{"id":1297,"date":"2022-04-01T17:10:22","date_gmt":"2022-04-01T15:10:22","guid":{"rendered":"https:\/\/tcs-technology.com\/?page_id=1297"},"modified":"2023-06-23T18:20:21","modified_gmt":"2023-06-23T16:20:21","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/tcs-technology.com\/it\/services\/cyber-security\/","title":{"rendered":"Sicurezza informatica"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1297\" class=\"elementor elementor-1297\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b40c73c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b40c73c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fd3b382\" data-id=\"fd3b382\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4578737 elementor-align-center elementor-widget elementor-widget-breadcrumbs\" data-id=\"4578737\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/tcs-technology.com\/it\/\">Casa<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-746cddb9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"746cddb9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-19fd104b\" data-id=\"19fd104b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c18fe4b elementor-widget elementor-widget-heading\" data-id=\"c18fe4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Consulenza sulla sicurezza informatica <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-504f08e2 elementor-widget elementor-widget-text-editor\" data-id=\"504f08e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Forniamo servizi di sicurezza informatica completi e personalizzati per soddisfare le esigenze di tutti i tipi di aziende. I nostri servizi comprendono la protezione di tutti gli asset organizzativi in diverse categorie.<\/p><p>Ci impegniamo a contribuire alla costruzione di un ecosistema IT solido e protetto da tutti i lati. Il nostro obiettivo finale \u00e8 creare una solida base per un'infrastruttura IT, in grado di resistere a qualsiasi potenziale attacco informatico. Garantiamo lo sviluppo di una rete in grado di proteggere efficacemente il software, monitorare le reti e salvaguardare le infrastrutture con la massima efficienza.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3867eea9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3867eea9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-31aa8d17\" data-id=\"31aa8d17\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26a6f0e3 elementor-widget elementor-widget-heading\" data-id=\"26a6f0e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Il nostro obiettivo primario \u00e8 quello di salvaguardare quanto segue:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4df2f67b elementor-widget elementor-widget-text-editor\" data-id=\"4df2f67b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Oltre alle applicazioni dei dati, l'adozione della trasformazione digitale nei settori contabile e legale comporta numerosi vantaggi. Alcuni di questi includono:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6aa894e7 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"6aa894e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Caratteristiche di sicurezza e distribuzione sicura degli aggiornamenti di sicurezza disponibili.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Garantire la protezione di server, firewall, router e switch, consentendo al contempo operazioni e integrazioni sicure e senza soluzione di continuit\u00e0.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Il nostro team \u00e8 in grado di proteggere le soluzioni IT, sia hardware che software, da attacchi informatici di qualsiasi natura, salvaguardando cos\u00ec l'infrastruttura dell'organizzazione.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Noi di TCS Technology consideriamo i servizi di consulenza sulla sicurezza informatica come una componente integrante della creazione di pratiche di sicurezza efficaci.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6c43b5 elementor-widget elementor-widget-text-editor\" data-id=\"f6c43b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Per adempiere alla nostra missione, ci impegniamo a rispettare quanto segue:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52e0c9f elementor-widget elementor-widget-heading\" data-id=\"52e0c9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sicurezza informatica<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-27f56ac8\" data-id=\"27f56ac8\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56938ac elementor-widget elementor-widget-image\" data-id=\"56938ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"480\" src=\"https:\/\/tcs-technology.com\/wp-content\/uploads\/2022\/04\/crew-data-center-cyber-security-team-computer-engineers-working-double-exposure-blurry-interface-concept-protection-164673298.jpg\" class=\"attachment-full size-full wp-image-1906\" alt=\"cyber security\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-66bac41 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"66bac41\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a17161d\" data-id=\"a17161d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9053be7 elementor-widget elementor-widget-heading\" data-id=\"9053be7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">1. Valutazione <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e96097 elementor-widget elementor-widget-text-editor\" data-id=\"8e96097\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Conduciamo valutazioni approfondite della sicurezza per comprendere i punti di forza e di debolezza della postura di sicurezza del nostro team. Inoltre, ci assicuriamo che i nostri standard di sicurezza siano in linea con i parametri di sicurezza regionali e globali.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-070e162 elementor-widget elementor-widget-heading\" data-id=\"070e162\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">2. Pianificazione strategica<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2203af elementor-widget elementor-widget-text-editor\" data-id=\"e2203af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Documentiamo meticolosamente la nostra roadmap di sicurezza, impiegando metodi e soluzioni di sicurezza personalizzate per raggiungere i nostri obiettivi strategici. Questo ci permette di monitorare i nostri progressi e di misurare la nostra crescita nel tempo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d95022 elementor-widget elementor-widget-heading\" data-id=\"0d95022\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">3. Formazione <\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c3cf51 elementor-widget elementor-widget-text-editor\" data-id=\"7c3cf51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Diamo priorit\u00e0 alla formazione del nostro personale di sicurezza, dei professionisti e degli utenti aziendali. Forniamo una guida completa sulla gestione delle soluzioni di sicurezza e sulla definizione di pratiche di lavoro sicure per tutti i dispositivi. Promuovendo una cultura di apprendimento continuo, consentiamo ai membri del nostro team di raggiungere i loro obiettivi settimanali e di migliorare continuamente le loro prestazioni.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0b9ffa7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0b9ffa7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0364977\" data-id=\"0364977\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8803b10 elementor-widget elementor-widget-heading\" data-id=\"8803b10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ricerca approfondita sulla sicurezza informatica <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-127b423 security elementor-widget elementor-widget-text-editor\" data-id=\"127b423\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Rivediamo e perfezioniamo costantemente le nostre politiche di sicurezza, mantenendo un approccio proattivo. Aggiorniamo regolarmente le nostre schede IT documentate, i programmi di risposta agli incidenti, le politiche di protezione dei dati e i materiali di formazione sulla sicurezza per garantire che siano conformi ai livelli standard.<\/p><p>Effettuiamo valutazioni approfondite della sicurezza delle applicazioni, dell'analisi della rete e della protezione dell'infrastruttura e ci impegniamo costantemente per migliorare. Ci concentriamo anche sul potenziamento della sicurezza fisica e della sicurezza degli endpoint.<\/p><p>Con l'aiuto del nostro centro di test TCS, forniamo un'assistenza preziosa alle aziende per valutare il loro stato di sicurezza informatica. Conduciamo esami completi e approfonditi, esaminando meticolosamente le soluzioni, le reti e le infrastrutture e identificando potenziali lacune nella sicurezza che potrebbero avere un impatto sugli utenti esterni e interni.<\/p><p>Al termine dei nostri test, sviluppiamo un piano d'azione completo che comprende le contromisure per risolvere le vulnerabilit\u00e0 identificate e migliorare la sicurezza generale dei sistemi oggetto di valutazione. Il nostro impegno a mantenere la reputazione e gli standard della nostra azienda ci spinge a migliorare continuamente le nostre pratiche di sicurezza informatica.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Consulenza sulla sicurezza informatica Forniamo servizi di sicurezza informatica completi e personalizzati per soddisfare le esigenze di tutti i tipi di aziende. I nostri servizi comprendono la protezione di tutti gli asset organizzativi in varie categorie. Ci impegniamo a contribuire alla costruzione di un ecosistema IT forte e protetto da tutti i lati. Il nostro obiettivo finale \u00e8 creare una solida [...]<\/p>","protected":false},"author":1,"featured_media":0,"parent":1270,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1297","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity - TCS Technology AG<\/title>\n<meta name=\"description\" content=\"Cyber security features and safely deploy any available security updates. We offer cyber security services for all types of businesses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tcs-technology.com\/it\/services\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity - TCS Technology AG\" \/>\n<meta property=\"og:description\" content=\"Cyber security features and safely deploy any available security updates. We offer cyber security services for all types of businesses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tcs-technology.com\/it\/services\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"TCS Technology AG\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-23T16:20:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tcs-technology.com\/wp-content\/uploads\/2022\/04\/crew-data-center-cyber-security-team-computer-engineers-working-double-exposure-blurry-interface-concept-protection-164673298.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tcs-technology.com\/services\/cyber-security\/\",\"url\":\"https:\/\/tcs-technology.com\/services\/cyber-security\/\",\"name\":\"Cybersecurity - TCS Technology AG\",\"isPartOf\":{\"@id\":\"https:\/\/tcs-technology.com\/#website\"},\"datePublished\":\"2022-04-01T15:10:22+00:00\",\"dateModified\":\"2023-06-23T16:20:21+00:00\",\"description\":\"Cyber security features and safely deploy any available security updates. We offer cyber security services for all types of businesses.\",\"breadcrumb\":{\"@id\":\"https:\/\/tcs-technology.com\/services\/cyber-security\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tcs-technology.com\/services\/cyber-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tcs-technology.com\/services\/cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tcs-technology.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/tcs-technology.com\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tcs-technology.com\/#website\",\"url\":\"https:\/\/tcs-technology.com\/\",\"name\":\"TCS Technology AG\",\"description\":\"We provide cutting-edge SaaS solutions for organizations in Switzerland and around the world with a focus on performance, security, and sustainability.\",\"publisher\":{\"@id\":\"https:\/\/tcs-technology.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tcs-technology.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tcs-technology.com\/#organization\",\"name\":\"TCS Technology AG\",\"url\":\"https:\/\/tcs-technology.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/tcs-technology.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/tcs-technology.com\/wp-content\/uploads\/2022\/03\/logo-2.png\",\"contentUrl\":\"https:\/\/tcs-technology.com\/wp-content\/uploads\/2022\/03\/logo-2.png\",\"width\":8334,\"height\":6131,\"caption\":\"TCS Technology AG\"},\"image\":{\"@id\":\"https:\/\/tcs-technology.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity - TCS Technology AG","description":"Cyber security features and safely deploy any available security updates. We offer cyber security services for all types of businesses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tcs-technology.com\/it\/services\/cyber-security\/","og_locale":"it_IT","og_type":"article","og_title":"Cybersecurity - TCS Technology AG","og_description":"Cyber security features and safely deploy any available security updates. We offer cyber security services for all types of businesses.","og_url":"https:\/\/tcs-technology.com\/it\/services\/cyber-security\/","og_site_name":"TCS Technology AG","article_modified_time":"2023-06-23T16:20:21+00:00","og_image":[{"url":"https:\/\/tcs-technology.com\/wp-content\/uploads\/2022\/04\/crew-data-center-cyber-security-team-computer-engineers-working-double-exposure-blurry-interface-concept-protection-164673298.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tcs-technology.com\/services\/cyber-security\/","url":"https:\/\/tcs-technology.com\/services\/cyber-security\/","name":"Cybersecurity - TCS Technology AG","isPartOf":{"@id":"https:\/\/tcs-technology.com\/#website"},"datePublished":"2022-04-01T15:10:22+00:00","dateModified":"2023-06-23T16:20:21+00:00","description":"Cyber security features and safely deploy any available security updates. We offer cyber security services for all types of businesses.","breadcrumb":{"@id":"https:\/\/tcs-technology.com\/services\/cyber-security\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tcs-technology.com\/services\/cyber-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/tcs-technology.com\/services\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tcs-technology.com\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/tcs-technology.com\/services\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/tcs-technology.com\/#website","url":"https:\/\/tcs-technology.com\/","name":"TCS Technology AG","description":"We provide cutting-edge SaaS solutions for organizations in Switzerland and around the world with a focus on performance, security, and sustainability.","publisher":{"@id":"https:\/\/tcs-technology.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tcs-technology.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/tcs-technology.com\/#organization","name":"TCS Technology AG","url":"https:\/\/tcs-technology.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/tcs-technology.com\/#\/schema\/logo\/image\/","url":"https:\/\/tcs-technology.com\/wp-content\/uploads\/2022\/03\/logo-2.png","contentUrl":"https:\/\/tcs-technology.com\/wp-content\/uploads\/2022\/03\/logo-2.png","width":8334,"height":6131,"caption":"TCS Technology AG"},"image":{"@id":"https:\/\/tcs-technology.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/tcs-technology.com\/it\/wp-json\/wp\/v2\/pages\/1297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tcs-technology.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tcs-technology.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tcs-technology.com\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tcs-technology.com\/it\/wp-json\/wp\/v2\/comments?post=1297"}],"version-history":[{"count":65,"href":"https:\/\/tcs-technology.com\/it\/wp-json\/wp\/v2\/pages\/1297\/revisions"}],"predecessor-version":[{"id":3253,"href":"https:\/\/tcs-technology.com\/it\/wp-json\/wp\/v2\/pages\/1297\/revisions\/3253"}],"up":[{"embeddable":true,"href":"https:\/\/tcs-technology.com\/it\/wp-json\/wp\/v2\/pages\/1270"}],"wp:attachment":[{"href":"https:\/\/tcs-technology.com\/it\/wp-json\/wp\/v2\/media?parent=1297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}