{"id":79,"date":"2024-02-13T12:29:46","date_gmt":"2024-02-13T12:29:46","guid":{"rendered":"https:\/\/cybersecurity.kii.agency\/?page_id=79"},"modified":"2026-04-08T13:03:46","modified_gmt":"2026-04-08T13:03:46","slug":"homepage","status":"publish","type":"page","link":"https:\/\/cybersecurity.kii.agency\/","title":{"rendered":"homepage"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"79\" class=\"elementor elementor-79\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bfe8802 e-con-full e-flex e-con e-parent\" data-id=\"bfe8802\" data-element_type=\"container\" data-e-type=\"container\" id=\"form\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-ebac662 e-flex e-con-boxed e-con e-child\" data-id=\"ebac662\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-55b7d04 e-con-full e-flex e-con e-child\" data-id=\"55b7d04\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74cb5ee2 elementor-widget__width-auto elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"74cb5ee2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomOut&quot;,&quot;_animation_delay&quot;:&quot;300&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">SICUREZZA INFORMATICA AVANZATA<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6310d3e elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"6310d3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation_delay&quot;:&quot;400&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Un attacco informatico pu\u00f2 fermare la tua azienda in poche ore.<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b39014 elementor-widget elementor-widget-text-editor\" data-id=\"5b39014\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation_delay&quot;:&quot;500&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Ransomware, furti di dati e vulnerabilit\u00e0 nei sistemi informatici sono oggi tra i principali rischi per le imprese.<\/p><p>I nostri servizi di\u00a0<strong style=\"color: white;\">Cyber Security<\/strong>\u00a0individuano le vulnerabilit\u00e0, contengono gli attacchi e ricostruiscono gli eventi attraverso\u00a0<strong style=\"color: white;\">analisi tecniche e forensi utilizzabili in sede legale.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5501c6 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a5501c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 48c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m140.204 130.267l-22.536-22.718c-4.667-4.705-12.265-4.736-16.97-.068L215.346 303.697l-59.792-60.277c-4.667-4.705-12.265-4.736-16.97-.069l-22.719 22.536c-4.705 4.667-4.736 12.265-.068 16.971l90.781 91.516c4.667 4.705 12.265 4.736 16.97.068l172.589-171.204c4.704-4.668 4.734-12.266.067-16.971z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Intervento rapido h24:<\/b> contenimento danni in caso di ransomware e data breach.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 48c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m140.204 130.267l-22.536-22.718c-4.667-4.705-12.265-4.736-16.97-.068L215.346 303.697l-59.792-60.277c-4.667-4.705-12.265-4.736-16.97-.069l-22.719 22.536c-4.705 4.667-4.736 12.265-.068 16.971l90.781 91.516c4.667 4.705 12.265 4.736 16.97.068l172.589-171.204c4.704-4.668 4.734-12.266.067-16.971z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Penetration testing:<\/b> simulazioni reali per individuare falle nei sistemi.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 48c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m140.204 130.267l-22.536-22.718c-4.667-4.705-12.265-4.736-16.97-.068L215.346 303.697l-59.792-60.277c-4.667-4.705-12.265-4.736-16.97-.069l-22.719 22.536c-4.705 4.667-4.736 12.265-.068 16.971l90.781 91.516c4.667 4.705 12.265 4.736 16.97.068l172.589-171.204c4.704-4.668 4.734-12.266.067-16.971z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Digital forensics:<\/b> acquisizione certificata di dati per ricostruire eventi e responsabilit\u00e0.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 48c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m140.204 130.267l-22.536-22.718c-4.667-4.705-12.265-4.736-16.97-.068L215.346 303.697l-59.792-60.277c-4.667-4.705-12.265-4.736-16.97-.069l-22.719 22.536c-4.705 4.667-4.736 12.265-.068 16.971l90.781 91.516c4.667 4.705 12.265 4.736 16.97.068l172.589-171.204c4.704-4.668 4.734-12.266.067-16.971z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Digital Risk Protection:<\/b> valutiamo la tua esposizione al rischio prevedendo i problemi che ti colpiranno affrontandoli in anticipo.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-654c9e1 e-con-full e-flex e-con e-child\" data-id=\"654c9e1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-b887876 e-con-full e-flex e-con e-child\" data-id=\"b887876\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d3bce6 elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"7d3bce6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomOut&quot;,&quot;_animation_delay&quot;:&quot;400&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Richiedi un check-up di sicurezza per la tua azienda<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69f9363 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"69f9363\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomOut&quot;,&quot;_animation_delay&quot;:&quot;500&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Se vuoi capire quanto \u00e8 esposta la tua infrastruttura digitale, puoi richiedere una prima analisi del profilo di rischio. Un nostro specialista analizzer\u00e0 il contesto e ti indicher\u00e0 le vulnerabilit\u00e0 pi\u00f9 critiche e le possibili azioni di protezione. Tutte le informazioni vengono trattate con <strong>massima riservatezza<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acf1b18 elementor-widget elementor-widget-text-editor\" data-id=\"acf1b18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f303-o1\" lang=\"it-IT\" dir=\"ltr\" data-wpcf7-id=\"303\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php?rest_route=%2Fwp%2Fv2%2Fpages%2F79#wpcf7-f303-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Modulo di contatto\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"303\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"it_IT\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f303-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<style>\n \/* Wrapper senza sfondo (trasparente) *\/\n .cyber-form-container {\n padding: 20px 0; \/* Ridotto il padding laterale per sfruttare lo spazio di Elementor *\/\n font-family: 'Segoe UI', Roboto, Helvetica, Arial, sans-serif;\n width: 100%;\n }\n\n .cyber-row { margin-bottom: 20px; }\n\n \/* Griglia 2 colonne *\/\n .cyber-grid {\n display: flex;\n gap: 15px;\n margin-bottom: 20px;\n }\n .cyber-col { flex: 1; }\n\n \/* Input e Select *\/\n .cyber-form-container input[type=\"text\"],\n .cyber-form-container input[type=\"email\"],\n .cyber-form-container input[type=\"tel\"],\n .cyber-form-container select,\n .cyber-form-container textarea {\n width: 100% !important;\n background-color: #141414 !important; \/* Mantengo il fondo scuro solo negli input per leggibilit\u00e0 *\/\n border: 1px solid #333 !important;\n border-radius: 8px !important;\n color: #efefef !important;\n padding: 14px 16px !important;\n font-size: 15px !important;\n box-sizing: border-box;\n }\n\n \/* Focus e Placeholder *\/\n .cyber-form-container .wpcf7-form-control:focus { border-color: #3b82f6 !important; outline: none; }\n .cyber-form-container ::placeholder { color: #666; }\n\n \/* Menu a tendina *\/\n .cyber-form-container select {\n appearance: none;\n background-image: url(\"data:image\/svg+xml,%3Csvg xmlns='http:\/\/www.w3.org\/2000\/svg' fill='%233b82f6' viewBox='0 0 24 24'%3E%3Cpath d='M7 10l5 5 5-5z'\/%3E%3C\/svg%3E\");\n background-repeat: no-repeat;\n background-position: right 15px center;\n background-size: 20px;\n }\n\n \/* Privacy Checkbox *\/\n .cyber-privacy {\n display: flex;\n align-items: center;\n color: #ccc;\n font-size: 14px;\n gap: 10px;\n }\n\n \/* Pulsante a TUTTA LARGHEZZA *\/\n .cyber-submit {\n display: block !important;\n width: 100% !important; \/* Forza la larghezza intera *\/\n background-color: #3b82f6 !important;\n color: #fff !important;\n border: none !important;\n padding: 18px !important;\n border-radius: 50px !important;\n font-size: 16px !important;\n font-weight: 600 !important;\n cursor: pointer;\n margin-top: 10px;\n transition: transform 0.2s ease, background 0.3s ease !important;\n }\n\n .cyber-submit:hover {\n background-color: #2563eb !important;\n transform: translateY(-2px); \/* Piccolo feedback visivo al passaggio *\/\n }\n\n \/* Fix per mobile *\/\n @media (max-width: 600px) {\n .cyber-grid { flex-direction: column; gap: 20px; }\n }\n\n \/* Reset paragrafi WP *\/\n .cyber-form-container p { margin: 0 !important; padding: 0 !important; }\n .wpcf7-form-control-wrap { display: block; }\n<\/style>\n<div class=\"cyber-form-container\">\n\t<div class=\"cyber-row\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Nome e Cognome *\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"cyber-row\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-company\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" placeholder=\"Azienda\" value=\"\" type=\"text\" name=\"your-company\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"cyber-grid\">\n\t\t<div class=\"cyber-col\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email *\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t\t<div class=\"cyber-col\">\n\t\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-tel\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Telefono *\" value=\"\" type=\"tel\" name=\"your-tel\" \/><\/span>\n\t\t\t<\/p>\n\t\t<\/div>\n\t<\/div>\n\t<div class=\"cyber-row\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"area-interesse\"><select class=\"wpcf7-form-control wpcf7-select wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" name=\"area-interesse\"><option value=\"\">Area di interesse *<\/option><option value=\"Incident Response &amp; Eradication\">Incident Response &amp; Eradication<\/option><option value=\"Digital Risk Protection\">Digital Risk Protection<\/option><option value=\"Cyber Security Audit &amp; Compliance\">Cyber Security Audit &amp; Compliance<\/option><option value=\"Analisi Ransomware &amp; Data Breach\">Analisi Ransomware &amp; Data Breach<\/option><option value=\"Cloud &amp; Network Security\">Cloud &amp; Network Security<\/option><\/select><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"cyber-row\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Inserisci le tue richieste*\" name=\"your-message\"><\/textarea><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"cyber-row\">\n\t\t<p><label class=\"cyber-privacy\"><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"acceptance-privacy\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"acceptance-privacy\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">Accetto i <a href=\"https:\/\/www.iubenda.com\/privacy-policy\/40419895\">termini e le condizioni<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n<\/label>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"cyber-row\">\n\t\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner cyber-submit\" type=\"submit\" value=\"Contatta gli Esperti \u2192\" \/>\n\t\t<\/p>\n\t<\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98d54f8 elementor-align-center elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"98d54f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"lu lu-shield-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">I tuoi dati sono protetti da crittografia end-to-end.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5517b6f e-flex e-con-boxed e-con e-child\" data-id=\"5517b6f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-67fa25f e-con-full e-flex e-con e-child\" data-id=\"67fa25f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-bb0fb2f e-con-full e-flex e-con e-child\" data-id=\"bb0fb2f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-30c0cad elementor-widget elementor-widget-heading\" data-id=\"30c0cad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">25+<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b44989 elementor-widget elementor-widget-text-editor\" data-id=\"5b44989\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>ANNI DI ESPERIENZA<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a20b130 e-con-full e-flex e-con e-child\" data-id=\"a20b130\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce987aa elementor-widget elementor-widget-heading\" data-id=\"ce987aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">h24<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-167183f elementor-widget elementor-widget-text-editor\" data-id=\"167183f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>PRONTO INTERVENTO<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e889037 e-con-full e-flex e-con e-child\" data-id=\"e889037\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f1ab39 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"3f1ab39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"lu lu-shield-check\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tRISERVATEZZA ASSOLUTA\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b151f9a e-con-full e-flex e-con e-child\" data-id=\"b151f9a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f7a215 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"3f7a215\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-award\" viewBox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M97.12 362.63c-8.69-8.69-4.16-6.24-25.12-11.85-9.51-2.55-17.87-7.45-25.43-13.32L1.2 448.7c-4.39 10.77 3.81 22.47 15.43 22.03l52.69-2.01L105.56 507c8 8.44 22.04 5.81 26.43-4.96l52.05-127.62c-10.84 6.04-22.87 9.58-35.31 9.58-19.5 0-37.82-7.59-51.61-21.37zM382.8 448.7l-45.37-111.24c-7.56 5.88-15.92 10.77-25.43 13.32-21.07 5.64-16.45 3.18-25.12 11.85-13.79 13.78-32.12 21.37-51.62 21.37-12.44 0-24.47-3.55-35.31-9.58L252 502.04c4.39 10.77 18.44 13.4 26.43 4.96l36.25-38.28 52.69 2.01c11.62.44 19.82-11.27 15.43-22.03zM263 340c15.28-15.55 17.03-14.21 38.79-20.14 13.89-3.79 24.75-14.84 28.47-28.98 7.48-28.4 5.54-24.97 25.95-45.75 10.17-10.35 14.14-25.44 10.42-39.58-7.47-28.38-7.48-24.42 0-52.83 3.72-14.14-.25-29.23-10.42-39.58-20.41-20.78-18.47-17.36-25.95-45.75-3.72-14.14-14.58-25.19-28.47-28.98-27.88-7.61-24.52-5.62-44.95-26.41-10.17-10.35-25-14.4-38.89-10.61-27.87 7.6-23.98 7.61-51.9 0-13.89-3.79-28.72.25-38.89 10.61-20.41 20.78-17.05 18.8-44.94 26.41-13.89 3.79-24.75 14.84-28.47 28.98-7.47 28.39-5.54 24.97-25.95 45.75-10.17 10.35-14.15 25.44-10.42 39.58 7.47 28.36 7.48 24.4 0 52.82-3.72 14.14.25 29.23 10.42 39.59 20.41 20.78 18.47 17.35 25.95 45.75 3.72 14.14 14.58 25.19 28.47 28.98C104.6 325.96 106.27 325 121 340c13.23 13.47 33.84 15.88 49.74 5.82a39.676 39.676 0 0 1 42.53 0c15.89 10.06 36.5 7.65 49.73-5.82zM97.66 175.96c0-53.03 42.24-96.02 94.34-96.02s94.34 42.99 94.34 96.02-42.24 96.02-94.34 96.02-94.34-42.99-94.34-96.02z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tLICENZA GOVERNATIVA\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c44f65 e-flex e-con-boxed e-con e-parent\" data-id=\"0c44f65\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f699d85 e-con-full e-flex e-con e-child\" data-id=\"f699d85\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0965bc5 elementor-widget__width-auto elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"0965bc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomOut&quot;,&quot;_animation_delay&quot;:&quot;300&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">I NOSTRI SERVIZI<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5203fbf elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"5203fbf\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomOut&quot;,&quot;_animation_delay&quot;:&quot;300&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Security avanzata per prevenire, gestire e analizzare gli incidenti.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38f823d elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"38f823d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomOut&quot;,&quot;_animation_delay&quot;:&quot;400&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Le minacce informatiche evolvono continuamente e spesso colpiscono quando le\u00a0<strong style=\"color: white;\">vulnerabilit\u00e0 non sono ancora visibili.<\/strong> KII affianca le aziende con un approccio che integra analisi tecnica, simulazione di attacco e investigazione digitale per\u00a0<strong style=\"color: white;\">identificare i rischi e ridurre l\u2019impatto degli incidenti informatici.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-656a3c4 e-con-full e-flex e-con e-child\" data-id=\"656a3c4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79adfba elementor-widget__width-initial elementor-widget-mobile__width-inherit ui-e-align-left ui-e-top ui-e-align-tablet-center ui-e-align-mobile-center elementor-invisible elementor-widget elementor-widget-uicore-icon-box\" data-id=\"79adfba\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;content_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;24&quot;,&quot;right&quot;:&quot;24&quot;,&quot;bottom&quot;:&quot;24&quot;,&quot;left&quot;:&quot;24&quot;,&quot;isLinked&quot;:true},&quot;content_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;16&quot;,&quot;right&quot;:&quot;16&quot;,&quot;bottom&quot;:&quot;16&quot;,&quot;left&quot;:&quot;16&quot;,&quot;isLinked&quot;:true},&quot;content_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;20&quot;,&quot;right&quot;:&quot;20&quot;,&quot;bottom&quot;:&quot;20&quot;,&quot;left&quot;:&quot;20&quot;,&quot;isLinked&quot;:true},&quot;_animation_delay&quot;:&quot;500&quot;,&quot;_animation&quot;:&quot;zoomOutUp&quot;,&quot;position&quot;:&quot;top&quot;}\" data-widget_type=\"uicore-icon-box.default\">\n\t\t\t\t\t\n        <div class=\"ui-e-ico-box\" >\n\n            \n            <div class='ui-e-flex-wrp'>\n\n                                    <div class=\"ui-e-icon-wrp\">\n\n                        <i aria-hidden=\"true\" class=\"ri ri-alarm-warning-line\"><\/i>\n                    <\/div>\n                \n                <div class=\"ui-e-title-wrp\"><h4 class=\"ui-e-title\">Incident Response<\/h4><\/div>\n            <\/div>\n\n            <div class=\"ui-e-box-content\">\n                \n                <div class=\"ui-e-description\">\n                    <p style=\"text-align: left\">Quando un attacco \u00e8 in corso, la velocit\u00e0 fa la differenza. In caso di ransomware o data breach interveniamo per: isolare la minaccia, contenere la propagazione dell\u2019attacco, ripristinare i sistemi, ridurre l\u2019impatto. L\u2019obiettivo \u00e8 limitare i danni e ripristinare l\u2019operativit\u00e0.<\/p>                <\/div>\n\n                \n            <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c29c8d7 elementor-widget__width-initial elementor-widget-mobile__width-inherit ui-e-align-left ui-e-top ui-e-align-tablet-center ui-e-align-mobile-center elementor-invisible elementor-widget elementor-widget-uicore-icon-box\" data-id=\"c29c8d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;content_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;24&quot;,&quot;right&quot;:&quot;24&quot;,&quot;bottom&quot;:&quot;24&quot;,&quot;left&quot;:&quot;24&quot;,&quot;isLinked&quot;:true},&quot;content_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;16&quot;,&quot;right&quot;:&quot;16&quot;,&quot;bottom&quot;:&quot;16&quot;,&quot;left&quot;:&quot;16&quot;,&quot;isLinked&quot;:true},&quot;content_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;20&quot;,&quot;right&quot;:&quot;20&quot;,&quot;bottom&quot;:&quot;20&quot;,&quot;left&quot;:&quot;20&quot;,&quot;isLinked&quot;:true},&quot;_animation_delay&quot;:&quot;500&quot;,&quot;_animation&quot;:&quot;zoomOutUp&quot;,&quot;position&quot;:&quot;top&quot;}\" data-widget_type=\"uicore-icon-box.default\">\n\t\t\t\t\t\n        <div class=\"ui-e-ico-box\" >\n\n            \n            <div class='ui-e-flex-wrp'>\n\n                                    <div class=\"ui-e-icon-wrp\">\n\n                        <i aria-hidden=\"true\" class=\"lu lu-crosshair\"><\/i>\n                    <\/div>\n                \n                <div class=\"ui-e-title-wrp\"><h4 class=\"ui-e-title\">Penetration Testing<\/h4><\/div>\n            <\/div>\n\n            <div class=\"ui-e-box-content\">\n                \n                <div class=\"ui-e-description\">\n                    <p style=\"text-align: left\">Scopri le vulnerabilit\u00e0 della tua rete prima che vengano sfruttate contro di te. Attraverso simulazioni realistiche di attacco analizziamo infrastrutture IT, reti aziendali e sistemi esposti su Internet per individuare punti deboli e configurazioni critiche.<\/p>                <\/div>\n\n                \n            <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0493da1 e-con-full e-flex e-con e-child\" data-id=\"0493da1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-538b3e1 elementor-widget__width-initial elementor-widget-mobile__width-inherit ui-e-align-left ui-e-top ui-e-align-tablet-center ui-e-align-mobile-center elementor-invisible elementor-widget elementor-widget-uicore-icon-box\" data-id=\"538b3e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;content_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;24&quot;,&quot;right&quot;:&quot;24&quot;,&quot;bottom&quot;:&quot;24&quot;,&quot;left&quot;:&quot;24&quot;,&quot;isLinked&quot;:true},&quot;content_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;16&quot;,&quot;right&quot;:&quot;16&quot;,&quot;bottom&quot;:&quot;16&quot;,&quot;left&quot;:&quot;16&quot;,&quot;isLinked&quot;:true},&quot;content_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;20&quot;,&quot;right&quot;:&quot;20&quot;,&quot;bottom&quot;:&quot;20&quot;,&quot;left&quot;:&quot;20&quot;,&quot;isLinked&quot;:true},&quot;_animation_delay&quot;:&quot;500&quot;,&quot;_animation&quot;:&quot;zoomOutUp&quot;,&quot;position&quot;:&quot;top&quot;}\" data-widget_type=\"uicore-icon-box.default\">\n\t\t\t\t\t\n        <div class=\"ui-e-ico-box\" >\n\n            \n            <div class='ui-e-flex-wrp'>\n\n                                    <div class=\"ui-e-icon-wrp\">\n\n                        <i aria-hidden=\"true\" class=\"lu lu-hard-drive\"><\/i>\n                    <\/div>\n                \n                <div class=\"ui-e-title-wrp\"><h4 class=\"ui-e-title\">Data Recovery &amp; Forensics <\/h4><\/div>\n            <\/div>\n\n            <div class=\"ui-e-box-content\">\n                \n                <div class=\"ui-e-description\">\n                    <p style=\"text-align: left\">Ricostruire cosa \u00e8 successo quando i sistemi sono stati compromessi \u00e8 il primo passo per andare avanti. L\u2019analisi forense digitale consente di acquisire dati in modo certificato, ricostruire attivit\u00e0 e accessi, identificare responsabilit\u00e0 e produrre report tecnici con valore probatorio.<\/p>                <\/div>\n\n                \n            <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b15e55d elementor-widget__width-initial elementor-widget-mobile__width-inherit ui-e-align-left ui-e-top ui-e-align-tablet-center ui-e-align-mobile-center elementor-invisible elementor-widget elementor-widget-uicore-icon-box\" data-id=\"b15e55d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;content_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;24&quot;,&quot;right&quot;:&quot;24&quot;,&quot;bottom&quot;:&quot;24&quot;,&quot;left&quot;:&quot;24&quot;,&quot;isLinked&quot;:true},&quot;content_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;16&quot;,&quot;right&quot;:&quot;16&quot;,&quot;bottom&quot;:&quot;16&quot;,&quot;left&quot;:&quot;16&quot;,&quot;isLinked&quot;:true},&quot;content_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;20&quot;,&quot;right&quot;:&quot;20&quot;,&quot;bottom&quot;:&quot;20&quot;,&quot;left&quot;:&quot;20&quot;,&quot;isLinked&quot;:true},&quot;_animation_delay&quot;:&quot;500&quot;,&quot;_animation&quot;:&quot;zoomOutUp&quot;,&quot;position&quot;:&quot;top&quot;}\" data-widget_type=\"uicore-icon-box.default\">\n\t\t\t\t\t\n        <div class=\"ui-e-ico-box\" >\n\n            \n            <div class='ui-e-flex-wrp'>\n\n                                    <div class=\"ui-e-icon-wrp\">\n\n                        <i aria-hidden=\"true\" class=\"lu lu-cpu\"><\/i>\n                    <\/div>\n                \n                <div class=\"ui-e-title-wrp\"><h4 class=\"ui-e-title\">Digital Risk Protection<\/h4><\/div>\n            <\/div>\n\n            <div class=\"ui-e-box-content\">\n                \n                <div class=\"ui-e-description\">\n                    <p style=\"text-align: left\">Valutiamo la tua esposizione al rischio digitale monitorando costantemente minacce, vulnerabilit\u00e0 e segnali d&#8217;allerta prima che diventino un problema. Anticipiamo gli attacchi, proteggiamo la tua reputazione e ti mettiamo nelle condizioni di agire, non di reagire.<\/p>                <\/div>\n\n                \n            <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-359d318 e-flex e-con-boxed e-con e-parent\" data-id=\"359d318\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-01d38c3 e-con-full e-flex e-con e-child\" data-id=\"01d38c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8ec195 elementor-widget__width-auto elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"e8ec195\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomOut&quot;,&quot;_animation_delay&quot;:&quot;300&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">GARANZIE DI QUALIT\u00c0<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aaf26b0 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"aaf26b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomOut&quot;,&quot;_animation_delay&quot;:&quot;300&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sicurezza ed investigazione digitale con standard certificati.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b26b16 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"1b26b16\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomOut&quot;,&quot;_animation_delay&quot;:&quot;400&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Quando si gestiscono incidenti informatici o analisi forensi, la competenza deve essere certificata e inattaccabile, anche in sede legale. Per questo operiamo secondo procedure rigorose e standard riconosciuti.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-be437d4 e-con-full e-flex e-con e-child\" data-id=\"be437d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-37de105 e-con-full e-flex e-con e-child\" data-id=\"37de105\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-43a7371 elementor-widget__width-initial elementor-widget-mobile__width-inherit ui-e-top ui-e-align-center ui-e-align-tablet-center ui-e-align-mobile-center elementor-invisible elementor-widget elementor-widget-uicore-icon-box\" data-id=\"43a7371\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;content_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;24&quot;,&quot;right&quot;:&quot;24&quot;,&quot;bottom&quot;:&quot;24&quot;,&quot;left&quot;:&quot;24&quot;,&quot;isLinked&quot;:true},&quot;content_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;16&quot;,&quot;right&quot;:&quot;16&quot;,&quot;bottom&quot;:&quot;16&quot;,&quot;left&quot;:&quot;16&quot;,&quot;isLinked&quot;:true},&quot;content_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;20&quot;,&quot;right&quot;:&quot;20&quot;,&quot;bottom&quot;:&quot;20&quot;,&quot;left&quot;:&quot;20&quot;,&quot;isLinked&quot;:true},&quot;_animation_delay&quot;:&quot;500&quot;,&quot;_animation&quot;:&quot;zoomOutUp&quot;,&quot;position&quot;:&quot;top&quot;}\" data-widget_type=\"uicore-icon-box.default\">\n\t\t\t\t\t\n        <div class=\"ui-e-ico-box\" >\n\n            \n            <div class='ui-e-flex-wrp'>\n\n                                    <div class=\"ui-e-icon-wrp\">\n\n                        <i aria-hidden=\"true\" class=\"ri ri-bank-line\"><\/i>\n                    <\/div>\n                \n                <div class=\"ui-e-title-wrp\"><h4 class=\"ui-e-title\">Licenza governativa<\/h4><\/div>\n            <\/div>\n\n            <div class=\"ui-e-box-content\">\n                \n                <div class=\"ui-e-description\">\n                    <p>Autorizzazione prefettizia ex art. 134 T.U.L.P.S. per attivit\u00e0 investigative aziendali<\/p>                <\/div>\n\n                \n            <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc4b843 e-con-full e-flex e-con e-child\" data-id=\"dc4b843\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f9998e elementor-widget__width-initial elementor-widget-mobile__width-inherit ui-e-top ui-e-align-center ui-e-align-tablet-center ui-e-align-mobile-center elementor-invisible elementor-widget elementor-widget-uicore-icon-box\" data-id=\"6f9998e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;content_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;24&quot;,&quot;right&quot;:&quot;24&quot;,&quot;bottom&quot;:&quot;24&quot;,&quot;left&quot;:&quot;24&quot;,&quot;isLinked&quot;:true},&quot;content_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;16&quot;,&quot;right&quot;:&quot;16&quot;,&quot;bottom&quot;:&quot;16&quot;,&quot;left&quot;:&quot;16&quot;,&quot;isLinked&quot;:true},&quot;content_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;20&quot;,&quot;right&quot;:&quot;20&quot;,&quot;bottom&quot;:&quot;20&quot;,&quot;left&quot;:&quot;20&quot;,&quot;isLinked&quot;:true},&quot;_animation_delay&quot;:&quot;500&quot;,&quot;_animation&quot;:&quot;zoomOutUp&quot;,&quot;position&quot;:&quot;top&quot;}\" data-widget_type=\"uicore-icon-box.default\">\n\t\t\t\t\t\n        <div class=\"ui-e-ico-box\" >\n\n            \n            <div class='ui-e-flex-wrp'>\n\n                                    <div class=\"ui-e-icon-wrp\">\n\n                        <i aria-hidden=\"true\" class=\"lu lu-file-check\"><\/i>\n                    <\/div>\n                \n                <div class=\"ui-e-title-wrp\"><h4 class=\"ui-e-title\">Validit\u00e0 legale<\/h4><\/div>\n            <\/div>\n\n            <div class=\"ui-e-box-content\">\n                \n                <div class=\"ui-e-description\">\n                    <p>Le analisi tecniche e forensi vengono documentate in report utilizzabili in procedimenti giudiziari.<\/p>                <\/div>\n\n                \n            <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cedd54 e-con-full e-flex e-con e-child\" data-id=\"4cedd54\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9a1b070 elementor-widget__width-initial elementor-widget-mobile__width-inherit ui-e-top ui-e-align-center ui-e-align-tablet-center ui-e-align-mobile-center elementor-invisible elementor-widget elementor-widget-uicore-icon-box\" data-id=\"9a1b070\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;content_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;24&quot;,&quot;right&quot;:&quot;24&quot;,&quot;bottom&quot;:&quot;24&quot;,&quot;left&quot;:&quot;24&quot;,&quot;isLinked&quot;:true},&quot;content_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;16&quot;,&quot;right&quot;:&quot;16&quot;,&quot;bottom&quot;:&quot;16&quot;,&quot;left&quot;:&quot;16&quot;,&quot;isLinked&quot;:true},&quot;content_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;20&quot;,&quot;right&quot;:&quot;20&quot;,&quot;bottom&quot;:&quot;20&quot;,&quot;left&quot;:&quot;20&quot;,&quot;isLinked&quot;:true},&quot;_animation_delay&quot;:&quot;500&quot;,&quot;_animation&quot;:&quot;zoomOutUp&quot;,&quot;position&quot;:&quot;top&quot;}\" data-widget_type=\"uicore-icon-box.default\">\n\t\t\t\t\t\n        <div class=\"ui-e-ico-box\" >\n\n            \n            <div class='ui-e-flex-wrp'>\n\n                                    <div class=\"ui-e-icon-wrp\">\n\n                        <i aria-hidden=\"true\" class=\"lu lu-shield\"><\/i>\n                    <\/div>\n                \n                <div class=\"ui-e-title-wrp\"><h4 class=\"ui-e-title\">Best practice globali<\/h4><\/div>\n            <\/div>\n\n            <div class=\"ui-e-box-content\">\n                \n                <div class=\"ui-e-description\">\n                    <p>Metodologie conformi ai principali standard di Information Security.<\/p>                <\/div>\n\n                \n            <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ecde533 e-con-full e-flex e-con e-child\" data-id=\"ecde533\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-095f8a4 elementor-widget__width-initial elementor-widget-mobile__width-inherit ui-e-top ui-e-align-center ui-e-align-tablet-center ui-e-align-mobile-center elementor-invisible elementor-widget elementor-widget-uicore-icon-box\" data-id=\"095f8a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;content_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;24&quot;,&quot;right&quot;:&quot;24&quot;,&quot;bottom&quot;:&quot;24&quot;,&quot;left&quot;:&quot;24&quot;,&quot;isLinked&quot;:true},&quot;content_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;16&quot;,&quot;right&quot;:&quot;16&quot;,&quot;bottom&quot;:&quot;16&quot;,&quot;left&quot;:&quot;16&quot;,&quot;isLinked&quot;:true},&quot;content_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;20&quot;,&quot;right&quot;:&quot;20&quot;,&quot;bottom&quot;:&quot;20&quot;,&quot;left&quot;:&quot;20&quot;,&quot;isLinked&quot;:true},&quot;_animation_delay&quot;:&quot;500&quot;,&quot;_animation&quot;:&quot;zoomOutUp&quot;,&quot;position&quot;:&quot;top&quot;}\" data-widget_type=\"uicore-icon-box.default\">\n\t\t\t\t\t\n        <div class=\"ui-e-ico-box\" >\n\n            \n            <div class='ui-e-flex-wrp'>\n\n                                    <div class=\"ui-e-icon-wrp\">\n\n                        <i aria-hidden=\"true\" class=\"lu lu-lock\"><\/i>\n                    <\/div>\n                \n                <div class=\"ui-e-title-wrp\"><h4 class=\"ui-e-title\">Protezione dei dati<\/h4><\/div>\n            <\/div>\n\n            <div class=\"ui-e-box-content\">\n                \n                <div class=\"ui-e-description\">\n                    <p>Protocolli rigidi di cifratura e compartimentazione per garantire la massima tutela dei dati del cliente.<\/p>                <\/div>\n\n                \n            <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a12571a e-flex e-con-boxed e-con e-parent\" data-id=\"a12571a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-438239d e-con-full e-flex e-con e-child\" data-id=\"438239d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-910e3ba elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"910e3ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomOut&quot;,&quot;_animation_delay&quot;:&quot;300&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Quando si parla di sicurezza informatica,\nle aziende scelgono noi.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-288a57e elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"288a57e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomOut&quot;,&quot;_animation_delay&quot;:&quot;400&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Direzioni IT, CISO e responsabili legali si affidano a KII per gestire incidenti complessi e investigazioni digitali.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-42d9d14 e-con-full e-flex e-con e-child\" data-id=\"42d9d14\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4c4f39f ui-e-layout_3 ui-e-animation-fade_blur ui-e-match-height-yes elementor-invisible elementor-widget elementor-widget-uicore-testimonial-carousel\" data-id=\"4c4f39f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;layout&quot;:&quot;layout_3&quot;,&quot;carousel_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:24,&quot;sizes&quot;:[]},&quot;carousel_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:20,&quot;sizes&quot;:[]},&quot;slides_per_view&quot;:&quot;3&quot;,&quot;navigation&quot;:&quot;dots&quot;,&quot;_animation_delay&quot;:&quot;500&quot;,&quot;_animation&quot;:&quot;zoomOutUp&quot;,&quot;animation_style&quot;:&quot;fade_blur&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;true&quot;,&quot;carousel_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;slides_per_view_tablet&quot;:2,&quot;slides_per_view_mobile&quot;:1,&quot;show_hidden&quot;:&quot;hidden&quot;,&quot;autoplay_speed&quot;:5000,&quot;grab_cursor&quot;:&quot;yes&quot;,&quot;loop&quot;:&quot;true&quot;,&quot;overflow_container&quot;:&quot;container&quot;}\" data-widget_type=\"uicore-testimonial-carousel.default\">\n\t\t\t\t\t        <div class=\"ui-e-carousel swiper\">\n            <div class='swiper-wrapper'>\n                \n        <div class=\"ui-e-wrp swiper-slide\">\n                            <div class=\"ui-e-animations-wrp  \">\n                                <div class=\"ui-e-item\">\n                            <div class=\"ui-e-content\">\n\n                        <div class=\"ui-e-testimonial-rating \">\n                                        <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                <\/div>\n                            <div class=\"ui-e-testimonial-text \">\n                <p>La struttura operativa di KII ha gestito per noi numerose pratiche su tutto il territorio Nazionale fornendoci informazioni fondamentali che ci hanno consentito di prendere le giuste decisioni. Siamo stati affiancati in maniera discreta e mai invasiva nella nostra quotidianit\u00e0 e tutte le attivit\u00e0 loro commissionate sono state eseguite con il supporto di tecnologia all\u2019avanguardia garantendo sicurezza e privacy, sempre nel rispetto della normativa vigente.<\/p>            <\/div>\n                \n                                <h4 class=\"ui-e-testimonial-name \">\n                <span>Dott. M.C.<\/span>\n            <\/h4>\n                                <div class=\"ui-e-testimonial-job-title \">\n                <span>HR Director<\/span>\n            <\/div>\n                    <\/div>\n                    <\/div>\n                                <\/div>\n                    <\/div>\n    \n        <div class=\"ui-e-wrp swiper-slide\">\n                            <div class=\"ui-e-animations-wrp  \">\n                                <div class=\"ui-e-item\">\n                            <div class=\"ui-e-content\">\n\n                        <div class=\"ui-e-testimonial-rating \">\n                                        <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                <\/div>\n                            <div class=\"ui-e-testimonial-text \">\n                <p>Grande professionalit\u00e0 ed esperienza. Riescono a spaziare da progetti di security a piani di protezione informatica con i sistemi pi\u00f9 innovativi. Una consulenza sempre affidabile, con un\u2019attenzione ai costi per il committente assolutamente non banale.<\/p>            <\/div>\n                \n                                <h4 class=\"ui-e-testimonial-name \">\n                <span>Dott.ssa V.T. <\/span>\n            <\/h4>\n                                <div class=\"ui-e-testimonial-job-title \">\n                <span>HR Director<\/span>\n            <\/div>\n                    <\/div>\n                    <\/div>\n                                <\/div>\n                    <\/div>\n    \n        <div class=\"ui-e-wrp swiper-slide\">\n                            <div class=\"ui-e-animations-wrp  \">\n                                <div class=\"ui-e-item\">\n                            <div class=\"ui-e-content\">\n\n                        <div class=\"ui-e-testimonial-rating \">\n                                        <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                <\/div>\n                            <div class=\"ui-e-testimonial-text \">\n                <p>\u00a0<\/p><p>Abbiamo affidato nel tempo a KII numerosi incarichi nel settore dell\u2019intelligence, delle investigazioni e della security che sono sempre stati portati a termine con regolarit\u00e0, precisione e riservatezza. Inoltre, abbiamo molto apprezzato la tempestiva reattivit\u00e0 alle nostre richieste\/esigenze per lo svolgimento di attivit\u00e0, spesso complesse, su tutto il territorio Nazionale.<\/p>            <\/div>\n                \n                                <h4 class=\"ui-e-testimonial-name \">\n                <span>Dott. A.V.<\/span>\n            <\/h4>\n                                <div class=\"ui-e-testimonial-job-title \">\n                <span>Direttore Affari Legali<\/span>\n            <\/div>\n                    <\/div>\n                    <\/div>\n                                <\/div>\n                    <\/div>\n    \n        <div class=\"ui-e-wrp swiper-slide\">\n                            <div class=\"ui-e-animations-wrp  \">\n                                <div class=\"ui-e-item\">\n                            <div class=\"ui-e-content\">\n\n                        <div class=\"ui-e-testimonial-rating \">\n                                        <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                <\/div>\n                            <div class=\"ui-e-testimonial-text \">\n                <p>\u00a0<\/p><p>Abbiamo affidato a KII diversi incarichi investigativi sia sul territorio Nazionale che all\u2019estero. Tutte le attivit\u00e0 commissionate sono state eseguite con professionalit\u00e0, scrupolo, puntualit\u00e0 e riservatezza con piena soddisfazione da parte dello scrivente.<\/p>            <\/div>\n                \n                                <h4 class=\"ui-e-testimonial-name \">\n                <span>Dott. P.N.<\/span>\n            <\/h4>\n                                <div class=\"ui-e-testimonial-job-title \">\n                <span>Direttore Sicurezza e Servizi<\/span>\n            <\/div>\n                    <\/div>\n                    <\/div>\n                                <\/div>\n                    <\/div>\n    \n        <div class=\"ui-e-wrp swiper-slide\">\n                            <div class=\"ui-e-animations-wrp  \">\n                                <div class=\"ui-e-item\">\n                            <div class=\"ui-e-content\">\n\n                        <div class=\"ui-e-testimonial-rating \">\n                                        <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                            <div class=\"ui-e-icon\">\n                            <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg>                        <\/div>\n                                <\/div>\n                            <div class=\"ui-e-testimonial-text \">\n                <p>\u00a0<\/p><p>KII fornisce un contributo estremamente valido nei processi inerenti la sicurezza delle informazioni. E\u2019 apprezzata la forte competenza in consulenze di cyber security, la gestione di incidenti e la fornitura ed il supporto della tecnologia Darktrace.<\/p>            <\/div>\n                \n                                <h4 class=\"ui-e-testimonial-name \">\n                <span>Dott. A.E.C.<\/span>\n            <\/h4>\n                                <div class=\"ui-e-testimonial-job-title \">\n                <span>Chief Information Security Officer<\/span>\n            <\/div>\n                    <\/div>\n                    <\/div>\n                                <\/div>\n                    <\/div>\n                <\/div>\n        <\/div>\n                <div class=\"swiper-pagination ui-e-dots ui-e-carousel-dots\"><\/div>\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-40077f4 e-con-full e-flex e-con e-child\" data-id=\"40077f4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7210504 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"7210504\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomOut&quot;,&quot;_animation_delay&quot;:&quot;300&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Non aspettare che la tua azienda venga colpita.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85e1c5a elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"85e1c5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomOutRight&quot;,&quot;_animation_delay&quot;:&quot;300&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Gli attacchi informatici spesso sfruttano debolezze che non sono ancora state identificate. Agisci prima che una vulnerabilit\u00e0 diventi un costo irreparabile.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e20b07 elementor-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"1e20b07\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomOutRight&quot;,&quot;_animation_delay&quot;:&quot;500&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Richiedi una consulenza immediata<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>SICUREZZA INFORMATICA AVANZATA Un attacco informatico pu\u00f2 fermare la tua azienda in poche ore. Ransomware, furti di dati e vulnerabilit\u00e0 nei sistemi informatici sono oggi tra i principali rischi per le imprese. I nostri servizi di\u00a0Cyber Security\u00a0individuano le vulnerabilit\u00e0, contengono gli attacchi e ricostruiscono gli eventi attraverso\u00a0analisi tecniche e forensi utilizzabili in sede legale. Intervento [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-79","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cybersecurity.kii.agency\/index.php?rest_route=\/wp\/v2\/pages\/79","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.kii.agency\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.kii.agency\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.kii.agency\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.kii.agency\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=79"}],"version-history":[{"count":99,"href":"https:\/\/cybersecurity.kii.agency\/index.php?rest_route=\/wp\/v2\/pages\/79\/revisions"}],"predecessor-version":[{"id":319,"href":"https:\/\/cybersecurity.kii.agency\/index.php?rest_route=\/wp\/v2\/pages\/79\/revisions\/319"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.kii.agency\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=79"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}