{"id":37422,"date":"2023-03-20T10:26:56","date_gmt":"2023-03-20T10:26:56","guid":{"rendered":"https:\/\/www.overit.ai\/it\/?page_id=37422"},"modified":"2026-04-28T15:43:04","modified_gmt":"2026-04-28T15:43:04","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-padding-small \n  overit-block-wide-info-image\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n\n\n\n<div class=\"wii right  \" id=\"\">\n        <div class=\"wii__content\" >\n                  <div class=\"wii__section-title\" style=\"\">CYBERSECURITY<\/div>\n          \n                      <h1 id=\"wii-title-69f2fabb7ae17\" class=\"wii__title\" style=\"  \">OverIT \u00e8 costantemente impegnata a garantire la sicurezza delle informazioni<\/h1>\n          \n          <div class=\"wii__description\" style=\" \">\n        <p>La fiducia \u00e8 uno dei nostri valori fondamentali. Niente \u00e8 pi\u00f9 importante dell\u2019affidabilit\u00e0 dei nostri sistemi, della sicurezza informatica e della parola data a clienti, partner e collaboratori.<\/p>\n\n      <\/div>\n    \n        \n    \n    \n    \n      <\/div>\n  \n      <div class=\"wii__image\" >\n                        <img decoding=\"async\" src=\"https:\/\/www.overit.ai\/app\/uploads\/2024\/06\/OverIT-Cybersecurity.png\" alt=\"OverIT Cybersecurity\" width=\"1540\" height=\"1078\" \/>\n                  <\/div>\n  \n  <\/div>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--light-gray overit-radius-full overit-no-margin overit-padding-medium overit-block--fullwidth\n  overit-block-configurable-jumbotron\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n<section class=\"configurable-jumbotron center\" >\n    \n    \n                  <div class=\"cj-subtitle medium\"><p>I cyberattacchi sono al centro dell\u2019attenzione di tutti i CIO e la OverIT NextGen Platform offre la migliore sicurezza e scalabilit\u00e0 della categoria.<\/p>\n<p>In qualit\u00e0 di azienda leader nel settore SaaS, i nostri clienti si fidano di noi fornendoci i loro dati e le loro operazioni. Non possiamo fallire. Pertanto, lavoriamo ogni giorno per rafforzare la nostra piattaforma e i nostri processi, garantendo sempre la sicurezza e la conformit\u00e0 dei nostri sistemi.<\/p>\n<\/div>\n          \n        <\/section>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-padding-small \n  overit-block-multi-info-cards\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n<div class=\"info-cards info-cards--3 info-cards--align-center\">\n        <div class=\"info-cards__sections \">\n                  <div class=\"info-card info-card--3\n           info-card--bg-gray           \n          \n          info-card--top-line\n        \">\n        <div class=\"info-card-inner\">\n                                  <div class=\"info-card__icon\">\n                            <i aria-hidden=\"true\" style=\"color: #FF8200;font-size: 32px;\" class=\"fa-classic fa-light fa-user-lock\" aria-hidden=\"true\"><\/i>\n            <\/div>\n                                            <div class=\"info-card__title \" >\n              Scopri, previeni e affronta potenziali problemi di sicurezza e vulnerabilit\u00e0 con strumenti di nuova generazione.\n            <\/div>\n                            <\/div>\n      <\/div>\n                  <div class=\"info-card info-card--3\n           info-card--bg-gray           \n          \n          info-card--top-line\n        \">\n        <div class=\"info-card-inner\">\n                                  <div class=\"info-card__icon\">\n                            <i aria-hidden=\"true\" style=\"color: #FF8200;font-size: 32px;\" class=\"fa-classic fa-light fa-shield-check\" aria-hidden=\"true\"><\/i>\n            <\/div>\n                                            <div class=\"info-card__title \" >\n              Assicurati che i tuoi servizi siano sempre aggiornati.\n            <\/div>\n                            <\/div>\n      <\/div>\n                  <div class=\"info-card info-card--3\n           info-card--bg-gray           \n          \n          info-card--top-line\n        \">\n        <div class=\"info-card-inner\">\n                                  <div class=\"info-card__icon\">\n                            <i aria-hidden=\"true\" style=\"color: #FF8200;font-size: 32px;\" class=\"fa-classic fa-light fa-display-chart-up\" aria-hidden=\"true\"><\/i>\n            <\/div>\n                                            <div class=\"info-card__title \" >\n              Migliora le tue operazioni di Field Service Management.\n            <\/div>\n                            <\/div>\n      <\/div>\n          <\/div>\n  <\/div>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-padding-small overit-block--fullwidth\n  overit-block-configurable-jumbotron\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n<section class=\"configurable-jumbotron center\" >\n                  <div class=\"cj-section-title\">CONFORMIT\u00c0 ALLA SICUREZZA<\/div>\n          \n                  <div class=\"cj-title medium\">OverIT \u00e8 fortemente impegnata a soddisfare i pi\u00f9 importanti standard di sicurezza del settore<\/div>\n          \n    \n        <\/section>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-padding-medium-bottom \n  overit-block-marchitecture\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n\n  <div class=\"block-ma\">\n    <div class=\"block-ma-head-title\">\n            \n    <\/div>\n          <div class=\"block-ma-tab-nav\">\n                           \n          <div>\n            <div class=\"block-ma-tab-nav-item  block-ma-tab-nav-item--active \">\n              <div class=\"block-list-boxes__icon\">\n                                \n              <\/div>\n              <div class=\"block-ma-tab-side-title-inner\">\n                                  SOC1 Type II\n                              <\/div>\n            <\/div>\n          <\/div>\n                             \n          <div>\n            <div class=\"block-ma-tab-nav-item \">\n              <div class=\"block-list-boxes__icon\">\n                                \n              <\/div>\n              <div class=\"block-ma-tab-side-title-inner\">\n                                  SOC2 Type II\n                              <\/div>\n            <\/div>\n          <\/div>\n                             \n          <div>\n            <div class=\"block-ma-tab-nav-item \">\n              <div class=\"block-list-boxes__icon\">\n                                \n              <\/div>\n              <div class=\"block-ma-tab-side-title-inner\">\n                                  SOC3\n                              <\/div>\n            <\/div>\n          <\/div>\n                             \n          <div>\n            <div class=\"block-ma-tab-nav-item \">\n              <div class=\"block-list-boxes__icon\">\n                                \n              <\/div>\n              <div class=\"block-ma-tab-side-title-inner\">\n                                  ISO 27001:2022\n                              <\/div>\n            <\/div>\n          <\/div>\n                             \n          <div>\n            <div class=\"block-ma-tab-nav-item \">\n              <div class=\"block-list-boxes__icon\">\n                                \n              <\/div>\n              <div class=\"block-ma-tab-side-title-inner\">\n                                  ISO 27017\n                              <\/div>\n            <\/div>\n          <\/div>\n                             \n          <div>\n            <div class=\"block-ma-tab-nav-item \">\n              <div class=\"block-list-boxes__icon\">\n                                \n              <\/div>\n              <div class=\"block-ma-tab-side-title-inner\">\n                                  ISO 27018\n                              <\/div>\n            <\/div>\n          <\/div>\n                        <\/div>\n    \n    <div class=\"block-ma-tabs\">\n                             <div class=\"block-ma-tab  block-ma-tab--active \">\n          <div class=\"block-ma-tab-side\">\n            <div class=\"block-ma-tab-side-title\">\n              <div class=\"block-ma-tab-side-title-bg\"\n                                  style=\"background: transparent linear-gradient(103deg, #C1C6C3 0%, #ff8200 100%) 0% 0% no-repeat padding-box;\"\n                              >\n                              <div class=\"block-ma-tab-side-title-inner\">SOC1 Type II<\/div>\n                              <div class=\"block-ma-tab-slides-nav\">\n                                                                             <div class=\"block-ma-tab-slides-nav-title  block-ma-tab-slides-nav-title--active \">\n                      <span>SOC1 Type II<\/span>\n                    <\/div>\n                                                      <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n\n          <div class=\"block-ma-tab-slides\">\n                                         <div class=\"block-ma-tab-slide\">\n                <div class=\"block-ma-tab-slide-nav  block-ma-tab-slide-nav--with-description \">\n                                      SOC1 Type II\n                                  <\/div>\n                                  <div class=\"block-ma-tab-slide-description\">\n                    <p>Il report SOC1 si concentra sui servizi esternalizzati eseguiti da organizzazioni di servizi rilevanti per la rendicontazione finanziaria di una societ\u00e0 (entit\u00e0 utente).<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.overit.ai\/app\/uploads\/2024\/06\/AICPA-SOC-LOGO-nobg.png\" alt=\"SOC1\" \/><\/p>\n\n                  <\/div>\n                                                              <\/div>\n                      <\/div>\n        <\/div>\n                               <div class=\"block-ma-tab \">\n          <div class=\"block-ma-tab-side\">\n            <div class=\"block-ma-tab-side-title\">\n              <div class=\"block-ma-tab-side-title-bg\"\n                              >\n                              <div class=\"block-ma-tab-side-title-inner\">SOC2 Type II<\/div>\n                              <div class=\"block-ma-tab-slides-nav\">\n                                                                             <div class=\"block-ma-tab-slides-nav-title  block-ma-tab-slides-nav-title--active \">\n                      <span>SOC2 Type II<\/span>\n                    <\/div>\n                                                      <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n\n          <div class=\"block-ma-tab-slides\">\n                                         <div class=\"block-ma-tab-slide\">\n                <div class=\"block-ma-tab-slide-nav  block-ma-tab-slide-nav--with-description \">\n                                      SOC2 Type II\n                                  <\/div>\n                                  <div class=\"block-ma-tab-slide-description\">\n                    <p>Un report SOC2 di tipo II \u00e8 un report di controllo interno, basato sullo standard di reporting AT 101, che analizza il modo in cui un&#8217;azienda salvaguarda i dati dei clienti e il funzionamento di tali controlli. Le aziende che utilizzano provider di servizi cloud utilizzano i report SOC2 per valutare e affrontare i rischi associati ai servizi tecnologici di terze parti. Questi rapporti sono emessi da un revisore esterno indipendente che copre i principi di sicurezza, disponibilit\u00e0, riservatezza e privacy.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.overit.ai\/app\/uploads\/2024\/06\/AICPA-SOC-LOGO-nobg.png\" alt=\"SOC1\" \/><\/p>\n\n                  <\/div>\n                                                              <\/div>\n                      <\/div>\n        <\/div>\n                               <div class=\"block-ma-tab \">\n          <div class=\"block-ma-tab-side\">\n            <div class=\"block-ma-tab-side-title\">\n              <div class=\"block-ma-tab-side-title-bg\"\n                              >\n                              <div class=\"block-ma-tab-side-title-inner\">SOC3<\/div>\n                              <div class=\"block-ma-tab-slides-nav\">\n                                                                             <div class=\"block-ma-tab-slides-nav-title  block-ma-tab-slides-nav-title--active \">\n                      <span>SOC3<\/span>\n                    <\/div>\n                                                      <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n\n          <div class=\"block-ma-tab-slides\">\n                                         <div class=\"block-ma-tab-slide\">\n                <div class=\"block-ma-tab-slide-nav  block-ma-tab-slide-nav--with-description \">\n                                      SOC3\n                                  <\/div>\n                                  <div class=\"block-ma-tab-slide-description\">\n                    <p>Il report SOC3 fornisce una sintesi di alto livello dei controlli interni di un\u2019azienda in materia di sicurezza, disponibilit\u00e0, integrit\u00e0 del trattamento, riservatezza e privacy. A differenza del SOC2, che contiene informazioni dettagliate e ad accesso limitato, il SOC3 \u00e8 pensato per la distribuzione pubblica e dimostra l\u2019impegno verso i Trust Services Criteria dell\u2019AICPA. Questi report sono rilasciati da revisori indipendenti di terze parti e costituiscono un\u2019attestazione pubblica dell\u2019efficacia operativa di un\u2019organizzazione di servizi in un determinato periodo di riferimento.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.overit.ai\/app\/uploads\/2024\/06\/AICPA-SOC-LOGO-nobg.png\" alt=\"SOC1\" \/><\/p>\n\n                  <\/div>\n                                                              <\/div>\n                      <\/div>\n        <\/div>\n                               <div class=\"block-ma-tab \">\n          <div class=\"block-ma-tab-side\">\n            <div class=\"block-ma-tab-side-title\">\n              <div class=\"block-ma-tab-side-title-bg\"\n                              >\n                              <div class=\"block-ma-tab-side-title-inner\">ISO 27001:2022<\/div>\n                              <div class=\"block-ma-tab-slides-nav\">\n                                                                             <div class=\"block-ma-tab-slides-nav-title  block-ma-tab-slides-nav-title--active \">\n                      <span>ISO 27001:2022<\/span>\n                    <\/div>\n                                                      <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n\n          <div class=\"block-ma-tab-slides\">\n                                         <div class=\"block-ma-tab-slide\">\n                <div class=\"block-ma-tab-slide-nav  block-ma-tab-slide-nav--with-description \">\n                                      <a class=\"block-ma-tab-slide-nav-link\" href=\"https:\/\/docs.overit.ai\/hubfs\/Legal\/Cybersecurity\/ISO-IEC_27001-ENG-C819305-1-20251201.pdf\">\n                                      ISO 27001:2022\n                                      <\/a>\n                                  <\/div>\n                                  <div class=\"block-ma-tab-slide-description\">\n                    <p>ISO\/IEC 27001 \u00e8 uno standard di sicurezza che specifica formalmente un sistema di gestione della sicurezza delle informazioni (ISMS) destinato a sottoporre la sicurezza delle informazioni a un esplicito controllo di gestione. Come specifica formale, impone requisiti che definiscono come implementare, monitorare, mantenere e migliorare continuamente l&#8217;ISMS. Questo prescrive anche una serie di migliori pratiche che includono requisiti di documentazione, divisioni di responsabilit\u00e0, disponibilit\u00e0, controllo degli accessi, sicurezza, audit e misure correttive e preventive.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.overit.ai\/app\/uploads\/2025\/12\/InformationSecuritySys_ISOIEC27001_col.webp\" alt=\"ISO 27001\" width=\"250\" height=\"250\" \/><\/p>\n\n                  <\/div>\n                                                              <\/div>\n                      <\/div>\n        <\/div>\n                               <div class=\"block-ma-tab \">\n          <div class=\"block-ma-tab-side\">\n            <div class=\"block-ma-tab-side-title\">\n              <div class=\"block-ma-tab-side-title-bg\"\n                              >\n                              <div class=\"block-ma-tab-side-title-inner\">ISO 27017<\/div>\n                              <div class=\"block-ma-tab-slides-nav\">\n                                                                             <div class=\"block-ma-tab-slides-nav-title  block-ma-tab-slides-nav-title--active \">\n                      <span>ISO 27017<\/span>\n                    <\/div>\n                                                      <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n\n          <div class=\"block-ma-tab-slides\">\n                                         <div class=\"block-ma-tab-slide\">\n                <div class=\"block-ma-tab-slide-nav  block-ma-tab-slide-nav--with-description \">\n                                      ISO 27017\n                                  <\/div>\n                                  <div class=\"block-ma-tab-slide-description\">\n                    <p>Questo standard internazionale fornisce ulteriori linee guida di implementazione specifiche per il cloud basate su ISO\/IEC 27002 e fornisce controlli aggiuntivi per affrontare le minacce alla sicurezza delle informazioni specifiche per il cloud e i rischi relativi alle clausole 5-18 in ISO\/IEC 27002: 2013 per i controlli, orientamenti per l&#8217;attuazione e altre informazioni.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.overit.ai\/app\/uploads\/2025\/12\/InformationSecuritySys_ISOIEC27001_col.webp\" alt=\"ISO 27001\" width=\"250\" height=\"250\" \/><\/p>\n\n                  <\/div>\n                                                              <\/div>\n                      <\/div>\n        <\/div>\n                               <div class=\"block-ma-tab \">\n          <div class=\"block-ma-tab-side\">\n            <div class=\"block-ma-tab-side-title\">\n              <div class=\"block-ma-tab-side-title-bg\"\n                              >\n                              <div class=\"block-ma-tab-side-title-inner\">ISO 27018<\/div>\n                              <div class=\"block-ma-tab-slides-nav\">\n                                                                             <div class=\"block-ma-tab-slides-nav-title  block-ma-tab-slides-nav-title--active \">\n                      <span>ISO 27018<\/span>\n                    <\/div>\n                                                      <\/div>\n              <\/div>\n            <\/div>\n          <\/div>\n\n          <div class=\"block-ma-tab-slides\">\n                                         <div class=\"block-ma-tab-slide\">\n                <div class=\"block-ma-tab-slide-nav  block-ma-tab-slide-nav--with-description \">\n                                      ISO 27018\n                                  <\/div>\n                                  <div class=\"block-ma-tab-slide-description\">\n                    <p>ISO ha adottato ISO\/IEC 27018:2014, un addendum a ISO\/IEC 27001, un framework per la privacy cloud. Basato principalmente sulle leggi sulla protezione dei dati dell&#8217;UE, fornisce controlli e linee guida specifici ai provider di servizi cloud (CSP) che agiscono come responsabili del trattamento delle informazioni di identificazione personale (PII).<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.overit.ai\/app\/uploads\/2025\/12\/InformationSecuritySys_ISOIEC27001_col.webp\" alt=\"ISO 27001\" width=\"250\" height=\"250\" \/><\/p>\n\n                  <\/div>\n                                                              <\/div>\n                      <\/div>\n        <\/div>\n                  <\/div>\n  <\/div>\n\n<div class=\"\">\n<\/div>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-padding-medium-top \n  overit-block-configurable-jumbotron\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n<section class=\"configurable-jumbotron center\" >\n    \n                  <div class=\"cj-title small\">OverIT, Il vostro Partner SaaS FSM di fiducia<\/div>\n          \n    \n        <\/section>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-padding-medium-top \n  overit-block-list-boxes\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n<div class=\"block-list-boxes\">\n  <div class=\"block-list-boxes__content\">\n    <div class=\"block-list-boxes__items\">\n              \n                <div class=\"block-list-boxes__slide\">\n          <div class=\"block-list-boxes__item\">\n            \n                                        <div class=\"block-list-boxes__icon\">\n                                <i style=\"color: #FF8200;font-size: 32px;\" class=\"fa-classic fa-solid fa-shield-check\" aria-hidden=\"true\"><\/i>\n              <\/div>\n            \n            <div class=\"block-list-boxes__title\">\n              SSDLC (Ciclo di Vita dello Sviluppo Sicuro del Software)\n            <\/div>\n\n            <div class=\"block-list-boxes__text\">\n              OverIT vuole che il suo codice sia sicuro\n            <\/div>\n\n            <div class=\"block-list-boxes__list\">\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Adottiamo strumenti SAST (Static Application Security Testing) e SCA (Software Composition Analysis) all&#8217;avanguardia <\/div>\n                <\/div>\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Garantiamo componenti software sicuri fin dall&#8217;inizio<\/div>\n                <\/div>\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Monitoriamo le nuove vulnerabilit\u00e0 e tecniche di attacco<\/div>\n                <\/div>\n                          <\/div>\n          <\/div>\n        <\/div>\n              \n                <div class=\"block-list-boxes__slide\">\n          <div class=\"block-list-boxes__item\">\n            \n                                        <div class=\"block-list-boxes__icon\">\n                                <i style=\"color: #FF8200;font-size: 32px;\" class=\"fa-classic fa-regular fa-cloud\" aria-hidden=\"true\"><\/i>\n              <\/div>\n            \n            <div class=\"block-list-boxes__title\">\n              Sicurezza SaaS\n            <\/div>\n\n            <div class=\"block-list-boxes__text\">\n              Le infrastrutture SaaS di OverIT sono protette da una tecnologia avanzata\n            <\/div>\n\n            <div class=\"block-list-boxes__list\">\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Garantiamo la sicurezza dei carichi di lavoro<\/div>\n                <\/div>\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Trasmettiamo i dati su canali sicuri e utilizziamo sistemi di protezione per il data storage<\/div>\n                <\/div>\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Progettiamo le nostre operazioni SaaS in modo che siano resilienti ed efficaci anche in caso di attacchi DDoS<\/div>\n                <\/div>\n                          <\/div>\n          <\/div>\n        <\/div>\n          <\/div>\n  <\/div>\n  <div class=\"block-list-boxes__bg\"><\/div>\n<\/div>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-margin-medium-top overit-padding-medium \n  overit-block-list-boxes\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n<div class=\"block-list-boxes\">\n  <div class=\"block-list-boxes__content\">\n    <div class=\"block-list-boxes__items\">\n              \n                <div class=\"block-list-boxes__slide\">\n          <div class=\"block-list-boxes__item\">\n            \n                                        <div class=\"block-list-boxes__icon\">\n                                <i style=\"color: #FF8200;font-size: 32px;\" class=\"fa-classic fa-brands fa-watchman-monitoring\" aria-hidden=\"true\"><\/i>\n              <\/div>\n            \n            <div class=\"block-list-boxes__title\">\n              MONITORAGGIO DELLA SICUREZZA &amp; RISPOSTA AGLI INCIDENTI\n            <\/div>\n\n            <div class=\"block-list-boxes__text\">\n              I servizi di OverIT sono costantemente monitorati da un SOC (Security Operation Center) specializzato\n            <\/div>\n\n            <div class=\"block-list-boxes__list\">\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Supervisioniamo tutti gli eventi di sicurezza e telemetria raccolti da diverse fonti<\/div>\n                <\/div>\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>I nostri analisti della sicurezza indagano su ogni evento e anomalia per individuare reali problemi di sicurezza<\/div>\n                <\/div>\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Garantiamo che l&#8217;intera comunit\u00e0 sia consapevole delle diverse minacce alla sicurezza, per riconoscerle e rispondere adeguatamente con tutti gli strumenti e le procedure disponibili<\/div>\n                <\/div>\n                          <\/div>\n          <\/div>\n        <\/div>\n              \n                <div class=\"block-list-boxes__slide\">\n          <div class=\"block-list-boxes__item\">\n            \n                                        <div class=\"block-list-boxes__icon\">\n                                <i style=\"color: #FF8200;font-size: 32px;\" class=\"fa-classic fa-solid fa-user-shield\" aria-hidden=\"true\"><\/i>\n              <\/div>\n            \n            <div class=\"block-list-boxes__title\">\n              FORMAZIONE &amp; SENSIBILIZZAZIONE\n            <\/div>\n\n            <div class=\"block-list-boxes__text\">\n              OverIT ritiene che tutti i membri dell&#8217;organizzazione abbiano un ruolo attivo e importante da svolgere contro le minacce informatiche\n            <\/div>\n\n            <div class=\"block-list-boxes__list\">\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Organizziamo diverse sessioni di formazione si sensibilizzazione sulla sicurezza<\/div>\n                <\/div>\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Ci affidiamo a una piattaforma di sensibilizzazione alla sicurezza riconosciuta<\/div>\n                <\/div>\n                              \n                <div class=\"block-list-boxes__list_item\">\n                  <div><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 203.44 203.44\"><defs><style>.cls-1{fill:#FF8200;}<\/style><\/defs><g id=\"Livello_2\" data-name=\"Livello 2\"><g id=\"Capa_1\" data-name=\"Capa 1\"><g id=\"_2_PT\" data-name=\" 2 PT\"><path class=\"cls-1\" d=\"M101.72,203.44A101.72,101.72,0,1,1,203.44,101.72,101.72,101.72,0,0,1,101.72,203.44Zm0-175.32a73.6,73.6,0,1,0,73.6,73.6A73.61,73.61,0,0,0,101.72,28.12Z\"\/><\/g><\/g><\/g><\/svg><\/div>\n                  <div>Garantiamo che l&#8217;intera comunit\u00e0 sia consapevole delle diverse minacce alla sicurezza, per riconoscerle e rispondere adeguatamente con tutti gli strumenti e le procedure disponibili<\/div>\n                <\/div>\n                          <\/div>\n          <\/div>\n        <\/div>\n          <\/div>\n  <\/div>\n  <div class=\"block-list-boxes__bg\"><\/div>\n<\/div>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-no-padding \n  overit-block-configurable-jumbotron\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n<section class=\"configurable-jumbotron center\" >\n    \n                  <h3  class=\"cj-title small\">Segnalaci un evento di cybersecurity<\/h3 >\n          \n    \n        <\/section>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-padding-medium \n  overit-block-form-single\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n<div class=\"single-form-cont\">\n      \n\n                                            \n              <!--[if lte IE 8]>\n  <script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2-legacy.js\"><\/script>\n<![endif]-->\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"https:\/\/js.hsforms.net\/forms\/v2.js\"><\/script>\n<script>\n  var langElm = document.querySelector('html');\n  var languageAttr = langElm.getAttribute('lang');\n  var language = 'English';\n  var languageLocal = 'en';\n  var thankYou = \"Thank you.\";\n  if (languageAttr) {\n    if (languageAttr.includes('it')) {\n      language = 'Italian';\n      languageLocal = 'it';\n      thankYou = \"Grazie.\";\n    } else if (languageAttr.includes('es')) {\n      language = 'Spanish';\n      languageLocal = 'es';\n      thankYou = \"Gracias.\";\n    } else if (languageAttr.includes('de')) {\n      language = 'German';\n      languageLocal = 'de';\n      thankYou = \"Danke.\";\n    }\n  }\n\n  \/\/ Localized error messages\n  var errorMessages = {\n    en: {\n      emailAt: \"Email must contain '@'.\",\n      emailInvalid: \"Please enter a valid email address.\",\n      checkbox: \"Please check this box to continue.\"\n    },\n    it: {\n      emailAt: \"L'email deve contenere '@'.\",\n      emailInvalid: \"Inserisci un indirizzo email valido.\",\n      checkbox: \"Seleziona questa casella per continuare.\"\n    },\n    es: {\n      emailAt: \"El correo debe contener '@'.\",\n      emailInvalid: \"Por favor, introduce una direcci\u00f3n de correo v\u00e1lida.\",\n      checkbox: \"Marca esta casilla para continuar.\"\n    },\n    de: {\n      emailAt: \"Die E-Mail muss ein '@' enthalten.\",\n      emailInvalid: \"Bitte geben Sie eine g\u00fcltige E-Mail-Adresse ein.\",\n      checkbox: \"Bitte aktivieren Sie dieses K\u00e4stchen, um fortzufahren.\"\n    }\n  };\n  \/\/ Helper to get custom error message for a field\n  function getCustomMessage(field) {\n    if (field.name === 'email') {\n      var value = field.value || '';\n      if (!value.includes('@')) {\n        return errorMessages[languageLocal].emailAt;\n      } else if (!\/^\\S+@\\S+\\.\\S+$\/.test(value)) {\n        return errorMessages[languageLocal].emailInvalid;\n      }\n    }\n    if (field.type === 'checkbox') {\n      return errorMessages[languageLocal].checkbox;\n    }\n    \/\/ For other fields, return the original error message if present\n    var fieldWrapper = field.closest ? field.closest('.hs-form-field') : field.parentNode;\n    var errorMessage = fieldWrapper ? fieldWrapper.querySelector('.hs-error-msg, .hs-error-msgs li, .error-message, .invalid-message') : null;\n    if (errorMessage && errorMessage.textContent) {\n      return errorMessage.textContent;\n    }\n    return '';\n  }\n  \/\/ General function to set custom error message and ARIA attributes\n  function setCustomError(field, errorMessage, customMessage) {\n    if (!errorMessage) return;\n    if (customMessage) {\n      errorMessage.innerHTML = '<label class=\"hs-error-msg hs-main-font-element\">' + customMessage + '<\/label>';\n      if (!errorMessage.id) {\n        var baseId = field.id || field.name || 'field';\n        errorMessage.id = baseId + '-error';\n      }\n      field.setAttribute('aria-invalid', 'true');\n      field.setAttribute('aria-describedby', errorMessage.id);\n      errorMessage.setAttribute('role', 'alert');\n    } else {\n      errorMessage.innerHTML = '';\n      field.removeAttribute('aria-invalid');\n      field.removeAttribute('aria-describedby');\n    }\n  }\n\n  hbspt.forms.create({\n    region: \"na1\",\n    portalId: \"4800556\",\n        formId: \"6a6065cc-a119-486d-a804-e8e30a43e85d\",\n    inlineMessage: thankYou,\n    locale: `${languageLocal}`,\n    onFormSubmitted: function($form) {\n      setTimeout(function() {\n        const confirmation = document.querySelector('.submitted-message');\n        if (confirmation) {\n          confirmation.setAttribute('tabindex', '-1');\n          confirmation.focus();\n        }\n      }, 500);\n    },\n    translations: {\n      en: {\n        fieldLabels: {\n          firstname: \"First name\",\n          lastname: \"Last Name\",\n          company: \"Company name\",\n          email: \"Email\",\n          phone: \"Phone number\",\n          mobilephone: \"Mobile\",\n          industry_overit: \"Industry\",\n          state: \"Country\",\n          number_of_on_field_resources: \"Number of on field resources\",\n          message: \"Message\",\n          security_system_or_services_impacted: \"System or services Impacted\",\n          security_description: \"Description\",\n          security_subject: \"Subject\",\n          file_upload: \"File upload\"\n        }\n      },\n      es: {\n        fieldLabels: {\n          firstname: \"Nombre\",\n          lastname: \"Apellidos\",\n          company: \"Nombre de la empresa\",\n          email: \"Correo\",\n          phone: \"N\u00famero de tel\u00e9fono\",\n          mobilephone: \"N\u00famero de m\u00f3vil\",\n          industry_overit: \"Industria\",\n          state: \"Pa\u00eds\",\n          number_of_on_field_resources: \"N\u00famero de recursos en el campo\",\n          message: \"Mensaje\",\n          security_system_or_services_impacted: \"Sistema o servicios impactados\",\n          security_description: \"Descripci\u00f3n\",\n          security_subject: \"Asunto\",\n          file_upload: \"Cargar un archivo\"\n        }\n      },\n      it: {\n        fieldLabels: {\n          firstname: \"Nome\",\n          lastname: \"Cognome\",\n          company: \"Nome azienda\",\n          email: \"E-mail\",\n          phone: \"Numero di telefono\",\n          mobilephone: \"Numero di cellulare\",\n          industry_overit: \"Settore\",\n          state: \"Paese\",\n          number_of_on_field_resources: \"Numero di risorse sul campo\",\n          message: \"Messaggio\",\n          security_system_or_services_impacted: \"Sistemi o servizi interessati\",\n          security_description: \"Descrizione\",\n          security_subject: \"Oggetto\",\n          file_upload: \"Carica un file\"\n        }\n      },\n      de: {\n        fieldLabels: {\n          firstname: \"Vorname\",\n          lastname: \"Nachname\",\n          company: \"Unternehmen\",\n          email: \"E-Mail\",\n          phone: \"Mobiltelefon\",\n          mobilephone: \"Handy\",\n          industry_overit: \"Branche\",\n          state: \"Land\",\n          number_of_on_field_resources: \"Anzahl der Au\u00dfendienstressourcen\",\n          message: \"Nachricht\",\n          security_system_or_services_impacted: \"Betroffene Systeme oder Dienste\",\n          security_description: \"Beschreibung\",\n          security_subject: \"Betreff\",\n          file_upload: \"Datei hochladen\"\n        }\n      }\n    },\n    onFormReady: function ($form, e) {\n      window.hubspotformElements = window.hubspotformElements || {};\n      var formId = '6a6065cc-a119-486d-a804-e8e30a43e85d';\n      window.hubspotformElements[formId] = $form[0];\n      var formElement = window.hubspotformElements[formId];\n      \/\/ Real-time validation for email and required checkboxes\n      var emailInput = formElement.querySelector('input[name=\"email\"]');\n      if (emailInput) {\n        emailInput.addEventListener('blur', function() {\n          setTimeout(function() {\n            var value = emailInput.value || '';\n            var fieldWrapper = emailInput.closest('.hs-form-field') || emailInput.parentNode;\n            var errorMessage = fieldWrapper ? fieldWrapper.querySelector('.hs-error-msg, .hs-error-msgs li, .error-message, .invalid-message') : null;\n            var customMessage = getCustomMessage(emailInput);\n            setCustomError(emailInput, errorMessage, customMessage);\n          }, 150);\n        });\n      }\n      var requiredCheckboxes = formElement.querySelectorAll('input[type=\"checkbox\"].hs-input');\n      requiredCheckboxes.forEach(function(checkbox) {\n        checkbox.addEventListener('change', function() {\n          var fieldWrapper = checkbox.closest('.hs-form-field') || checkbox.parentNode;\n          var errorMessage = fieldWrapper ? fieldWrapper.querySelector('.hs-error-msg, .hs-error-msgs li, .error-message, .invalid-message') : null;\n          var customMessage = getCustomMessage(checkbox);\n          setCustomError(checkbox, errorMessage, customMessage);\n        });\n      });\n      var consetRichElm = formElement.querySelectorAll('.legal-consent-container .hs-richtext');\n      var subType1 = formElement.querySelector('[class*=\"hs_LEGAL_CONSENT.subscription_type_5261220\"] label > span p');\n      var subType2 = formElement.querySelector('[class*=\"hs_LEGAL_CONSENT.subscription_type_5382246\"] label > span p');\n      if (subType2 == null) {\n        subType2 = formElement.querySelector('[class*=\"hs_LEGAL_CONSENT.subscription_type_5382246\"] label > span');\n      }\n      if(language == 'Spanish') {\n        if(consetRichElm[0]) {\n          consetRichElm[0].innerHTML = '<p>Declaro que he le\u00eddo y comprendido la <a href=\"\/es\/privacy-policy\/\" target=\"_blank\" rel=\"noopener\">Pol\u00edtica de Privacidad<\/a> de OverIT y, por lo tanto:<\/p>';\n        }\n        if(subType1) {\n          subType1.innerHTML = 'Consiento el tratamiento de mis datos personales para recibir una respuesta a mi solicitud'\n        }\n        if(subType2){\n          subType2.innerHTML = 'Consiento el tratamiento de mis datos personales con fines de marketing.'\n        }\n        if(consetRichElm[1]) {\n          consetRichElm[1].innerHTML = '<p><\/p>';\n        }\n      }\n      if(language == 'Italian') {\n        if(consetRichElm[0]) {\n          consetRichElm[0].innerHTML = '<p>Dichiaro di aver letto e compreso <a href=\"\/it\/privacy-policy\/\" target=\"_blank\" rel=\"noopener\">l\\'Informativa sulla Privacy<\/a> di OverIT e pertanto:<\/p>';\n        }\n        if(subType1) {\n          subType1.innerHTML = 'Acconsento al trattamento dei miei dati personali per ottenere una risposta alla mia richiesta.';\n        }\n        if(subType2){\n          subType2.innerHTML = 'Acconsento al trattamento dei miei dati personali per finalit\u00e0 di marketing.';\n        }\n        if(consetRichElm[1]) {\n          consetRichElm[1].innerHTML = '<p><\/p>';\n        }\n      }\n      if(language == 'German') {\n        if(consetRichElm[0]) {\n          consetRichElm[0].innerHTML = '<p>Ich erkl\u00e4re, dass ich die <a href=\"\/de\/privacy-policy\/\" target=\"_blank\" rel=\"noopener\">Datenschutzerkl\u00e4rung<\/a> von OverIT zur Kenntnis genommen habe und deshalb:<\/p>';\n        }\n        if(subType1) {\n          subType1.innerHTML = 'Ich stimme der Verarbeitung meiner pers\u00f6nlichen Daten zu, um eine Antwort auf meine Anfrage zu erhalten.';\n        }\n        if(subType2){\n          subType2.innerHTML = 'Ich stimme der Verarbeitung meiner pers\u00f6nlichen Daten f\u00fcr Marketingzwecke zu.';\n        }\n        if(consetRichElm[1]) {\n          consetRichElm[1].innerHTML = '<p><\/p>';\n        }\n      }\n\n      \/\/ File upload customization\n      var fileInput = formElement.querySelector('input[type=\"file\"]');\n\n\n      if (fileInput) {\n        \/\/ Hide the default file input\n        fileInput.style.display = 'none';\n\n        \/\/ Create a custom button\n        var customButton = document.createElement('button');\n        customButton.type = 'button';\n        customButton.className = 'hs-button primary upload';\n\n        \/\/ Create the text for selected files\n        var fileText = document.createElement('div');\n        fileText.className = 'file-text';\n\n        \/\/ Set the text based on the language\n        var buttonText, noFileText, filesSelectedText;\n\n        if (language == 'Spanish') {\n          buttonText = 'Seleccionar archivo';\n          noFileText = 'Ning\u00fan archivo seleccionado';\n          filesSelectedText = 'archivos seleccionados';\n        } else if (language == 'Italian') {\n          buttonText = 'Scegli file';\n          noFileText = 'Nessun file selezionato';\n          filesSelectedText = 'file selezionati';\n        } else if (language == 'German') {\n          buttonText = 'Datei ausw\u00e4hlen';\n          noFileText = 'Keine Datei wurde ausgew\u00e4hlt';\n          filesSelectedText = 'Ausgew\u00e4hlte Dateien';\n        } else {\n          buttonText = 'Choose Files';\n          noFileText = 'No file chosen';\n          filesSelectedText = 'files selected';\n        }\n\n        customButton.textContent = buttonText;\n        fileText.textContent = noFileText;\n\n        \/\/ Add elements to the DOM\n        fileInput.parentNode.classList.add('hs-form-file-upload');\n        fileInput.parentNode.appendChild(customButton);\n        fileInput.parentNode.appendChild(fileText);\n\n        \/\/ Handle click on custom button\n        customButton.addEventListener('click', function() {\n          fileInput.click();\n        });\n\n        \/\/ Handle file change\n        fileInput.addEventListener('change', function() {\n          var files = this.files;\n          if (files.length > 0) {\n            if (files.length === 1) {\n              fileText.textContent = files[0].name;\n            } else {\n              fileText.textContent = files.length + ' ' + filesSelectedText;\n            }\n          } else {\n            fileText.textContent = noFileText;\n          }\n        });\n      }\n    },\n    onBeforeFormSubmit: function($form) {\n      var htmlForm = $form[0];\n\n      var langSelector = htmlForm.querySelector('[name=\"language\"]');\n      if (langSelector) {\n        langSelector.value = language;\n      }\n\n      var pageURLSelector = htmlForm.querySelector('[name=\"last_touchpoint_url\"]');\n      if (pageURLSelector) {\n        pageURLSelector.value = window.location.href;\n      }\n\n      var pageTitleSelector = htmlForm.querySelector('[name=\"last_touchpoint\"]');\n      if (pageTitleSelector) {\n        pageTitleSelector.value = document.title;\n      }\n\n      var reachedFromSelector = htmlForm.querySelector('[name=\"referring_page_url\"]');\n      if (reachedFromSelector) {\n        reachedFromSelector.value = document.referrer;\n      }\n    },\n    onFormError: function() {\n      \/\/ Retrieve the correct formElement using formId\n      var formId = '6a6065cc-a119-486d-a804-e8e30a43e85d';\n      var formElement = window.hubspotformElements[formId];\n      if (!formElement) return;\n      setTimeout(function() {\n        \/\/ Find all fields with errors\n        var errorFields = Array.from(formElement.querySelectorAll('.invalid, .error'));\n        \/\/ Also include required checkboxes with visible error messages\n        var requiredCheckboxes = Array.from(formElement.querySelectorAll('input[type=\"checkbox\"].hs-input'));\n        requiredCheckboxes.forEach(function(checkbox) {\n          var wrapper = checkbox.closest('.hs-form-field');\n          var errorMsg = wrapper ? wrapper.querySelector('.hs-error-msg, .hs-error-msgs li, .error-message, .invalid-message') : null;\n          if (errorMsg && errorMsg.offsetParent !== null && !errorFields.includes(checkbox)) {\n            errorFields.push(checkbox);\n          }\n        });\n        if (errorFields.length > 0) {\n          errorFields.forEach(function(field, index) {\n            var fieldWrapper = field.closest ? field.closest('.hs-form-field') : field.parentNode;\n            if (!fieldWrapper) return;\n            var errorMessage = fieldWrapper.querySelector('.hs-error-msg, .hs-error-msgs li, .error-message, .invalid-message');\n            if (!errorMessage) return;\n            var customMessage = getCustomMessage(field);\n            setCustomError(field, errorMessage, customMessage);\n          });\n          \/\/ Focus and scroll to the first error field\n          var firstErrorField = errorFields[0];\n          var target = firstErrorField.closest ? firstErrorField.closest('.hs-form-field') : firstErrorField;\n          target.scrollIntoView({\n            behavior: 'smooth',\n            block: 'center'\n          });\n          setTimeout(function() {\n            firstErrorField.focus();\n          }, 300);\n        }\n      }, 100);\n    },\n    onFormSubmit: function($form) {\n      window.overit.hubspot.onFormSubmit($form);\n    }\n  });\n<\/script>\n      <\/div>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n\n\n<div\n  class=\"overit-block overit-block--white overit-radius-full overit-no-margin overit-padding-small \n  overit-block-wide-info-image\"\n        >\n  \n  <div class=\"overit-block-wrapper\">\n\n\n\n\n<div class=\"wii left  \" id=\"\">\n        <div class=\"wii__image\" >\n                        <img decoding=\"async\" src=\"https:\/\/www.overit.ai\/app\/uploads\/2024\/06\/Cybersecurity-whitepaper-mockup.png\" alt=\"Cybersecurity-whitepaper-mockup\" width=\"1903\" height=\"1324\" \/>\n                  <\/div>\n  \n      <div class=\"wii__content\" >\n    \n                      <h3 id=\"wii-title-69f2fabb8c9f4\" class=\"wii__title\" style=\"  \">L&#8217;approccio di OverIT alla sicurezza informatica e alla protezione dei dati <\/h3>\n          \n    \n        \n    \n          <div class=\"wii__cta\">\n        <a\n          href=\"https:\/\/www.overit.ai\/it\/risorse\/sicurezza-delle-informazioni-e-protezione-dei-dati\/\"\n                    class=\"wii__cta--orange \"\n          aria-describedby=\"wii-title-69f2fabb8c9f4\"\n        >\n          SCARICA IL WHITEPAPER\n        <\/a>\n      <\/div>\n    \n    \n      <\/div>\n  \n  <\/div>\n\n<\/div><!-- .overit-block-wrapper -->\n<\/div><!-- .overit-block -->\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":37001,"parent":66,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"case_study_category":[],"class_list":["post-37422","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.6 (Yoast SEO v25.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity - OverIT<\/title>\n<meta name=\"description\" content=\"Niente \u00e8 pi\u00f9 importante dell&#039;affidabilit\u00e0 dei nostri sistemi, della sicurezza informatica e della parola data a clienti e partner\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Niente \u00e8 pi\u00f9 importante dell&#039;affidabilit\u00e0 dei nostri sistemi, della sicurezza informatica e della parola data a clienti e partner\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"OverIT\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T15:43:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.overit.ai\/app\/uploads\/2023\/03\/OverIT-cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1027\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/\",\"url\":\"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/\",\"name\":\"Cybersecurity - OverIT\",\"isPartOf\":{\"@id\":\"https:\/\/www.overit.ai\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.overit.ai\/app\/uploads\/2023\/03\/OverIT-cybersecurity.jpg\",\"datePublished\":\"2023-03-20T10:26:56+00:00\",\"dateModified\":\"2026-04-28T15:43:04+00:00\",\"description\":\"Niente \u00e8 pi\u00f9 importante dell'affidabilit\u00e0 dei nostri sistemi, della sicurezza informatica e della parola data a clienti e partner\",\"breadcrumb\":{\"@id\":\"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.overit.ai\/app\/uploads\/2023\/03\/OverIT-cybersecurity.jpg\",\"contentUrl\":\"https:\/\/www.overit.ai\/app\/uploads\/2023\/03\/OverIT-cybersecurity.jpg\",\"width\":2048,\"height\":1027,\"caption\":\"OverIT cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.overit.ai\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azienda\",\"item\":\"https:\/\/www.overit.ai\/it\/azienda\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.overit.ai\/it\/#website\",\"url\":\"https:\/\/www.overit.ai\/it\/\",\"name\":\"OverIT\",\"description\":\"Innovation in Field Service Management\",\"publisher\":{\"@id\":\"https:\/\/www.overit.ai\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.overit.ai\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.overit.ai\/it\/#organization\",\"name\":\"OverIT\",\"url\":\"https:\/\/www.overit.ai\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.overit.ai\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.overit.ai\/app\/uploads\/2021\/10\/OverIT-logo-400.png\",\"contentUrl\":\"https:\/\/www.overit.ai\/app\/uploads\/2021\/10\/OverIT-logo-400.png\",\"width\":400,\"height\":250,\"caption\":\"OverIT\"},\"image\":{\"@id\":\"https:\/\/www.overit.ai\/it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity - OverIT","description":"Niente \u00e8 pi\u00f9 importante dell'affidabilit\u00e0 dei nostri sistemi, della sicurezza informatica e della parola data a clienti e partner","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/","og_locale":"it_IT","og_type":"article","og_title":"Cybersecurity","og_description":"Niente \u00e8 pi\u00f9 importante dell'affidabilit\u00e0 dei nostri sistemi, della sicurezza informatica e della parola data a clienti e partner","og_url":"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/","og_site_name":"OverIT","article_modified_time":"2026-04-28T15:43:04+00:00","og_image":[{"width":2048,"height":1027,"url":"https:\/\/www.overit.ai\/app\/uploads\/2023\/03\/OverIT-cybersecurity.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/","url":"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/","name":"Cybersecurity - OverIT","isPartOf":{"@id":"https:\/\/www.overit.ai\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.overit.ai\/app\/uploads\/2023\/03\/OverIT-cybersecurity.jpg","datePublished":"2023-03-20T10:26:56+00:00","dateModified":"2026-04-28T15:43:04+00:00","description":"Niente \u00e8 pi\u00f9 importante dell'affidabilit\u00e0 dei nostri sistemi, della sicurezza informatica e della parola data a clienti e partner","breadcrumb":{"@id":"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/#primaryimage","url":"https:\/\/www.overit.ai\/app\/uploads\/2023\/03\/OverIT-cybersecurity.jpg","contentUrl":"https:\/\/www.overit.ai\/app\/uploads\/2023\/03\/OverIT-cybersecurity.jpg","width":2048,"height":1027,"caption":"OverIT cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.overit.ai\/it\/azienda\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.overit.ai\/it\/"},{"@type":"ListItem","position":2,"name":"Azienda","item":"https:\/\/www.overit.ai\/it\/azienda\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.overit.ai\/it\/#website","url":"https:\/\/www.overit.ai\/it\/","name":"OverIT","description":"Innovation in Field Service Management","publisher":{"@id":"https:\/\/www.overit.ai\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.overit.ai\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.overit.ai\/it\/#organization","name":"OverIT","url":"https:\/\/www.overit.ai\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.overit.ai\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.overit.ai\/app\/uploads\/2021\/10\/OverIT-logo-400.png","contentUrl":"https:\/\/www.overit.ai\/app\/uploads\/2021\/10\/OverIT-logo-400.png","width":400,"height":250,"caption":"OverIT"},"image":{"@id":"https:\/\/www.overit.ai\/it\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.overit.ai\/it\/wp-json\/wp\/v2\/pages\/37422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.overit.ai\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.overit.ai\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.overit.ai\/it\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.overit.ai\/it\/wp-json\/wp\/v2\/comments?post=37422"}],"version-history":[{"count":27,"href":"https:\/\/www.overit.ai\/it\/wp-json\/wp\/v2\/pages\/37422\/revisions"}],"predecessor-version":[{"id":73363,"href":"https:\/\/www.overit.ai\/it\/wp-json\/wp\/v2\/pages\/37422\/revisions\/73363"}],"up":[{"embeddable":true,"href":"https:\/\/www.overit.ai\/it\/wp-json\/wp\/v2\/pages\/66"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.overit.ai\/it\/wp-json\/wp\/v2\/media\/37001"}],"wp:attachment":[{"href":"https:\/\/www.overit.ai\/it\/wp-json\/wp\/v2\/media?parent=37422"}],"wp:term":[{"taxonomy":"case_study_category","embeddable":true,"href":"https:\/\/www.overit.ai\/it\/wp-json\/wp\/v2\/case_study_category?post=37422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}