{"id":58285,"date":"2024-05-23T15:46:10","date_gmt":"2024-05-23T14:46:10","guid":{"rendered":"https:\/\/www.wallix.com\/?p=58285"},"modified":"2024-05-28T14:59:54","modified_gmt":"2024-05-28T13:59:54","slug":"la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/it\/risorse\/webinars-it\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\/","title":{"rendered":"La cyber sicurezza nei contesti industriali : Gestione, Monitoraggio e Auditing degli accessi remoti negli ambienti OT"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_two_third  avia-builder-el-first   container_wrap fullsize'  ><div  class='avia-slideshow av-lr63enne-7ea4f83b83aaca51c41e1e88120380a3 avia-slideshow-entry_without_sidebar av_slideshow_full avia-slide-slider av-slideshow-ui av-control-default av-slideshow-manual av-loop-once av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 34.95867768595%;'><\/ul><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-58285'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-lrjautuc-b774110824a631916e5e71e5bb3f1b64 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lrjautuc-b774110824a631916e5e71e5bb3f1b64\">\n#top .flex_column_table.av-equal-height-column-flextable.av-lrjautuc-b774110824a631916e5e71e5bb3f1b64{\nmargin-top:-500px;\nmargin-bottom:0;\n}\n.flex_column.av-lrjautuc-b774110824a631916e5e71e5bb3f1b64{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-lrjautuc-b774110824a631916e5e71e5bb3f1b64{\nmargin-top:-150px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-lrjautuc-b774110824a631916e5e71e5bb3f1b64 av_two_third  avia-builder-el-1  el_after_av_slideshow_full  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lr639uyu-61762107aae6a475714827cdb7bdcb2d\">\n#top .av-special-heading.av-lr639uyu-61762107aae6a475714827cdb7bdcb2d{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lr639uyu-61762107aae6a475714827cdb7bdcb2d .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lr639uyu-61762107aae6a475714827cdb7bdcb2d .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lr639uyu-61762107aae6a475714827cdb7bdcb2d av-special-heading-h1 blockquote modern-quote  avia-builder-el-2  el_before_av_textblock  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >La cyber sicurezza nei contesti industriali : Gestione, Monitoraggio e Auditing degli accessi remoti negli ambienti OT<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-lr63aae6-51e203510f4d4eb668a167e2145e7a2a '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div>\n<p><span style=\"color: #000000;\">I contesti industriali \u2013 i cosidetti ambienti OT \u2013 sono oggi pi\u00f9 che mai vulnerabili e soggetti a minacce informatiche di cyber sicurezza. Il settore produttivo \u00e8 coinvolto nella realizzazione di beni di consumo e contribuisce in modo determinante alle economie dei Paesi, risultando quindi un interessante target.<\/span><\/p>\n<div><\/div>\n<div><span style=\"color: #000000;\">Il moltiplicarsi degli accessi, molti dei quali da remoto, agli asset digitali come PLC e HMI (Human Machine Interface) da parte di terze parti, ad esempio per attivit\u00e0 di manutenzione e verifica degli apparati, se non controllato adeguatamente pu\u00f2 rappresentare una seria vulnerabilit\u00e0.<\/span><\/div>\n<div><\/div>\n<p><span style=\"color: #000000;\">Il webinar prende in esame la sfida degli accessi remoti e mostra (demo) l\u2019applicazione a un caso reale delle soluzioni WALLIX in ambito OT, per affrontare con successo problematiche comuni alla maggior parte delle aziende produttive.<\/span><\/p>\n<\/div>\n<div><\/div>\n<div><span style=\"color: #000000;\">Guardate ora il replay.<\/span><\/div>\n<\/div><\/section><br \/>\n<div  class='hr av-lwqgs8y6-2257c7c75de6fc3b55bf7694575ef13f hr-short  avia-builder-el-4  el_after_av_textblock  el_before_av_codeblock  hr-center'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3jjfvb1-e5d47a670a6756d8e6ca18d9b3de7232\">\n#top .flex_column_table.av-equal-height-column-flextable.av-3jjfvb1-e5d47a670a6756d8e6ca18d9b3de7232{\nmargin-top:-500px;\nmargin-bottom:0;\n}\n.flex_column.av-3jjfvb1-e5d47a670a6756d8e6ca18d9b3de7232{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-3jjfvb1-e5d47a670a6756d8e6ca18d9b3de7232{\nmargin-top:-150px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-3jjfvb1-e5d47a670a6756d8e6ca18d9b3de7232 av_one_third  avia-builder-el-6  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-2x83orh-f7b1859971c8f688feea7eaddfd6bd1a av-social-sharing-box-default  avia-builder-el-7  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Condividi questa voce<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Condividi su X\" href='https:\/\/twitter.com\/share?text=La%20cyber%20sicurezza%20nei%20contesti%20industriali%20%3A%20Gestione%2C%20Monitoraggio%20e%20Auditing%20degli%20accessi%20remoti%20negli%20ambienti%20OT&#038;url=https:\/\/www.wallix.com\/it\/?p=58285' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Condividi su X'><span class='avia_hidden_link_text'>Condividi su X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Condividi su LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=La%20cyber%20sicurezza%20nei%20contesti%20industriali%20%3A%20Gestione%2C%20Monitoraggio%20e%20Auditing%20degli%20accessi%20remoti%20negli%20ambienti%20OT&#038;url=https:\/\/www.wallix.com\/it\/risorse\/webinars-it\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Condividi su LinkedIn'><span class='avia_hidden_link_text'>Condividi su LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Condividi attraverso Mail\" href='mailto:?subject=La%20cyber%20sicurezza%20nei%20contesti%20industriali%20%3A%20Gestione%2C%20Monitoraggio%20e%20Auditing%20degli%20accessi%20remoti%20negli%20ambienti%20OT&#038;body=https:\/\/www.wallix.com\/it\/risorse\/webinars-it\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Condividi attraverso Mail'><span class='avia_hidden_link_text'>Condividi attraverso Mail<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2haa3x9-213fa2ae720c0cf75470b8e2ca96edd9\">\n#top .hr.hr-invisible.av-2haa3x9-213fa2ae720c0cf75470b8e2ca96edd9{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2haa3x9-213fa2ae720c0cf75470b8e2ca96edd9 hr-invisible  avia-builder-el-8  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-22m4h6l-68ad7da3aa7ab6ad316fe9d6021e6a7f\">\n#top .av-special-heading.av-22m4h6l-68ad7da3aa7ab6ad316fe9d6021e6a7f{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-22m4h6l-68ad7da3aa7ab6ad316fe9d6021e6a7f .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-22m4h6l-68ad7da3aa7ab6ad316fe9d6021e6a7f .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-22m4h6l-68ad7da3aa7ab6ad316fe9d6021e6a7f av-special-heading-h3 blockquote modern-quote  avia-builder-el-9  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Contenuti correlati<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1r58d5p-72a6904cfe49f23600603409c903a37e\">\n#top .hr.hr-invisible.av-1r58d5p-72a6904cfe49f23600603409c903a37e{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-1r58d5p-72a6904cfe49f23600603409c903a37e hr-invisible  avia-builder-el-10  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-lrj5lstv-39a5110a533f8b13743ceaa7cd109df6  avia-builder-el-11  el_after_av_hr  el_before_av_heading   avia-builder-el-11  el_after_av_hr  el_before_av_heading ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-86677 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: La parte pi\u00f9 pericolosa dell&#039;attacco \u00e8 avvenuta mesi prima che qualcuno lo sapesse\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-30T10:24:20+01:00\" >30 Marzo 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/blogpost\/la-parte-piu-pericolosa-dellattacco-e-avvenuta-mesi-prima-che-qualcuno-lo-sapesse\/' title='Link a: La parte pi\u00f9 pericolosa dell&#8217;attacco \u00e8 avvenuta mesi prima che qualcuno lo sapesse'>La parte pi\u00f9 pericolosa dell&#8217;attacco \u00e8 avvenuta mesi prima che qualcuno lo sapesse<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-84466 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Come proteggere l&#039;accesso di terzi?\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-02-24T14:59:41+01:00\" >24 Febbraio 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/blogpost\/come-proteggere-laccesso-di-terzi\/' title='Link a: Come proteggere l&#8217;accesso di terzi?'>Come proteggere l&#8217;accesso di terzi?<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-61766 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Sfide Cyber OT per le Strutture di Acqua e Acque Reflue in Italia\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-11-18T10:50:26+01:00\" >18 Novembre 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/blogpost\/sfide-cyber-ot-per-le-strutture-di-acqua-e-acque-reflue-in-italia\/' title='Link a: Sfide Cyber OT per le Strutture di Acqua e Acque Reflue in Italia'>Sfide Cyber OT per le Strutture di Acqua e Acque Reflue in Italia<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-74445 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Sicurezza IT e OT: Criticit\u00e0 nella gestione degli accessi Privilegiati e Remoti\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-07-02T15:49:02+01:00\" >2 Luglio 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/blogpost\/sicurezza-it-e-ot-criticita-nella-gestione-degli-accessi-privilegiati-e-remoti\/' title='Link a: Sicurezza IT e OT: Criticit\u00e0 nella gestione degli accessi Privilegiati e Remoti'>Sicurezza IT e OT: Criticit\u00e0 nella gestione degli accessi Privilegiati e Remoti<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68435 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Session Manager: Cos&#039;\u00e8 e perch\u00e9 ti serve\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T16:08:12+01:00\" >12 Febbraio 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/blogpost\/session-manager-cose-e-perche-ti-serve\/' title='Link a: Session Manager: Cos&#8217;\u00e8 e perch\u00e9 ti serve'>Session Manager: Cos&#8217;\u00e8 e perch\u00e9 ti serve<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1ax89vh-d82f0e6f2a2d9a70aa540be61a0db990\">\n#top .av-special-heading.av-1ax89vh-d82f0e6f2a2d9a70aa540be61a0db990{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1ax89vh-d82f0e6f2a2d9a70aa540be61a0db990 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1ax89vh-d82f0e6f2a2d9a70aa540be61a0db990 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-1ax89vh-d82f0e6f2a2d9a70aa540be61a0db990 av-special-heading-h3 blockquote modern-quote  avia-builder-el-12  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Risorse correlate<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-mq0od9-afb2b807cb01092fe4f3a1d6c86cd452\">\n#top .hr.hr-invisible.av-mq0od9-afb2b807cb01092fe4f3a1d6c86cd452{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-mq0od9-afb2b807cb01092fe4f3a1d6c86cd452 hr-invisible  avia-builder-el-13  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-2\"  class='av-magazine av-lrj5mux9-92b2c8a81317be9d7557913232a883ae  avia-builder-el-14  el_after_av_hr  avia-builder-el-last   avia-builder-el-14  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-68719 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Bank of Africa sceglie WALLIX PAM per proteggere l&#039;accesso al suo sistema IT\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-14T11:59:57+01:00\" >14 Febbraio 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/risorse\/success-stories-it-risorse\/bank-of-africa-sceglie-wallix-pam-per-proteggere-laccesso-al-suo-sistema-it\/' title='Link a: Bank of Africa sceglie WALLIX PAM per proteggere l&#8217;accesso al suo sistema IT'>Bank of Africa sceglie WALLIX PAM per proteggere l&#8217;accesso al suo sistema IT<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68153 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: L&#039;aeroporto di Bordeaux sceglie WALLIX PAM per proteggere il suo accesso remoto\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T10:09:57+01:00\" >12 Febbraio 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/risorse\/success-stories-it-risorse\/laeroporto-di-bordeaux-sceglie-wallix-pam-per-proteggere-il-suo-accesso-remoto\/' title='Link a: L&#8217;aeroporto di Bordeaux sceglie WALLIX PAM per proteggere il suo accesso remoto'>L&#8217;aeroporto di Bordeaux sceglie WALLIX PAM per proteggere il suo accesso remoto<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-63647 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Proteggi le tue strutture sanitarie con il programma CaRE!\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-10-04T09:46:40+01:00\" >4 Ottobre 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/risorse\/whitepaper-it\/proteggi-le-tue-strutture-sanitarie-con-il-programma-care\/' title='Link a: Proteggi le tue strutture sanitarie con il programma CaRE!'>Proteggi le tue strutture sanitarie con il programma CaRE!<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-61251 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: GARANTIRE IL FUTURO: Salvaguardare gli ambienti OT nell\u2019industria manifatturiera italiana e non solo\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-08-09T10:32:59+01:00\" >9 Agosto 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/risorse\/whitepaper-it\/whitepaper-audit-compliance-it\/garantire-il-futuro-salvaguardare-gli-ambienti-ot-nellindustria-manifatturiera-italiana-e-non-solo\/' title='Link a: GARANTIRE IL FUTURO: Salvaguardare gli ambienti OT nell\u2019industria manifatturiera italiana e non solo'>GARANTIRE IL FUTURO: Salvaguardare gli ambienti OT nell\u2019industria manifatturiera italiana e non solo<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-60634 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Proteggi le tue operazioni di produzione dai cyber attacchi\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-07-22T11:13:25+01:00\" >22 Luglio 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/risorse\/whitepaper-it\/whitepaper-audit-compliance-it\/proteggi-le-tue-operazioni-di-produzione-dai-cyber-attacchi\/' title='Link a: Proteggi le tue operazioni di produzione dai cyber attacchi'>Proteggi le tue operazioni di produzione dai cyber attacchi<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":41084,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[2074,2021],"tags":[],"class_list":["post-58285","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industria-it-3","category-webinars-it"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La cyber sicurezza nei contesti industriali : Gestione, Monitoraggio e Auditing degli accessi remoti negli ambienti OT - WALLIX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/it\/risorse\/webinars-it\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La cyber sicurezza nei contesti industriali : Gestione, Monitoraggio e Auditing degli accessi remoti negli ambienti OT - WALLIX\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/it\/risorse\/webinars-it\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-23T14:46:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-28T13:59:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/01\/WEBINAR_wallix.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"705\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/risorse\\\/webinars-it\\\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/risorse\\\/webinars-it\\\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#\\\/schema\\\/person\\\/20943bf30b135b2bcc1b4a4159521f5c\"},\"headline\":\"La cyber sicurezza nei contesti industriali : Gestione, Monitoraggio e Auditing degli accessi remoti negli ambienti OT\",\"datePublished\":\"2024-05-23T14:46:10+00:00\",\"dateModified\":\"2024-05-28T13:59:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/risorse\\\/webinars-it\\\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\\\/\"},\"wordCount\":1923,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/risorse\\\/webinars-it\\\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/WEBINAR_wallix.png\",\"articleSection\":[\"INDUSTRIA\",\"WEBINARS\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/risorse\\\/webinars-it\\\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/risorse\\\/webinars-it\\\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\\\/\",\"name\":\"La cyber sicurezza nei contesti industriali : Gestione, Monitoraggio e Auditing degli accessi remoti negli ambienti OT - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/risorse\\\/webinars-it\\\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/risorse\\\/webinars-it\\\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/WEBINAR_wallix.png\",\"datePublished\":\"2024-05-23T14:46:10+00:00\",\"dateModified\":\"2024-05-28T13:59:54+00:00\",\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/it\\\/risorse\\\/webinars-it\\\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/risorse\\\/webinars-it\\\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/WEBINAR_wallix.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/WEBINAR_wallix.png\",\"width\":1000,\"height\":705,\"caption\":\"Promotional image for a WALLIX webinar, highlighting an online session focused on cybersecurity solutions and insights. The visual emphasizes knowledge sharing, expert guidance, and interactive learning opportunities.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#\\\/schema\\\/person\\\/20943bf30b135b2bcc1b4a4159521f5c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db7f06118b47cad9dda3008e06e43ba14f3c688cdbc6c42cef9a9c50e1ef1751?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db7f06118b47cad9dda3008e06e43ba14f3c688cdbc6c42cef9a9c50e1ef1751?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db7f06118b47cad9dda3008e06e43ba14f3c688cdbc6c42cef9a9c50e1ef1751?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La cyber sicurezza nei contesti industriali : Gestione, Monitoraggio e Auditing degli accessi remoti negli ambienti OT - WALLIX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/it\/risorse\/webinars-it\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\/","og_locale":"it_IT","og_type":"article","og_title":"La cyber sicurezza nei contesti industriali : Gestione, Monitoraggio e Auditing degli accessi remoti negli ambienti OT - WALLIX","og_url":"https:\/\/www.wallix.com\/it\/risorse\/webinars-it\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\/","og_site_name":"WALLIX","article_published_time":"2024-05-23T14:46:10+00:00","article_modified_time":"2024-05-28T13:59:54+00:00","og_image":[{"width":1000,"height":705,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/01\/WEBINAR_wallix.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Scritto da":"admin","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/it\/risorse\/webinars-it\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/it\/risorse\/webinars-it\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\/"},"author":{"name":"admin","@id":"https:\/\/www.wallix.com\/it\/#\/schema\/person\/20943bf30b135b2bcc1b4a4159521f5c"},"headline":"La cyber sicurezza nei contesti industriali : Gestione, Monitoraggio e Auditing degli accessi remoti negli ambienti OT","datePublished":"2024-05-23T14:46:10+00:00","dateModified":"2024-05-28T13:59:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/it\/risorse\/webinars-it\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\/"},"wordCount":1923,"publisher":{"@id":"https:\/\/www.wallix.com\/it\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/it\/risorse\/webinars-it\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/01\/WEBINAR_wallix.png","articleSection":["INDUSTRIA","WEBINARS"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/it\/risorse\/webinars-it\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\/","url":"https:\/\/www.wallix.com\/it\/risorse\/webinars-it\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\/","name":"La cyber sicurezza nei contesti industriali : Gestione, Monitoraggio e Auditing degli accessi remoti negli ambienti OT - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/it\/risorse\/webinars-it\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/it\/risorse\/webinars-it\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/01\/WEBINAR_wallix.png","datePublished":"2024-05-23T14:46:10+00:00","dateModified":"2024-05-28T13:59:54+00:00","inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/it\/risorse\/webinars-it\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.wallix.com\/it\/risorse\/webinars-it\/la-cyber-sicurezza-nei-contesti-industriali-gestione-monitoraggio-e-auditing-degli-accessi-remoti-negli-ambienti-ot\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/01\/WEBINAR_wallix.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/01\/WEBINAR_wallix.png","width":1000,"height":705,"caption":"Promotional image for a WALLIX webinar, highlighting an online session focused on cybersecurity solutions and insights. The visual emphasizes knowledge sharing, expert guidance, and interactive learning opportunities."},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/it\/#website","url":"https:\/\/www.wallix.com\/it\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/it\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.wallix.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/it\/#\/schema\/person\/20943bf30b135b2bcc1b4a4159521f5c","name":"admin","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/db7f06118b47cad9dda3008e06e43ba14f3c688cdbc6c42cef9a9c50e1ef1751?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/db7f06118b47cad9dda3008e06e43ba14f3c688cdbc6c42cef9a9c50e1ef1751?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/db7f06118b47cad9dda3008e06e43ba14f3c688cdbc6c42cef9a9c50e1ef1751?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/www.wallix.com\/it\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts\/58285","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/comments?post=58285"}],"version-history":[{"count":7,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts\/58285\/revisions"}],"predecessor-version":[{"id":58500,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts\/58285\/revisions\/58500"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/media\/41084"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/media?parent=58285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/categories?post=58285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/tags?post=58285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}