{"id":506088,"date":"2024-02-29T16:53:03","date_gmt":"2024-02-29T15:53:03","guid":{"rendered":"https:\/\/www.stormshield.com\/endpoint-detection-response-edr\/"},"modified":"2024-09-16T13:27:34","modified_gmt":"2024-09-16T12:27:34","slug":"edr","status":"publish","type":"page","link":"https:\/\/www.stormshield.com\/it\/edr\/","title":{"rendered":"Endpoint Detection &#038; Response &#8211; EDR"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_top=\"50\" padding_bottom=\"50\" css=\".vc_custom_1708942368363{background-color: #ffffff !important;}\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner][vc_empty_space][vc_column_text]<\/p>\n<h1 style=\"text-align: center;\"><span style=\"color: #00aaf5;\"><span style=\"font-weight: 900; font-size: 1.5em;\">Endpoint Detection &amp; Response (EDR),<\/span><\/span><span style=\"color: #00aaf5;\"><span style=\"font-weight: 300; font-size: 1.5em;\"> per la protezione dei vostri terminali<\/span><\/span><\/h1>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_top=\"50\" padding_bottom=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"3\/4\" css=\".vc_custom_1708939697175{padding-right: 32px !important;padding-left: 32px !important;}\"][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: black; line-height: 0.8em;\">Cos'\u00e8 l'EDR?<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\">All'interno del vostro parco IT, ogni terminale collegato rappresenta un potenziale vettore di attacco e ogni connessione costituisce un punto di accesso al vostro sistema informatico e ai vostri dati sensibili. Le tecnologie antivirus hanno limiti di fronte agli attacchi informatici avanzati. Limiti che possono per\u00f2 essere superati dalle soluzioni EDR (<em>Endpoint Detection and Response<\/em>).<\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\"><strong>Queste soluzioni EDR intervengono per rafforzare la sicurezza dei terminali con un monitoraggio in tempo reale, un rilevamento intelligente delle intrusioni e la loro rapida correzione, nonch\u00e9 un miglioramento continuo della protezione.<\/strong><\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/4\"][vc_empty_space][vc_single_image image=\"266688\" img_size=\"full\" alignment=\"center\" qode_css_animation=\"\"][vc_empty_space height=\"12px\"][vc_single_image image=\"266674\" img_size=\"full\" alignment=\"center\" qode_css_animation=\"\"][vc_empty_space height=\"12px\"][vc_single_image image=\"266682\" img_size=\"full\" alignment=\"center\" qode_css_animation=\"\"][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" css=\".vc_custom_1708939745991{padding-top: 32px !important;padding-right: 32px !important;padding-bottom: 32px !important;padding-left: 32px !important;}\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"grid\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"1\/3\" css=\".vc_custom_1708939714814{padding-right: 32px !important;padding-left: 32px !important;}\"][vc_empty_space][vc_single_image image=\"267314\" img_size=\"medium\" qode_css_animation=\"\"][\/vc_column_inner][vc_column_inner width=\"2\/3\"][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: black; line-height: 0.8em;\">Monitoraggio in tempo reale dei terminali<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\"><strong>La tecnologia EDR si basa su una raccolta di dati che transitano sui terminali, dalle connessioni di rete ai vari processi, passando per file aperti, caricamento dei driver, utilizzo della memoria e del disco e accesso al database centrale.<\/strong> In seguito, tutti questi dati vengono trasmessi a un motore di analisi EDR, che individuer\u00e0 comportamenti sospetti e anomali. Il risultato: una visibilit\u00e0 in tempo reale e completa su tutte le attivit\u00e0 dei terminali, per una rapida identificazione delle attivit\u00e0 dannose.<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" css=\".vc_custom_1708939745991{padding-top: 32px !important;padding-right: 32px !important;padding-bottom: 32px !important;padding-left: 32px !important;}\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"2\/3\"][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: black; line-height: 0.8em;\">Rilevamento intelligente e correzione rapida<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\">Le tecnologie EDR utilizzano l'analisi comportamentale per riconoscere queste attivit\u00e0 sospette e anomale. Fondamentale \u00e8 la fase di analisi dei dati centralizzati, in quanto corrobora le informazioni per ricavarne schemi di attacco, tra cui anche gli attacchi informatici di tipo Zero-Day. <strong>In caso di rilevamento di una minaccia informatica o di tentativi di intrusione, l\u2019EDR raccomanda misure correttive come l\u2019arresto di un processo in corso, il blocco di un\u2019esecuzione, la messa in quarantena di un file oppure l\u2019isolamento di terminali infetti...<\/strong> Gli amministratori e gli analisti di sicurezza potranno quindi investigare sulla base dei risultati delle analisi e applicare le misure correttive pi\u00f9 appropriate.<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/3\" css=\".vc_custom_1708939721806{padding-right: 32px !important;padding-left: 32px !important;}\"][vc_empty_space][vc_single_image image=\"267308\" img_size=\"medium\" qode_css_animation=\"\"][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" css=\".vc_custom_1708939745991{padding-top: 32px !important;padding-right: 32px !important;padding-bottom: 32px !important;padding-left: 32px !important;}\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"1\/3\" css=\".vc_custom_1708939727974{padding-right: 32px !important;padding-left: 32px !important;}\"][vc_empty_space][vc_single_image image=\"267299\" img_size=\"medium\" qode_css_animation=\"\"][\/vc_column_inner][vc_column_inner width=\"2\/3\"][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: black; line-height: 0.8em;\">Continuo miglioramento della protezione<\/span><\/h2>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\">Di fronte all'evoluzione costante delle modalit\u00e0 operative, la soluzione EDR supporta la comprensione e l'apprendimento dei team di Sicurezza. <strong>Grazie infatti ai dati raccolti e analizzati durante le fasi investigative, sono meglio equipaggiati per contrastare i futuri attacchi informatici.<\/strong> La risposta all'incidente consente in particolare di comprendere meglio le azioni passate, ad esempio visualizzando i legami causali di una catena di attacco, e di migliorare costantemente la protezione fornita dalla soluzione EDR.<\/span><\/p>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" css=\".vc_custom_1708939922324{padding-top: 32px !important;padding-right: 32px !important;padding-bottom: 32px !important;padding-left: 32px !important;background-color: #060051 !important;}\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner][vc_column_text css=\"\"]<\/p>\n<h2><span style=\"font-size: 1.6em; font-weight: bold; color: #ffffff; line-height: 0.8em;\">Stormshield Endpoint Security Evolution, la soluzione EDR certificata<\/span><\/h2>\n<p><span style=\"color: #ffffff; font-size: 1.1em;\">La soluzione proattiva Stormshield Endpoint Security Evolution (SES) permette di migliorare il livello di protezione delle postazioni di lavoro. Basata su una tecnologia di analisi senza firma, la soluzione SES rileva attacchi e minacce cibernetiche e risponde in modo appropriato. La nostra soluzione EDR affidabile ha ottenuto la certificazione di sicurezza di primo livello (CSPN) rilasciata dall'ANSSI per la categoria Rilevamento di intrusioni.<\/span><\/p>\n<p><span style=\"color: #000; font-size: 1.1em;\"><span style=\"color: #ffffff;\"><strong>Scoprite una soluzione EDR per la protezione di terminali e server di nuova generazione.<\/strong> Inoltre grazie alle funzionalit\u00e0 di Cyber Threat Intelligence e Threat Hunting, potrete beneficiare di una capacit\u00e0 avanzata di rilevazione degli attacchi informatici pi\u00f9 sofisticati.<\/span><\/span>[\/vc_column_text][vc_empty_space][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"1\/3\"]<div class=\"qode_video_box\">\n\t<a itemprop=\"image\" class=\"qode_video_image\" href=\"https:\/\/youtu.be\/7bZ3jmJz3T8\" data-rel=\"prettyPhoto\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1918\" height=\"1078\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/en1.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/en1.jpg 1918w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-300x169.jpg 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-1024x576.jpg 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-768x432.jpg 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-1536x863.jpg 1536w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-1396x785.jpg 1396w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-700x393.jpg 700w, https:\/\/www.stormshield.com\/wp-content\/uploads\/en1-539x303.jpg 539w\" sizes=\"auto, (max-width: 1918px) 100vw, 1918px\" \/>\t\t\t<span class=\"qode_video_box_button_holder\">\n\t\t\t\t<span class=\"qode_video_box_button\">\n\t\t\t\t\t<span class=\"qode_video_box_button_arrow\">\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/span>\n\t\t\t<\/a>\n<\/div>[vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/3\"]<div class=\"qode_video_box\">\n\t<a itemprop=\"image\" class=\"qode_video_image\" href=\"https:\/\/youtu.be\/7vAeJpk0ErA\" data-rel=\"prettyPhoto\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1276\" height=\"710\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37.jpg 1276w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37-300x167.jpg 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37-1024x570.jpg 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37-768x427.jpg 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-37-700x389.jpg 700w\" sizes=\"auto, (max-width: 1276px) 100vw, 1276px\" \/>\t\t\t<span class=\"qode_video_box_button_holder\">\n\t\t\t\t<span class=\"qode_video_box_button\">\n\t\t\t\t\t<span class=\"qode_video_box_button_arrow\">\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/span>\n\t\t\t<\/a>\n<\/div>[vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/3\"]<div class=\"qode_video_box\">\n\t<a itemprop=\"image\" class=\"qode_video_image\" href=\"https:\/\/youtu.be\/T9KhySZFkWs\" data-rel=\"prettyPhoto\">\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1274\" height=\"712\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55.jpg 1274w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55-300x168.jpg 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55-1024x572.jpg 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55-768x429.jpg 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/capture-55-700x391.jpg 700w\" sizes=\"auto, (max-width: 1274px) 100vw, 1274px\" \/>\t\t\t<span class=\"qode_video_box_button_holder\">\n\t\t\t\t<span class=\"qode_video_box_button\">\n\t\t\t\t\t<span class=\"qode_video_box_button_arrow\">\n\t\t\t\t\t<\/span>\n\t\t\t\t<\/span>\n\t\t\t<\/span>\n\t\t\t<\/a>\n<\/div>[vc_empty_space][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner]<a  itemprop=\"url\" href=\"https:\/\/www.stormshield.com\/it\/prodotti-e-soluzioni\/prodotti\/protezione-delle-postazioni-e-dei-server\/stormshield-endpoint-security\/\" target=\"_blank\" data-hover-background-color=\"#d23467\" data-hover-border-color=\"#d23467\" class=\"qbutton  center white enlarge\" style=\"border-color: #ffffff; background-color:#00aaf5;\">Scoprire Stormshield Endpoint Security<i class=\"qode_icon_font_awesome fa fa-angle-right qode_button_icon_element\"><\/i><\/a>[vc_empty_space][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"grid\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\" z_index=\"\" padding_bottom=\"50\" css=\".vc_custom_1708702319908{background-color: #ffffff !important;}\" padding_top=\"50\"][vc_column][vc_row_inner row_type=\"row\" type=\"full_width\" text_align=\"left\" css_animation=\"\"][vc_column_inner width=\"1\/2\"][vc_empty_space]<span class=\"separator_with_icon\" style=\"color:#060051\"><i class=\"fa fa-question\"><\/i><\/span>[vc_column_text]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\"><strong>Q&amp;A: Come funziona un EDR?<\/strong> Per rilevare i sofisticati attacchi informatici, l\u2019EDR individua comportamenti sospetti e anomali grazie ad indici di compromissione (IoC - Indicators of Compromise). Non sempre si tratta di eventi eccezionali, ma di azioni banali come l\u2019apertura di una connessione a un server esterno. Una volta identificati questi comportamenti sospetti, la soluzione EDR raccomanda misure di correzione rapida e consente ulteriori indagini sulla base dei risultati delle analisi.<br \/>\n[\/vc_column_text][vc_empty_space][\/vc_column_inner][vc_column_inner width=\"1\/2\" css=\".vc_custom_1708696718516{padding-top: 32px !important;padding-right: 32px !important;padding-bottom: 32px !important;padding-left: 32px !important;background-color: #f9f9f9 !important;}\"]<span class=\"separator_with_icon\" style=\"color:#060051\"><i class=\"fa fa-question\"><\/i><\/span>[vc_column_text]<\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000; font-size: 1.1em;\"><strong>Q&amp;A: EDR o XDR?<\/strong> Per gli strumenti di protezione dei terminali \u00e8 indispensabile integrare una capacit\u00e0 di rilevamento e risposta agli incidenti. A complemento dell'EDR, la piattaforma XDR (eXtended Detection and Response) intende riunire tutti gli asset informatici interni ed esterni (rete, directory, risorse cloud, firewall, ecc.) al fine di fornire una visione d'insieme degli eventi del sistema IT.[\/vc_column_text][vc_empty_space][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=\"\" row_type=\"row\" use_row_as_full_screen_section=\"no\" type=\"full_width\" angled_section=\"no\" text_align=\"left\" background_image_as_pattern=\"without_pattern\"][vc_column][vc_column_text]<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; padding_top=&#8221;50&#8243; padding_bottom=&#8221;50&#8243; css=&#8221;.vc_custom_1708942368363{background-color: #ffffff !important;}&#8221;][vc_column][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][vc_empty_space][vc_column_text] Endpoint Detection &amp; Response (EDR), per la protezione dei vostri terminali [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; padding_top=&#8221;50&#8243; padding_bottom=&#8221;50&#8243;][vc_column][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner width=&#8221;3\/4&#8243;&#8230;<\/p>\n","protected":false},"author":31,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"full_width.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-506088","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EDR - Endpoint Detection &amp; Response, protezione per i vostri dispositivi<\/title>\n<meta name=\"description\" content=\"Endpoint Detection &amp; Response, soluzioni di cybersecurity EDR di nuova generazione per rafforzare la sicurezza degli endpoint.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/it\/edr\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EDR - Endpoint Detection &amp; Response, protezione per i vostri dispositivi\" \/>\n<meta property=\"og:description\" content=\"Endpoint Detection &amp; Response, soluzioni di cybersecurity EDR di nuova generazione per rafforzare la sicurezza degli endpoint.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/it\/edr\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-16T12:27:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/stormshield_logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"204\" \/>\n\t<meta property=\"og:image:height\" content=\"94\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stormshield.com\/it\/edr\/\",\"url\":\"https:\/\/www.stormshield.com\/it\/edr\/\",\"name\":\"EDR - Endpoint Detection & Response, protezione per i vostri dispositivi\",\"isPartOf\":{\"@id\":\"https:\/\/www.stormshield.com\/it\/#website\"},\"datePublished\":\"2024-02-29T15:53:03+00:00\",\"dateModified\":\"2024-09-16T12:27:34+00:00\",\"description\":\"Endpoint Detection & Response, soluzioni di cybersecurity EDR di nuova generazione per rafforzare la sicurezza degli endpoint.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stormshield.com\/it\/edr\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stormshield.com\/it\/edr\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stormshield.com\/it\/edr\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stormshield.com\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Endpoint Detection &#038; Response &#8211; EDR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stormshield.com\/it\/#website\",\"url\":\"https:\/\/www.stormshield.com\/it\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stormshield.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EDR - Endpoint Detection & Response, protezione per i vostri dispositivi","description":"Endpoint Detection & Response, soluzioni di cybersecurity EDR di nuova generazione per rafforzare la sicurezza degli endpoint.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/it\/edr\/","og_locale":"it_IT","og_type":"article","og_title":"EDR - Endpoint Detection & Response, protezione per i vostri dispositivi","og_description":"Endpoint Detection & Response, soluzioni di cybersecurity EDR di nuova generazione per rafforzare la sicurezza degli endpoint.","og_url":"https:\/\/www.stormshield.com\/it\/edr\/","og_site_name":"Stormshield","article_modified_time":"2024-09-16T12:27:34+00:00","og_image":[{"width":204,"height":94,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/stormshield_logo.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@Stormshield","twitter_misc":{"Tempo di lettura stimato":"6 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/it\/edr\/","url":"https:\/\/www.stormshield.com\/it\/edr\/","name":"EDR - Endpoint Detection & Response, protezione per i vostri dispositivi","isPartOf":{"@id":"https:\/\/www.stormshield.com\/it\/#website"},"datePublished":"2024-02-29T15:53:03+00:00","dateModified":"2024-09-16T12:27:34+00:00","description":"Endpoint Detection & Response, soluzioni di cybersecurity EDR di nuova generazione per rafforzare la sicurezza degli endpoint.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/it\/edr\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/it\/edr\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/it\/edr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/it\/"},{"@type":"ListItem","position":2,"name":"Endpoint Detection &#038; Response &#8211; EDR"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/it\/#website","url":"https:\/\/www.stormshield.com\/it\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/it\/wp-json\/wp\/v2\/pages\/506088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.stormshield.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/it\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/it\/wp-json\/wp\/v2\/comments?post=506088"}],"version-history":[{"count":6,"href":"https:\/\/www.stormshield.com\/it\/wp-json\/wp\/v2\/pages\/506088\/revisions"}],"predecessor-version":[{"id":570999,"href":"https:\/\/www.stormshield.com\/it\/wp-json\/wp\/v2\/pages\/506088\/revisions\/570999"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/it\/wp-json\/wp\/v2\/media?parent=506088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}