementazione e attivazione della soluzione ad hoc condivisa<\/li><\/ul><p>[\/et_pb_text][et_pb_button button_url=\"@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMyMjk5In19@\" url_new_window=\"on\" button_text=\" Contattaci ora per fissare un incontro\" button_alignment=\"left\" button_alignment_tablet=\"left\" button_alignment_phone=\"center\" button_alignment_last_edited=\"on|phone\" _builder_version=\"4.25.2\" _dynamic_attributes=\"button_url\" _module_preset=\"default\" custom_button=\"on\" button_text_size=\"18px\" button_text_color=\"#FFFFFF\" button_bg_color=\"#EC8F0E\" button_border_width=\"2px\" button_border_color=\"#FFFFFF\" button_border_radius=\"0px\" button_font=\"||||||||\" button_icon=\"\ue076||divi||400\" custom_margin=\"17px||||false|false\" custom_margin_tablet=\"17px|||96px|false|false\" custom_margin_phone=\"17px|||0px|false|false\" custom_margin_last_edited=\"on|phone\" custom_padding=\"11px|19px|11px|19px|true|true\" custom_padding_last_edited=\"off|phone\" button_text_size_tablet=\"18px\" button_text_size_phone=\"16px\" button_text_size_last_edited=\"on|phone\" button_letter_spacing_tablet=\"\" button_letter_spacing_phone=\"-1px\" button_letter_spacing_last_edited=\"on|phone\" locked=\"off\" global_colors_info=\"{}\" custom_padding__hover_enabled=\"on|hover\" custom_padding__hover=\"|38px|||true|false\" button_bg_color__hover_enabled=\"on|hover\" button_bg_color__hover=\"RGBA(255,255,255,0)\" button_bg_enable_color__hover=\"on\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","_et_gb_content_width":"","footnotes":""},"class_list":["post-32828","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CUBO Building - CSS CyberSec Services<\/title>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CUBO Building - CSS CyberSec Services\" \/>\n<meta property=\"og:description\" content=\"1 CUBO Building CUBO Building is an offering tailored to meet the needs of any type of customer from Large, Medium, and Small Businesses. It is a block construction, like bricks. The goal is to provide, after an analysis of needs and IT infrastructure, the most suitable and complementary tools for perfecting Information Security, designed [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersecservices.ch\/en\/cubo-building\/\" \/>\n<meta property=\"og:site_name\" content=\"CSS CyberSec Services\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-12T14:16:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cybersecservices.ch\\\/en\\\/cubo-building\\\/\",\"url\":\"https:\\\/\\\/cybersecservices.ch\\\/en\\\/cubo-building\\\/\",\"name\":\"CUBO Building - CSS CyberSec Services\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybersecservices.ch\\\/en\\\/#website\"},\"datePublished\":\"2024-06-18T10:45:30+00:00\",\"dateModified\":\"2025-05-12T14:16:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cybersecservices.ch\\\/en\\\/cubo-building\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybersecservices.ch\\\/en\\\/cubo-building\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cybersecservices.ch\\\/en\\\/cubo-building\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cybersecservices.ch\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CUBO Building\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybersecservices.ch\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/cybersecservices.ch\\\/en\\\/\",\"name\":\"CSS CYBERSECSERVICES\",\"description\":\"SOC h24 in Ticino\",\"publisher\":{\"@id\":\"https:\\\/\\\/cybersecservices.ch\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybersecservices.ch\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cybersecservices.ch\\\/en\\\/#organization\",\"name\":\"CSS CYBERSECSERVICES\",\"url\":\"https:\\\/\\\/cybersecservices.ch\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cybersecservices.ch\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cybersecservices.ch\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/CSS_logodef.png\",\"contentUrl\":\"https:\\\/\\\/cybersecservices.ch\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/CSS_logodef.png\",\"width\":1968,\"height\":1084,\"caption\":\"CSS CYBERSECSERVICES\"},\"image\":{\"@id\":\"https:\\\/\\\/cybersecservices.ch\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CUBO Building - CSS CyberSec Services","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"CUBO Building - CSS CyberSec Services","og_description":"1 CUBO Building CUBO Building is an offering tailored to meet the needs of any type of customer from Large, Medium, and Small Businesses. It is a block construction, like bricks. The goal is to provide, after an analysis of needs and IT infrastructure, the most suitable and complementary tools for perfecting Information Security, designed [&hellip;]","og_url":"https:\/\/cybersecservices.ch\/en\/cubo-building\/","og_site_name":"CSS CyberSec Services","article_modified_time":"2025-05-12T14:16:27+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cybersecservices.ch\/en\/cubo-building\/","url":"https:\/\/cybersecservices.ch\/en\/cubo-building\/","name":"CUBO Building - CSS CyberSec Services","isPartOf":{"@id":"https:\/\/cybersecservices.ch\/en\/#website"},"datePublished":"2024-06-18T10:45:30+00:00","dateModified":"2025-05-12T14:16:27+00:00","breadcrumb":{"@id":"https:\/\/cybersecservices.ch\/en\/cubo-building\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersecservices.ch\/en\/cubo-building\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cybersecservices.ch\/en\/cubo-building\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cybersecservices.ch\/en\/"},{"@type":"ListItem","position":2,"name":"CUBO Building"}]},{"@type":"WebSite","@id":"https:\/\/cybersecservices.ch\/en\/#website","url":"https:\/\/cybersecservices.ch\/en\/","name":"CSS CYBERSECSERVICES","description":"SOC h24 in Ticino","publisher":{"@id":"https:\/\/cybersecservices.ch\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersecservices.ch\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cybersecservices.ch\/en\/#organization","name":"CSS CYBERSECSERVICES","url":"https:\/\/cybersecservices.ch\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersecservices.ch\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/05\/CSS_logodef.png","contentUrl":"https:\/\/cybersecservices.ch\/wp-content\/uploads\/2024\/05\/CSS_logodef.png","width":1968,"height":1084,"caption":"CSS CYBERSECSERVICES"},"image":{"@id":"https:\/\/cybersecservices.ch\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cybersecservices.ch\/en\/wp-json\/wp\/v2\/pages\/32828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecservices.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecservices.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecservices.ch\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecservices.ch\/en\/wp-json\/wp\/v2\/comments?post=32828"}],"version-history":[{"count":5,"href":"https:\/\/cybersecservices.ch\/en\/wp-json\/wp\/v2\/pages\/32828\/revisions"}],"predecessor-version":[{"id":32947,"href":"https:\/\/cybersecservices.ch\/en\/wp-json\/wp\/v2\/pages\/32828\/revisions\/32947"}],"wp:attachment":[{"href":"https:\/\/cybersecservices.ch\/en\/wp-json\/wp\/v2\/media?parent=32828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}