{"id":6614,"date":"2024-02-12T12:56:11","date_gmt":"2024-02-12T12:56:11","guid":{"rendered":"https:\/\/www.40-factory.com\/consulenza-cybersecurity\/"},"modified":"2024-05-11T08:44:02","modified_gmt":"2024-05-11T08:44:02","slug":"cybersecurity-consulting","status":"publish","type":"page","link":"https:\/\/www.40-factory.com\/en\/cybersecurity-consulting\/","title":{"rendered":"Cybersecurity consulting"},"content":{"rendered":"\n\t<section class=\"section\" id=\"section_1723872452\">\n\t\t<div class=\"bg section-bg fill bg-fill  \" >\n\n\t\t\t\n\t\t\t<div class=\"section-bg-overlay absolute fill\"><\/div>\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row container\"  id=\"row-779966628\">\n\n\n\t<div id=\"col-2061074589\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-3496577746\" class=\"text max-w-none\">\n\t\t\n\n<h3>Cybersecurity Consulting<\/h3>\n<p class=\"main-pera\">The implementation of IIoT solutions opens up new frontiers of efficiency and innovation, but at the same time exposes companies to new security risks. With the introduction of the new machinery regulation, Cybersecurity forcefully enters the world of machinery. The goal of our Cybersecurity consulting is to certify the security status of the IIoT solution on both the Cloud and Edge side, with the issuance of a report to be used with end customers.<\/p>\n\t\t\t<\/div>\n\t\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\n<style>\n#row-779966628 > .col > .col-inner {\n  padding: 30% 0px 0px 0px;\n}\n@media (min-width:850px) {\n  #row-779966628 > .col > .col-inner {\n    padding: 40% 0px 20px 0px;\n  }\n}\n<\/style>\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_1723872452 {\n  padding-top: 0px;\n  padding-bottom: 0px;\n  min-height: 400px;\n}\n#section_1723872452 .section-bg-overlay {\n  background-color: rgba(8, 10, 27, 0.709);\n}\n#section_1723872452 .section-bg.bg-loaded {\n  background-image: url(https:\/\/www.40-factory.com\/wp-content\/uploads\/2024\/04\/shutterstock_1997638481.png);\n}\n@media (min-width:550px) {\n  #section_1723872452 {\n    min-height: 613px;\n  }\n}\n@media (min-width:850px) {\n  #section_1723872452 {\n    min-height: 800px;\n  }\n}\n<\/style>\n\t<\/section>\n\t\n\n\t<section class=\"section\" id=\"section_776277842\">\n\t\t<div class=\"bg section-bg fill bg-fill  bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row container\"  id=\"row-504248513\">\n\n\n\t<div id=\"col-790078618\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"gap-628452135\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-628452135 {\n  padding-top: 50px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<h3 class=\"accordion_title\">Mode<\/h3><div class=\"accordion\">\n\n\t<div id=\"accordion-161091688\" class=\"accordion-item\">\n\t\t<a id=\"accordion-161091688-label\" class=\"accordion-title plain\" href=\"#accordion-item-assessment-&#038;-penetration-test\" aria-expanded=\"false\" aria-controls=\"accordion-161091688-content\" >\n\t\t\t<button class=\"toggle\" aria-label=\"Toggle\"><i class=\"icon-angle-down\"><\/i><\/button>\n\t\t\t<span>Assessment & Penetration Test<\/span>\n\t\t<\/a>\n\t\t<div id=\"accordion-161091688-content\" class=\"accordion-inner\" aria-labelledby=\"accordion-161091688-label\" >\n\t\t\t\n\n<ul class=\"service-list\">\n<li>Assessment + Penetration Test of the IIoT cloud solution on the customer&#8217;s tenant<\/li>\n<li>Verification of data segregation and related permissions<\/li>\n<li>Evaluation of Cloud resource management and related risks<\/li>\n<li>Issuance of a report including Cybersecurity provider certifications, test results, and critical issues detected to share with end customers in the proposal phase<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\t<div id=\"accordion-2441327539\" class=\"accordion-item\">\n\t\t<a id=\"accordion-2441327539-label\" class=\"accordion-title plain\" href=\"#accordion-item-edge-device-monitoring\" aria-expanded=\"false\" aria-controls=\"accordion-2441327539-content\" >\n\t\t\t<button class=\"toggle\" aria-label=\"Toggle\"><i class=\"icon-angle-down\"><\/i><\/button>\n\t\t\t<span>Edge Device Monitoring<\/span>\n\t\t<\/a>\n\t\t<div id=\"accordion-2441327539-content\" class=\"accordion-inner\" aria-labelledby=\"accordion-2441327539-label\" >\n\t\t\t\n\n<ul class=\"service-list\">\n<li>Creation of the digital twin of edge devices and all software components<\/li>\n<li>Implementation of a monitoring system and alerts in case potentially risky vulnerabilities are discovered on the installed device fleet<\/li>\n<li>Support in defining a resolution plan<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n\t\n\n<\/div>\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_776277842 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n<\/style>\n\t<\/section>\n\t\n\n\n\t<section class=\"section get-in-touch\" id=\"section_1662526261\">\n\t\t<div class=\"bg section-bg fill bg-fill  bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\n<div class=\"row padding-x\"  id=\"row-1880559334\">\n\n\n\t<div id=\"col-2000804277\" class=\"col pb-none btn-extra-space small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner text-center\"  >\n\t\t\t\n\t\t\t\n\n\t<div id=\"text-4228149605\" class=\"text\">\n\t\t\n\n<h3>Ensure maximum security<\/h3>\n<p class=\"main-pera\">Contact us for more information<\/p>\n\n\t\t\n<style>\n#text-4228149605 {\n  color: rgb(255, 255, 255);\n}\n#text-4228149605 > * {\n  color: rgb(255, 255, 255);\n}\n<\/style>\n\t<\/div>\n\t\n<a href=\"https:\/\/www.40-factory.com\/en\/contacts\/\" class=\"button primary custom-btn fill-btn\"  >\n    <span>Contact us<\/span>\n  <\/a>\n\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n<\/div>\n\n\t\t<\/div>\n\n\t\t\n<style>\n#section_1662526261 {\n  padding-top: 0px;\n  padding-bottom: 0px;\n}\n<\/style>\n\t<\/section>\n\t\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6614","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity consulting - 40FACTORY<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.40-factory.com\/en\/cybersecurity-consulting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity consulting - 40FACTORY\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.40-factory.com\/en\/cybersecurity-consulting\/\" \/>\n<meta property=\"og:site_name\" content=\"40FACTORY\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-11T08:44:02+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.40-factory.com\\\/en\\\/cybersecurity-consulting\\\/\",\"url\":\"https:\\\/\\\/www.40-factory.com\\\/en\\\/cybersecurity-consulting\\\/\",\"name\":\"Cybersecurity consulting - 40FACTORY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.40-factory.com\\\/#website\"},\"datePublished\":\"2024-02-12T12:56:11+00:00\",\"dateModified\":\"2024-05-11T08:44:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.40-factory.com\\\/en\\\/cybersecurity-consulting\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.40-factory.com\\\/en\\\/cybersecurity-consulting\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.40-factory.com\\\/en\\\/cybersecurity-consulting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.40-factory.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity consulting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.40-factory.com\\\/#website\",\"url\":\"https:\\\/\\\/www.40-factory.com\\\/\",\"name\":\"40FACTORY\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.40-factory.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity consulting - 40FACTORY","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.40-factory.com\/en\/cybersecurity-consulting\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity consulting - 40FACTORY","og_url":"https:\/\/www.40-factory.com\/en\/cybersecurity-consulting\/","og_site_name":"40FACTORY","article_modified_time":"2024-05-11T08:44:02+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.40-factory.com\/en\/cybersecurity-consulting\/","url":"https:\/\/www.40-factory.com\/en\/cybersecurity-consulting\/","name":"Cybersecurity consulting - 40FACTORY","isPartOf":{"@id":"https:\/\/www.40-factory.com\/#website"},"datePublished":"2024-02-12T12:56:11+00:00","dateModified":"2024-05-11T08:44:02+00:00","breadcrumb":{"@id":"https:\/\/www.40-factory.com\/en\/cybersecurity-consulting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.40-factory.com\/en\/cybersecurity-consulting\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.40-factory.com\/en\/cybersecurity-consulting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.40-factory.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity consulting"}]},{"@type":"WebSite","@id":"https:\/\/www.40-factory.com\/#website","url":"https:\/\/www.40-factory.com\/","name":"40FACTORY","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.40-factory.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.40-factory.com\/en\/wp-json\/wp\/v2\/pages\/6614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.40-factory.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.40-factory.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.40-factory.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.40-factory.com\/en\/wp-json\/wp\/v2\/comments?post=6614"}],"version-history":[{"count":6,"href":"https:\/\/www.40-factory.com\/en\/wp-json\/wp\/v2\/pages\/6614\/revisions"}],"predecessor-version":[{"id":7655,"href":"https:\/\/www.40-factory.com\/en\/wp-json\/wp\/v2\/pages\/6614\/revisions\/7655"}],"wp:attachment":[{"href":"https:\/\/www.40-factory.com\/en\/wp-json\/wp\/v2\/media?parent=6614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}