{"id":252,"date":"2020-12-19T15:06:24","date_gmt":"2020-12-19T14:06:24","guid":{"rendered":"http:\/\/sw-themes.com\/porto_dummy\/elementor\/industry-factory\/?page_id=252"},"modified":"2025-04-22T16:29:41","modified_gmt":"2025-04-22T14:29:41","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/dev.agmtest.net\/en\/servizi-agm-solutions\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"252\" class=\"elementor elementor-252\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-571cc0f elementor-section-full_width elementor-hidden-desktop elementor-section-height-default elementor-section-height-default\" data-id=\"571cc0f\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\r\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-afb2576\" data-id=\"afb2576\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-37d2699 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"37d2699\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.17.0 - 08-11-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h1 class=\"elementor-heading-title elementor-size-default\">Cybersecurity:\nRealizziamo soluzioni di cybersecurity su misura<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-944cabb elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"944cabb\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.17.0 - 08-11-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\tCon l\u2019apertura delle reti aziendali a servizi esterni e l\u2019utilizzo di soluzioni Cloud, le tradizionali soluzioni di sicurezza sono ormai obsolete. Diventa, quindi, necessario rivedere la propria strategia di protezione dei dati aziendali per proteggersi da minacce e furti organizzati dai cyber criminali.\n<br><br>\nIl furto d\u2019informazioni \u00e8 un reato sempre pi\u00f9 diffuso e le aziende che non includono una strategia di protezione dei dati incorrono in gravi sanzioni previste dal nuovo regolamento GDPR. Noi di AGM Solutions supportiamo le imprese nella gestione della cybersecurity aziendale, proponendo una serie di soluzioni smart ed integrate in grado di contrastare il pi\u00f9 feroce attacco informatico.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/section>\r\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-355ab46 elementor-section-content-middle elementor-section-full_width elementor-hidden-desktop elementor-section-height-default elementor-section-height-default\" data-id=\"355ab46\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-14581ee\" data-id=\"14581ee\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d608ad elementor-widget elementor-widget-image\" data-id=\"4d608ad\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.17.0 - 08-11-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"560\" height=\"560\" src=\"https:\/\/dev.agmtest.net\/wp-content\/uploads\/2025\/04\/optical-fiber-background-1-560x560.jpg\" class=\"elementor-animation-grow attachment-portfolio-grid-two size-portfolio-grid-two wp-image-16398\" alt=\"\" srcset=\"https:\/\/dev.agmtest.net\/wp-content\/uploads\/2025\/04\/optical-fiber-background-1-560x560.jpg 560w, https:\/\/dev.agmtest.net\/wp-content\/uploads\/2025\/04\/optical-fiber-background-1-367x367.jpg 367w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-778b3c5\" data-id=\"778b3c5\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e4b30c5 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"e4b30c5\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tThanks to the experience of our experts, it is possible to structure a complete cyber strategy through the use of the best software available on the market.\n<br><br>\nOur solutions against cybercrime:\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a62f033 elementor-position-left elementor-view-default elementor-mobile-position-top elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"a62f033\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/agmsolutions.net\/wp-content\/uploads\/elementor\/css\/custom-widget-icon-box.min.css?ver=1700227219\">\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-grow\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-shield-alt\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\t Security Postures\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a4f48e elementor-position-left elementor-view-default elementor-mobile-position-top elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"9a4f48e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-grow\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-shield-alt\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tRisk Management\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9961e8 elementor-position-left elementor-view-default elementor-mobile-position-top elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"f9961e8\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-grow\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-shield-alt\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\t Cyber Resilience\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8906583 elementor-position-left elementor-view-default elementor-mobile-position-top elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"8906583\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-grow\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-shield-alt\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\t Risk Monitoring\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/section>\r\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e6e864a elementor-section-content-middle elementor-section-full_width elementor-hidden-tablet elementor-hidden-mobile elementor-section-height-default elementor-section-height-default\" data-id=\"e6e864a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-db5690b\" data-id=\"db5690b\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe77afd mb-3 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"fe77afd\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cybersecurity<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2717c90 mb-4 custom-font1 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"2717c90\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">We create tailor-made cybersecurity solutions<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd0608a pr-lg-5 mb-3 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"fd0608a\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:800}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tWe create tailor-made cybersecurity solutions\nWith the opening of corporate networks to external services and the use of Cloud solutions, traditional security solutions are now obsolete. It therefore becomes necessary to review your <strong>corporate data protection strategy <\/strong>to protect yourself from threats and theft organized by cyber criminals.\n<br><br>\nData theft is an increasingly widespread crime, and companies that fail to include a data protection strategy risk severe penalties under the new GDPR regulation. At AGM Solutions, we support businesses in<strong> managing corporate cybersecurity<\/strong>, offering a range of smart and integrated solutions capable of countering even the most aggressive <strong>cyber attack.<\/strong>.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b8149d6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b8149d6\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.17.0 - 08-11-2023 *\/\n.elementor-widget-divider{--divider-border-style:none;--divider-border-width:1px;--divider-color:#0c0d0e;--divider-icon-size:20px;--divider-element-spacing:10px;--divider-pattern-height:24px;--divider-pattern-size:20px;--divider-pattern-url:none;--divider-pattern-repeat:repeat-x}.elementor-widget-divider .elementor-divider{display:flex}.elementor-widget-divider .elementor-divider__text{font-size:15px;line-height:1;max-width:95%}.elementor-widget-divider .elementor-divider__element{margin:0 var(--divider-element-spacing);flex-shrink:0}.elementor-widget-divider .elementor-icon{font-size:var(--divider-icon-size)}.elementor-widget-divider .elementor-divider-separator{display:flex;margin:0;direction:ltr}.elementor-widget-divider--view-line_icon .elementor-divider-separator,.elementor-widget-divider--view-line_text .elementor-divider-separator{align-items:center}.elementor-widget-divider--view-line_icon .elementor-divider-separator:after,.elementor-widget-divider--view-line_icon .elementor-divider-separator:before,.elementor-widget-divider--view-line_text .elementor-divider-separator:after,.elementor-widget-divider--view-line_text .elementor-divider-separator:before{display:block;content:\"\";border-bottom:0;flex-grow:1;border-top:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--element-align-left .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-left .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-left .elementor-divider__element{margin-left:0}.elementor-widget-divider--element-align-right .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-right .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-right .elementor-divider__element{margin-right:0}.elementor-widget-divider:not(.elementor-widget-divider--view-line_text):not(.elementor-widget-divider--view-line_icon) .elementor-divider-separator{border-top:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--separator-type-pattern{--divider-border-style:none}.elementor-widget-divider--separator-type-pattern.elementor-widget-divider--view-line .elementor-divider-separator,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:after,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:before,.elementor-widget-divider--separator-type-pattern:not([class*=elementor-widget-divider--view]) .elementor-divider-separator{width:100%;min-height:var(--divider-pattern-height);-webkit-mask-size:var(--divider-pattern-size) 100%;mask-size:var(--divider-pattern-size) 100%;-webkit-mask-repeat:var(--divider-pattern-repeat);mask-repeat:var(--divider-pattern-repeat);background-color:var(--divider-color);-webkit-mask-image:var(--divider-pattern-url);mask-image:var(--divider-pattern-url)}.elementor-widget-divider--no-spacing{--divider-pattern-size:auto}.elementor-widget-divider--bg-round{--divider-pattern-repeat:round}.rtl .elementor-widget-divider .elementor-divider__text{direction:rtl}.e-con-inner>.elementor-widget-divider,.e-con>.elementor-widget-divider{width:var(--container-widget-width,100%);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-c7dde95\" data-id=\"c7dde95\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b82ec58 elementor-widget elementor-widget-image\" data-id=\"b82ec58\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"560\" height=\"560\" src=\"https:\/\/dev.agmtest.net\/wp-content\/uploads\/2025\/04\/optical-fiber-background-1-560x560.jpg\" class=\"elementor-animation-grow attachment-portfolio-timeline size-portfolio-timeline wp-image-16398\" alt=\"\" srcset=\"https:\/\/dev.agmtest.net\/wp-content\/uploads\/2025\/04\/optical-fiber-background-1-560x560.jpg 560w, https:\/\/dev.agmtest.net\/wp-content\/uploads\/2025\/04\/optical-fiber-background-1-367x367.jpg 367w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-8dcddbe\" data-id=\"8dcddbe\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-08d877d elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"08d877d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tThanks to the experience of our experts, it is possible to structure a complete cyber strategy through the use of the best software available on the market. \t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4c894a mb-4 pb-2 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"f4c894a\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Our solutions against cybercrime:<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17357e4 elementor-position-left elementor-view-default elementor-mobile-position-top elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"17357e4\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-grow\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-shield-alt\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tSecurity Postures\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7e9fbe elementor-position-left elementor-view-default elementor-mobile-position-top elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"c7e9fbe\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-grow\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-shield-alt\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tRisk Management\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d03d368 elementor-position-left elementor-view-default elementor-mobile-position-top elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"d03d368\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-grow\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-shield-alt\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tCyber Resilience\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc06f4e elementor-position-left elementor-view-default elementor-mobile-position-top elementor-vertical-align-top elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"bc06f4e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon elementor-animation-grow\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-shield-alt\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t<span  >\n\t\t\t\t\t\tRisk Monitoring\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/section>\r\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8083d33 pt-5 pb-2 pb-lg-5 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8083d33\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f902eaa d-col-block position-static\" data-id=\"f902eaa\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a1039d3 tri-bottom mb-0 elementor-widget elementor-widget-html\" data-id=\"a1039d3\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\" viewbox=\"0 0 2000 120\" preserveaspectratio=\"xMinYMin\">\n\t<polygon fill=\"#FFF\" points=\"-11,2 693,112 2019,6 2019,135 -11,135 \"><\/polygon>\n<\/svg>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8bb2e1f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8bb2e1f\" data-element_type=\"section\">\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fc545ff\" data-id=\"fc545ff\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a6d461 py-2 mb-0 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"2a6d461\" data-element_type=\"widget\" data-settings=\"{&quot;_animation_delay&quot;:200,&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">WHAT DO WE DO<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-125808c\" data-id=\"125808c\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-00a80aa elementor-widget elementor-widget-image\" data-id=\"00a80aa\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/02\/cybersecurity_icon.png\" class=\"attachment-large size-large wp-image-5874\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/section>\r\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-55b89de mb-5 pb-3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"55b89de\" data-element_type=\"section\">\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-22e6331\" data-id=\"22e6331\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-55c9a7c pr-lg-4 box-shadow-3 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"55c9a7c\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:1000}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"524\" height=\"464\" src=\"https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/02\/cyber-1.png\" class=\"attachment-full size-full wp-image-5879\" alt=\"\" srcset=\"https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/02\/cyber-1.png 524w, https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/02\/cyber-1-400x354.png 400w, https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/02\/cyber-1-367x325.png 367w\" sizes=\"(max-width: 524px) 100vw, 524px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-437ace6\" data-id=\"437ace6\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff4a2d3 elementor-hidden-desktop elementor-widget elementor-widget-spacer\" data-id=\"ff4a2d3\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.17.0 - 08-11-2023 *\/\n.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-con{--container-widget-width:100%}.e-con-inner>.elementor-widget-spacer,.e-con>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));--align-self:var(--container-widget-align-self,initial);--flex-shrink:0}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container,.e-con>.elementor-widget-spacer>.elementor-widget-container{height:100%;width:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))}.e-con-inner>.elementor-widget-spacer.elementor-widget-empty,.e-con>.elementor-widget-spacer.elementor-widget-empty{position:relative;min-height:22px;min-width:22px}.e-con-inner>.elementor-widget-spacer.elementor-widget-empty .elementor-widget-empty-icon,.e-con>.elementor-widget-spacer.elementor-widget-empty .elementor-widget-empty-icon{position:absolute;top:0;bottom:0;left:0;right:0;margin:auto;padding:0;width:22px;height:22px}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7366a06 mb-3 elementor-invisible elementor-widget elementor-widget-porto_info_box\" data-id=\"7366a06\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"porto_info_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"porto-sicon-box style_1 default-icon\"><div class=\"porto-sicon-default\"><div class=\"porto-just-icon-wrapper porto-icon advanced\" style=\"\"><i class=\"fas fa-check\"><\/i><\/div><\/div><div class=\"porto-sicon-header\"><h3 class=\"porto-sicon-title\" style=\"\">Security Postures<\/h3><\/div> <!-- header --><\/div><!-- porto-sicon-box -->\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-630408 mb-3 elementor-invisible elementor-widget elementor-widget-porto_info_box\" data-id=\"630408\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:650}\" data-widget_type=\"porto_info_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"porto-sicon-box style_1 default-icon\"><div class=\"porto-sicon-default\"><div class=\"porto-just-icon-wrapper porto-icon advanced\" style=\"\"><i class=\"fas fa-check\"><\/i><\/div><\/div><div class=\"porto-sicon-header\"><h3 class=\"porto-sicon-title\" style=\"\">Risk Management<\/h3><\/div> <!-- header --><\/div><!-- porto-sicon-box -->\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4af71ca mb-3 elementor-invisible elementor-widget elementor-widget-porto_info_box\" data-id=\"4af71ca\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:700}\" data-widget_type=\"porto_info_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"porto-sicon-box style_1 default-icon\"><div class=\"porto-sicon-default\"><div class=\"porto-just-icon-wrapper porto-icon advanced\" style=\"\"><i class=\"fas fa-check\"><\/i><\/div><\/div><div class=\"porto-sicon-header\"><h3 class=\"porto-sicon-title\" style=\"\">Cyber Resillience<\/h3><\/div> <!-- header --><\/div><!-- porto-sicon-box -->\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3666f11 mb-4 pb-2 elementor-invisible elementor-widget elementor-widget-porto_info_box\" data-id=\"3666f11\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:750}\" data-widget_type=\"porto_info_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"porto-sicon-box style_1 default-icon\"><div class=\"porto-sicon-default\"><div class=\"porto-just-icon-wrapper porto-icon advanced\" style=\"\"><i class=\"fas fa-check\"><\/i><\/div><\/div><div class=\"porto-sicon-header\"><h3 class=\"porto-sicon-title\" style=\"\">Risk Monitoring<\/h3><\/div> <!-- header --><\/div><!-- porto-sicon-box -->\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/section>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/section>\r\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e4d3a73 pt-5 mt-2 p-b-xl elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e4d3a73\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d471df6\" data-id=\"d471df6\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d197e9c py-2 mb-0 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"d197e9c\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">OUR APPROACH<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1cb8663 mb-3 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"1cb8663\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How we counter cyber threats<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9ba660 mb-5 custom-font1 px-0 col-lg-9 col-xl-8 mx-auto elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"c9ba660\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Vulnerabilities lurk behind every corporate asset. It is essential to perform periodic checks to verify the hardware and software components in your organisation. <\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-730dd94 mb-0 elementor-widget elementor-widget-shortcode\" data-id=\"730dd94\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"porto-process process-horizontal mb-0\">\n\n<div class=\"process-step\" data-appear-animation=\"fadeInUp\" data-appear-animation-delay=\"200\"><div class=\"process-step-circle\"><strong class=\"process-step-circle-content\">1<\/strong><\/div><div class=\"process-step-content\"><h4 class=\"step-item-title\" style=\"color:#ffffff\">ASSESSMENT<\/h4><div class=\"process-step-desc\">\n<p style=\"color: #ffffff; line-height: 1.6;\">We analyze computer networks looking for potential system vulnerabilities.<\/p>\n<p><a class=\"read-more\" href=\"https:\/\/agmsolutions.net\/servizi-agm-solutions\/cybersecurity\/assessment-agm-solutions\">READ MORE <i class=\"fas fa-angle-right\"><\/i><\/a><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"process-step\" data-appear-animation=\"fadeInUp\" data-appear-animation-delay=\"400\"><div class=\"process-step-circle\"><strong class=\"process-step-circle-content\">2<\/strong><\/div><div class=\"process-step-content\"><h4 class=\"step-item-title\" style=\"color:#ffffff\">PREVENTION<\/h4><div class=\"process-step-desc\">\n<p style=\"color: #ffffff; line-height: 1.6;\">We monitor the situation in real-time and use advanced technologies to prevent threats.<\/p>\n<p><a class=\"read-more\" href=\"https:\/\/agmsolutions.net\/servizi-agm-solutions\/cybersecurity\/prevention-agm-solutions\/\">READ MORE <i class=\"fas fa-angle-right\"><\/i><\/a><\/p>\n<\/div><\/div><\/div>\n\n<div class=\"process-step\" data-appear-animation=\"fadeInUp\" data-appear-animation-delay=\"600\"><div class=\"process-step-circle\"><strong class=\"process-step-circle-content\">3<\/strong><\/div><div class=\"process-step-content\"><h4 class=\"step-item-title\" style=\"color:#ffffff\">RESPONSE<\/h4><div class=\"process-step-desc\">\n<p style=\"color: #ffffff; line-height: 1.6;\">We respond to attacks and help companies become cyber-resilient<\/p>\n<p><a class=\"read-more\" href=\"https:\/\/agmsolutions.net\/servizi-agm-solutions\/cybersecurity\/response\/\">READ MORE <i class=\"fas fa-angle-right\"><\/i><\/a><\/p>\n<\/div><\/div><\/div>\n\n<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/section>\r\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6ef5d68 py-3 my-5 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ef5d68\" data-element_type=\"section\">\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6d5fc86\" data-id=\"6d5fc86\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-64bd7ec mb-3 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"64bd7ec\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">RECOGNIZE AND COUNTER THREATS<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6aa63ad mb-2 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"6aa63ad\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity training<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-516686b custom-font1 mb-4 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"516686b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:700}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">The course to acquire the basic information to be able to recognize the various types of cyber threats and implement a first line of corporate defense.<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c8c1f6 btn-borders-triangle mb-0 mb-sm-5 elementor-invisible elementor-widget elementor-widget-porto_button\" data-id=\"6c8c1f6\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:900}\" data-widget_type=\"porto_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<a class=\"btn btn-md btn-default btn-borders\" href=\"https:\/\/agmsolutions.net\/product\/corso-cybersecurity\/\"><span >Find out more<\/span><\/a>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-121ba9b elementor-hidden-desktop elementor-widget elementor-widget-spacer\" data-id=\"121ba9b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a1bbab6\" data-id=\"a1bbab6\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a765eb7 elementor-widget elementor-widget-image\" data-id=\"a765eb7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"587\" src=\"https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/02\/cyber_4-1024x587.png\" class=\"attachment-large size-large wp-image-5881\" alt=\"\" srcset=\"https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/02\/cyber_4-1024x587.png 1024w, https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/02\/cyber_4-768x440.png 768w, https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/02\/cyber_4-640x367.png 640w, https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/02\/cyber_4-400x229.png 400w, https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/02\/cyber_4-367x210.png 367w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/section>\r\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c5cb67a py-3 my-5 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c5cb67a\" data-element_type=\"section\">\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ce74949\" data-id=\"ce74949\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b488b6b elementor-widget elementor-widget-image\" data-id=\"b488b6b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"587\" src=\"https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/06\/cyber-risk-assessment-1024x587.png\" class=\"attachment-large size-large wp-image-8401\" alt=\"\" srcset=\"https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/06\/cyber-risk-assessment-1024x587.png 1024w, https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/06\/cyber-risk-assessment-768x440.png 768w, https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/06\/cyber-risk-assessment-640x367.png 640w, https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/06\/cyber-risk-assessment-400x229.png 400w, https:\/\/dev.agmtest.net\/wp-content\/uploads\/2022\/06\/cyber-risk-assessment-367x210.png 367w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-809a567\" data-id=\"809a567\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-38a650f mb-3 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"38a650f\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber Risk Assessment<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-857c7e7 mb-2 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"857c7e7\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Do you want to know your company security level?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c8dcb8 custom-font1 mb-4 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"7c8dcb8\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:700}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Fill out our questionnaire to assess the IT risk to which your business systems are subject. \n<br>\nThe questionnaire is free. \n<\/p>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6a2a8b btn-borders-triangle mb-0 mb-sm-5 elementor-invisible elementor-widget elementor-widget-porto_button\" data-id=\"a6a2a8b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:900}\" data-widget_type=\"porto_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<a class=\"btn btn-md btn-default btn-borders\" href=\"https:\/\/portale.agmsolutions.net\/questionario\"><span >Learn about the security level<\/span><\/a>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2361c1f elementor-hidden-desktop elementor-widget elementor-widget-spacer\" data-id=\"2361c1f\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/section>\r\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-65d061a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"65d061a\" data-element_type=\"section\">\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-00275b1\" data-id=\"00275b1\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8441c98 mb-3 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"8441c98\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Our products<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/section>\r\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cea4d8c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cea4d8c\" data-element_type=\"section\">\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a6f2fbe\" data-id=\"a6f2fbe\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b5fcefb mb-4 e-transform elementor-invisible elementor-widget elementor-widget-porto_portfolios\" data-id=\"b5fcefb\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:800,&quot;_transform_translateY_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-10,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"porto_portfolios.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div id=\"porto-portfolio-6167\" class=\"porto-portfolios porto-portfoliosd6327c0a8fc2c179796387e1fff286c1 wpb_content_element\">\n\t<div class=\"page-portfolios clearfix portfolios-grid porto-ajax-load load-more\" id=\"porto_portfolios_cr3l\" data-post_type=\"portfolio\" data-post_layout=\"grid\" data-ajax_load_options=\"{&quot;portfolio_layout&quot;:&quot;grid&quot;,&quot;columns&quot;:&quot;2&quot;,&quot;view&quot;:&quot;classic&quot;,&quot;thumb_image&quot;:&quot;zoom&quot;,&quot;cats&quot;:&quot;45&quot;,&quot;orderby&quot;:&quot;date&quot;,&quot;order&quot;:&quot;ASC&quot;,&quot;number&quot;:6,&quot;load_more_posts&quot;:&quot;load-more-btn&quot;}\">\n\n\t\n\t\n\t\t\t<div class=\"portfolios-container portfolio-row portfolio-row-2 classic\" data-cur_page=\"1\" data-max_page=\"1\">\n\n\t\n\t\t<article class=\"portfolio portfolio-grid portfolio-col-2 assessment cubersecurity post-5577 type-portfolio status-publish has-post-thumbnail hentry portfolio_cat-assessment portfolio_cat-cubersecurity\">\n\t\t<h3 class=\"entry-title\" style=\"display: none;\">Vulnerability Assessment Probe<\/h3><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/dev.agmtest.net\/en\/author\/elisa\/\" title=\"Posts by elisa\" rel=\"author\">elisa<\/a><\/span><\/span><span class=\"updated\" style=\"display:none\">2025-04-22T15:45:25+02:00<\/span>\t\t<div class=\"portfolio-item outimage\">\n\t\t\t\n\t\t\t<a class=\"text-decoration-none portfolio-link\" href=\"https:\/\/dev.agmtest.net\/en\/product\/va-probe\/\">\n\t\t\t\t<span class=\"thumb-info thumb-info-hide-wrapper-bg thumb-info-bottom-info thumb-info-bottom-info-dark\">\n\t\t\t\t\t<span class=\"thumb-info-wrapper\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"thumb-info-title\">\n\t\t\t\t\t\t\t\t<span class=\"thumb-info-inner\">Read More<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"m-t-md m-b-none portfolio-title\">Vulnerability Assessment Probe<\/h4>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"portfolio-brief-content m-t p-l-lg p-r-lg\">\n\t\t\t\t\t<p class=\"post-excerpt\">\n\t\n\t\t\n\t\t\tCheck the level of IT protection of your systems Vulnerability...  <a class=\"read-more\" href=\"https:\/\/dev.agmtest.net\/en\/product\/va-probe\/\">read more <i class=\"fas fa-angle-right\"><\/i><\/a><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t<\/article>\n\t\t<article class=\"portfolio portfolio-grid portfolio-col-2 assessment cubersecurity post-5579 type-portfolio status-publish has-post-thumbnail hentry portfolio_cat-assessment portfolio_cat-cubersecurity\">\n\t\t<h3 class=\"entry-title\" style=\"display: none;\">Penetration Test<\/h3><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/dev.agmtest.net\/en\/author\/elisa\/\" title=\"Posts by elisa\" rel=\"author\">elisa<\/a><\/span><\/span><span class=\"updated\" style=\"display:none\">2025-04-22T15:45:15+02:00<\/span>\t\t<div class=\"portfolio-item outimage\">\n\t\t\t\n\t\t\t<a class=\"text-decoration-none portfolio-link\" href=\"https:\/\/dev.agmtest.net\/en\/product\/penetration-test\/\">\n\t\t\t\t<span class=\"thumb-info thumb-info-hide-wrapper-bg thumb-info-bottom-info thumb-info-bottom-info-dark\">\n\t\t\t\t\t<span class=\"thumb-info-wrapper\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"thumb-info-title\">\n\t\t\t\t\t\t\t\t<span class=\"thumb-info-inner\">Read More<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"m-t-md m-b-none portfolio-title\">Penetration Test<\/h4>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"portfolio-brief-content m-t p-l-lg p-r-lg\">\n\t\t\t\t\t<p class=\"post-excerpt\">\n\t\n\t\t\n\t\t\tTHE PENTERA SOLUTION Penetration Test With the PenTera solution you manage the...  <a class=\"read-more\" href=\"https:\/\/dev.agmtest.net\/en\/product\/penetration-test\/\">read more <i class=\"fas fa-angle-right\"><\/i><\/a><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t<\/article>\n\t\t<article class=\"portfolio portfolio-grid portfolio-col-2 cubersecurity prevention response post-5583 type-portfolio status-publish has-post-thumbnail hentry portfolio_cat-cubersecurity portfolio_cat-prevention portfolio_cat-response\">\n\t\t<h3 class=\"entry-title\" style=\"display: none;\">AGM Cyber Gate<\/h3><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/dev.agmtest.net\/en\/author\/giovanni\/\" title=\"Posts by Giovanni\" rel=\"author\">Giovanni<\/a><\/span><\/span><span class=\"updated\" style=\"display:none\">2025-04-22T15:45:03+02:00<\/span>\t\t<div class=\"portfolio-item outimage\">\n\t\t\t\n\t\t\t<a class=\"text-decoration-none portfolio-link\" href=\"https:\/\/dev.agmtest.net\/en\/product\/agm-cyber-gate\/\">\n\t\t\t\t<span class=\"thumb-info thumb-info-hide-wrapper-bg thumb-info-bottom-info thumb-info-bottom-info-dark\">\n\t\t\t\t\t<span class=\"thumb-info-wrapper\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"thumb-info-title\">\n\t\t\t\t\t\t\t\t<span class=\"thumb-info-inner\">Read More<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"m-t-md m-b-none portfolio-title\">AGM Cyber Gate<\/h4>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"portfolio-brief-content m-t p-l-lg p-r-lg\">\n\t\t\t\t\t<p class=\"post-excerpt\">\n\t\n\t\t\n\t\t\tProteggi la tua azienda dagli attacchi mirati\t\t\n\t\t\tAGM Cyber Gate\t\t\n\t\t\tCon...  <a class=\"read-more\" href=\"https:\/\/dev.agmtest.net\/en\/product\/agm-cyber-gate\/\">read more <i class=\"fas fa-angle-right\"><\/i><\/a><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t<\/article>\n\t\t<article class=\"portfolio portfolio-grid portfolio-col-2 cubersecurity post-5585 type-portfolio status-publish has-post-thumbnail hentry portfolio_cat-cubersecurity\">\n\t\t<h3 class=\"entry-title\" style=\"display: none;\">Corso Cybersecurity<\/h3><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/dev.agmtest.net\/en\/author\/elisa\/\" title=\"Posts by elisa\" rel=\"author\">elisa<\/a><\/span><\/span><span class=\"updated\" style=\"display:none\">2025-04-22T15:44:24+02:00<\/span>\t\t<div class=\"portfolio-item outimage\">\n\t\t\t\n\t\t\t<a class=\"text-decoration-none portfolio-link\" href=\"https:\/\/dev.agmtest.net\/en\/product\/corso-cybersecurity\/\">\n\t\t\t\t<span class=\"thumb-info thumb-info-hide-wrapper-bg thumb-info-bottom-info thumb-info-bottom-info-dark\">\n\t\t\t\t\t<span class=\"thumb-info-wrapper\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"thumb-info-title\">\n\t\t\t\t\t\t\t\t<span class=\"thumb-info-inner\">Read More<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"m-t-md m-b-none portfolio-title\">Corso Cybersecurity<\/h4>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"portfolio-brief-content m-t p-l-lg p-r-lg\">\n\t\t\t\t\t<p class=\"post-excerpt\">\n\t\n\t\t\n\t\t\tImpara a riconoscere e a contrastare\nle minacce informatiche\t\t\n\t\t\tCybersecurity GO\t\t\n\t\t\tIl...  <a class=\"read-more\" href=\"https:\/\/dev.agmtest.net\/en\/product\/corso-cybersecurity\/\">read more <i class=\"fas fa-angle-right\"><\/i><\/a><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\t<\/article>\n\t\n\t\n\t\n\t\t<\/div>\n\n\t\n\t\t\t<input type=\"hidden\" class=\"shortcode-id\" value=\"d6327c0a8fc2c179796387e1fff286c1\"\/>\n\t\t\t\n\t<\/div>\n\n\t\n\t\n\t<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/section>\r\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7c4a314 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7c4a314\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-842fc34\" data-id=\"842fc34\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71df753 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"71df753\" data-element_type=\"widget\" data-settings=\"{&quot;_animation_delay&quot;:200,&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Request a consultation<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5fe6644\" data-id=\"5fe6644\" data-element_type=\"column\">\r\n\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-db63136 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"db63136\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/agmsolutions.net\/contatti\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">CONTACT US<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/section>\r\n\t\t\t\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity: Realizziamo soluzioni di cybersecurity su misura Con l\u2019apertura delle reti aziendali a servizi esterni e l\u2019utilizzo di soluzioni Cloud, le tradizionali soluzioni di sicurezza sono ormai obsolete. Diventa, quindi, necessario rivedere la propria strategia di protezione dei dati aziendali per proteggersi da minacce e furti organizzati dai cyber criminali. Il furto d\u2019informazioni \u00e8 un [&hellip;]<\/p>","protected":false},"author":3,"featured_media":0,"parent":190,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity - Realizziamo soluzioni su misura - AGM Solutions<\/title>\n<meta name=\"description\" content=\"AGM Solutions supporta le imprese nella gestione della cybersecurity, proponendo soluzioni per contrastare il pi\u00f9 feroce attacco informatico.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dev.agmtest.net\/en\/servizi-agm-solutions\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity - Realizziamo soluzioni su misura - AGM Solutions\" \/>\n<meta property=\"og:description\" content=\"AGM Solutions supporta le imprese nella gestione della cybersecurity, proponendo soluzioni per contrastare il pi\u00f9 feroce attacco informatico.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev.agmtest.net\/en\/servizi-agm-solutions\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"AGM Solutions\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-22T14:29:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/agmsolutions.net\/wp-content\/uploads\/2025\/04\/optical-fiber-background-1-560x560.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dev.agmtest.net\/servizi-agm-solutions\/cybersecurity\/\",\"url\":\"https:\/\/dev.agmtest.net\/servizi-agm-solutions\/cybersecurity\/\",\"name\":\"Cybersecurity - Realizziamo soluzioni su misura - AGM Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/dev.agmtest.net\/#website\"},\"datePublished\":\"2020-12-19T14:06:24+00:00\",\"dateModified\":\"2025-04-22T14:29:41+00:00\",\"description\":\"AGM Solutions supporta le imprese nella gestione della cybersecurity, proponendo soluzioni per contrastare il pi\u00f9 feroce attacco informatico.\",\"breadcrumb\":{\"@id\":\"https:\/\/dev.agmtest.net\/servizi-agm-solutions\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dev.agmtest.net\/servizi-agm-solutions\/cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dev.agmtest.net\/servizi-agm-solutions\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dev.agmtest.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Servizi\",\"item\":\"https:\/\/dev.agmtest.net\/servizi-agm-solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dev.agmtest.net\/#website\",\"url\":\"https:\/\/dev.agmtest.net\/\",\"name\":\"AGM Solutions\",\"description\":\"Innovation Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dev.agmtest.net\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity - Realizziamo soluzioni su misura - AGM Solutions","description":"AGM Solutions supporta le imprese nella gestione della cybersecurity, proponendo soluzioni per contrastare il pi\u00f9 feroce attacco informatico.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dev.agmtest.net\/en\/servizi-agm-solutions\/cybersecurity\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersecurity - Realizziamo soluzioni su misura - AGM Solutions","og_description":"AGM Solutions supporta le imprese nella gestione della cybersecurity, proponendo soluzioni per contrastare il pi\u00f9 feroce attacco informatico.","og_url":"https:\/\/dev.agmtest.net\/en\/servizi-agm-solutions\/cybersecurity\/","og_site_name":"AGM Solutions","article_modified_time":"2025-04-22T14:29:41+00:00","og_image":[{"url":"https:\/\/agmsolutions.net\/wp-content\/uploads\/2025\/04\/optical-fiber-background-1-560x560.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dev.agmtest.net\/servizi-agm-solutions\/cybersecurity\/","url":"https:\/\/dev.agmtest.net\/servizi-agm-solutions\/cybersecurity\/","name":"Cybersecurity - Realizziamo soluzioni su misura - AGM Solutions","isPartOf":{"@id":"https:\/\/dev.agmtest.net\/#website"},"datePublished":"2020-12-19T14:06:24+00:00","dateModified":"2025-04-22T14:29:41+00:00","description":"AGM Solutions supporta le imprese nella gestione della cybersecurity, proponendo soluzioni per contrastare il pi\u00f9 feroce attacco informatico.","breadcrumb":{"@id":"https:\/\/dev.agmtest.net\/servizi-agm-solutions\/cybersecurity\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.agmtest.net\/servizi-agm-solutions\/cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dev.agmtest.net\/servizi-agm-solutions\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.agmtest.net\/"},{"@type":"ListItem","position":2,"name":"Servizi","item":"https:\/\/dev.agmtest.net\/servizi-agm-solutions\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/dev.agmtest.net\/#website","url":"https:\/\/dev.agmtest.net\/","name":"AGM Solutions","description":"Innovation Technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev.agmtest.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/pages\/252"}],"collection":[{"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/comments?post=252"}],"version-history":[{"count":94,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/pages\/252\/revisions"}],"predecessor-version":[{"id":16556,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/pages\/252\/revisions\/16556"}],"up":[{"embeddable":true,"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/pages\/190"}],"wp:attachment":[{"href":"https:\/\/dev.agmtest.net\/en\/wp-json\/wp\/v2\/media?parent=252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}