{"id":115340,"date":"2021-03-10T12:43:29","date_gmt":"2021-03-10T17:43:29","guid":{"rendered":"https:\/\/www.een.com\/cybersicurezza-risorse\/"},"modified":"2021-03-11T09:10:40","modified_gmt":"2021-03-11T14:10:40","slug":"cybersicurezza-risorse","status":"publish","type":"page","link":"https:\/\/www.een.com\/it\/cybersicurezza-risorse\/","title":{"rendered":"Risorse di sicurezza informatica di Eagle Eye Networks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"115340\" class=\"elementor elementor-115340 elementor-115180\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-206122fa elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"206122fa\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-202a6d8f\" data-id=\"202a6d8f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-386191e1 elementor-widget elementor-widget-heading\" data-id=\"386191e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Risorse per la sicurezza informatica\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30d0c6f3 elementor-widget elementor-widget-text-editor\" data-id=\"30d0c6f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6005711 elementor-widget elementor-widget-text-editor\" data-id=\"6005711\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-text-editor elementor-clearfix\">\n<p dir=\"ltr\">La sicurezza informatica \u00e8 nel DNA di Eagle Eye Networks. Fin dalla nostra fondazione, Eagle Eye Networks ha dedicato risorse significative per costruire e mantenere un livello molto alto di sicurezza informatica. Di seguito troverete le risorse che vi aiuteranno a implementare la nostra soluzione di videosorveglianza cloud sicura.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5c1c2a09\" data-id=\"5c1c2a09\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1776af84 elementor-widget elementor-widget-image\" data-id=\"1776af84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"846\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/camera-cybersecurity-v2-1024x846.png\" class=\"attachment-large size-large wp-image-115256\" alt=\"security camera cybersecurity\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/camera-cybersecurity-v2-1024x846.png 1024w, https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/camera-cybersecurity-v2-300x248.png 300w, https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/camera-cybersecurity-v2.png 1129w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" title=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-58165f60 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"58165f60\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-79a90a1b\" data-id=\"79a90a1b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-39ea622 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"39ea622\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3ac8f51\" data-id=\"3ac8f51\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e43948 elementor-widget elementor-widget-text-editor\" data-id=\"3e43948\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>WHITEPAPER<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed7f296 elementor-widget elementor-widget-text-editor\" data-id=\"ed7f296\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #606e81;\">Cybersecurity e videosorveglianza cloud<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdcb9f4 elementor-widget elementor-widget-text-editor\" data-id=\"fdcb9f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-size: 16px; font-style: normal; font-weight: 400;\">La sicurezza dei sistemi di videosorveglianza pu\u00f2 e deve essere affrontata in modo pi\u00f9 completo all&#8217;interno dell&#8217;industria, in modo che la cybersecurity non sia lasciata come un problema da risolvere per gli installatori o i clienti. Scopri come Eagle Eye Networks riduce i problemi di sicurezza dal punto di ricerca, sviluppo e implementazione del prodotto.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9f63fc elementor-widget elementor-widget-button\" data-id=\"c9f63fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/Eagle-Eye-Networks-Cyber-Security-and-Cloud-Video-Surveillance-Whitepaper-20210308.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Leggi ora<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8672a64\" data-id=\"8672a64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d3711b elementor-widget elementor-widget-text-editor\" data-id=\"4d3711b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>WHITEPAPER<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74a8a17 elementor-widget elementor-widget-text-editor\" data-id=\"74a8a17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #606e81;\">Ridurre le minacce con Camera Cyber Lockdown<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e8036a elementor-widget elementor-widget-text-editor\" data-id=\"6e8036a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Eagle Eye Networks ha rilasciato la funzione Eagle Eye Camera Cyber Lockdown nel 2017.<span style=\"color: #000000;\">  Questa caratteristica isola le telecamere da Internet e protegge dagli sforzi di intrusione o intercettazione degli hacker.<\/span><\/p>\n<div class=\"yj6qo ajU\"> <\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18ef820 elementor-widget elementor-widget-button\" data-id=\"18ef820\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.een.com\/wp-content\/uploads\/2019\/02\/Eagle-Eye-Networks-Camera-Cyber-Lockdown-White-Paper-20190201.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Leggi ora<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-51c9a8f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"51c9a8f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-57df9bc\" data-id=\"57df9bc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f48419e elementor-widget elementor-widget-text-editor\" data-id=\"f48419e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>REPORT<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e9457b elementor-widget elementor-widget-text-editor\" data-id=\"7e9457b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #606e81;\">12 Buone pratiche per il sistema di telecamere di sicurezza<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91403e3 elementor-widget elementor-widget-text-editor\" data-id=\"91403e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-size: 16px; font-style: normal; font-weight: 400;\">Le telecamere di sicurezza sono sempre pi\u00f9 connesse a Internet, spinte in gran parte dalla richiesta dei clienti di un accesso video remoto. Con l&#8217;accelerazione degli attacchi informatici, gli integratori di sicurezza fisica e il personale di supporto interno devono tenersi aggiornati sui vettori di attacco alla sicurezza informatica che possono avere un impatto sui sistemi di gestione video delle telecamere che vendono e\/o supportano.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb53b82 elementor-widget elementor-widget-button\" data-id=\"fb53b82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.een.com\/wp-content\/uploads\/2021\/03\/12-Best-Practices-White-Paper-20210308-1.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Leggi ora<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c98cb39\" data-id=\"c98cb39\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56deb8a elementor-widget elementor-widget-text-editor\" data-id=\"56deb8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>PORTALE DI SUPPORTO<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-896f062 elementor-widget elementor-widget-text-editor\" data-id=\"896f062\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #606e81;\">Abilitare la modalit\u00e0 privacy<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eda7506 elementor-widget elementor-widget-text-editor\" data-id=\"eda7506\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\" align-left\"><span style=\"color: #000000;\">Lo scopo della modalit\u00e0 privacy \u00e8 di bloccare l&#8217;accesso ai flussi della tua videocamera a qualsiasi amministratore, compresi i rivenditori o i dipendenti di Eagle Eye, che potrebbero accedere al tuo account. La modalit\u00e0 di privacy \u00e8 una caratteristica popolare per i clienti che vogliono un aiuto amministrativo, ma hanno preoccupazioni di privacy o legali su chi pu\u00f2 vedere il video effettivo.<\/span><\/p>\n<div class=\"yj6qo ajU\"> <\/div>\n<\/div>\n<div> <\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5102086 elementor-widget elementor-widget-button\" data-id=\"5102086\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/support.een.com\/portal\/en\/kb\/articles\/enabling-privacy-mode-10-3-2021\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Leggi ora<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Risorse per la sicurezza informatica La sicurezza informatica \u00e8 nel DNA di Eagle Eye Networks. Fin dalla nostra fondazione, Eagle Eye Networks ha dedicato risorse significative per costruire e mantenere &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/it\/cybersicurezza-risorse\/\"> <span class=\"screen-reader-text\">Risorse di sicurezza informatica di Eagle Eye Networks<\/span> Leggi altro &raquo;<\/a><\/p>\n","protected":false},"author":1633,"featured_media":0,"parent":0,"menu_order":428,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"class_list":["post-115340","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/it\/wp-json\/wp\/v2\/pages\/115340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.een.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/it\/wp-json\/wp\/v2\/users\/1633"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/it\/wp-json\/wp\/v2\/comments?post=115340"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/it\/wp-json\/wp\/v2\/pages\/115340\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/it\/wp-json\/wp\/v2\/media?parent=115340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}