{"id":34428,"date":"2024-01-16T10:59:25","date_gmt":"2024-01-16T10:59:25","guid":{"rendered":"https:\/\/waterfall-security.com\/solutions\/by-industry\/metalli-e-miniere\/"},"modified":"2025-08-21T13:49:33","modified_gmt":"2025-08-21T13:49:33","slug":"metalli-e-miniere","status":"publish","type":"industry","link":"https:\/\/waterfall-security.com\/it\/solutions\/by-industry\/metalli-e-miniere\/","title":{"rendered":"Metalli e miniere"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"34428\" class=\"elementor elementor-34428 elementor-17849\" data-elementor-post-type=\"industry\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7da0a6f4 e-flex e-con-boxed e-con e-parent\" data-id=\"7da0a6f4\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-29e13fdc e-con-full e-flex e-con e-child\" data-id=\"29e13fdc\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7b70e165 e-con-full e-flex e-con e-child\" data-id=\"7b70e165\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5339aa44 elementor-widget elementor-widget-heading\" data-id=\"5339aa44\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Metalli e miniere<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dbd2369 elementor-widget elementor-widget-text-editor\" data-id=\"1dbd2369\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Miniere, fonderie e altre industrie pesanti presentano sfide di cybersecurity uniche. Il sabotaggio dei computer dei sistemi di controllo critici pu\u00f2 rappresentare una seria minaccia per la sicurezza dei lavoratori in questi siti. Arresti di emergenza e altri guasti alle apparecchiature possono provocare gravi danni fisici e perdite ingenti per queste strutture.<\/p><p>A peggiorare ulteriormente la situazione, il pervasivo ambiente di minacce continua a peggiorare. Molti degli attuali aggressori ransomware mirati sono supportati da stati nazionali e utilizzano le tecniche di attacco pi\u00f9 sofisticate mai viste.<\/p><p>Miniere, fonderie e altre industrie pesanti hanno urgente bisogno di protezioni informatiche economiche ed estremamente solide. Sebbene il rilevamento delle intrusioni, il monitoraggio della sicurezza e la risposta agli incidenti svolgano tutti un ruolo importante in programmi di sicurezza efficaci, non sono sufficienti quando si tratta di prevenire questi attacchi. Prevenire questi attacchi \u00e8 la massima priorit\u00e0 nei luoghi in cui sono in gioco la sicurezza dei lavoratori e ingenti investimenti fisici.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-349b494 e-flex e-con-boxed e-con e-child\" data-id=\"349b494\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57afda9 elementor-widget elementor-widget-button\" data-id=\"57afda9\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/contattaci\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Parla con un esperto<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-312982d3 e-con-full e-flex e-con e-child\" data-id=\"312982d3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-62c4f4a elementor-align-center elementor-widget elementor-widget-lottie\" data-id=\"62c4f4a\" data-element_type=\"widget\" data-settings=\"{&quot;source_json&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/waterfall-security.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Asset-156-1.json&quot;,&quot;id&quot;:17145,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;&quot;,&quot;source&quot;:&quot;libreria&quot;},&quot;loop&quot;:&quot;s\\u00ec&quot;,&quot;source&quot;:&quot;media_file&quot;,&quot;caption_source&quot;:&quot;none&quot;,&quot;link_to&quot;:&quot;none&quot;,&quot;trigger&quot;:&quot;arriving_to_viewport&quot;,&quot;viewport&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;play_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;start_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;end_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;renderer&quot;:&quot;svg&quot;}\" data-widget_type=\"lottie.default\">\n\t\t\t\t\t<div class=\"e-lottie__container\"><div class=\"e-lottie__animation\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-69735773 e-flex e-con-boxed e-con e-child\" data-id=\"69735773\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d3ce1e0 elementor-widget elementor-widget-custom-tab-block-right-image\" data-id=\"3d3ce1e0\" data-element_type=\"widget\" data-widget_type=\"custom-tab-block-right-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"custom-carousel-block-image_right\">\n            <div class=\"carousel-navigation-image_right\">\n                                    <span class=\"carousel-nav-item-image_right\">Attivit\u00e0 di estrazione mineraria<\/span>\n                                    <span class=\"carousel-nav-item-image_right\">Fusione<\/span>\n                                    <span class=\"carousel-nav-item-image_right\">Industrie pesanti<\/span>\n                            <\/div>\n            <div class=\"carousel-slides-image_right\">\n                                    <div class=\"carousel-slide-image_right\">\n                        <div class=\"wrap-image_right\">\n                            <div class=\"slide-content-image_right\">\n                                <h2 class=\"slide-title-image_right\">Attivit\u00e0 di estrazione mineraria<\/h2>\n                                <div class=\"slide-text-image_right\"><p><span class=\"TextRun SCXW29241400 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW29241400 BCX8\">I piani di sicurezza informatica devono garantire attivit\u00e0 di estrazione mineraria sicure e continue, senza impedire l'<\/span><span class=\"NormalTextRun SCXW29241400 BCX8\">accesso ai <\/span><span class=\"NormalTextRun SCXW29241400 BCX8\">flussi di dati essenziali necessari per l'efficienza del sistema e le operazioni aziendali.<\/span><\/span><span class=\"EOP SCXW29241400 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p><\/div>\n                            <\/div>\n                            <div class=\"slide-image-image_right\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2024\/01\/untitled-design-2024-01-16t130503_optimized.504.png\" alt=\"slide_1\">\n                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide-image_right\">\n                        <div class=\"wrap-image_right\">\n                            <div class=\"slide-content-image_right\">\n                                <h2 class=\"slide-title-image_right\">Fusione<\/h2>\n                                <div class=\"slide-text-image_right\"><p><span class=\"TextRun SCXW56857755 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW56857755 BCX8\">I programmi di sicurezza informatica di livello ingegneristico devono impedire in modo deterministico ed estremamente affidabile la manomissione in ogni fase dell'intero processo di fusione, senza ostacolare l'<\/span><span class=\"NormalTextRun SCXW56857755 BCX8\">accesso e<\/span><span class=\"NormalTextRun SCXW56857755 BCX8\"> la visibilit\u00e0 di questi sistemi, per garantire che funzionino in modo sicuro ed efficiente.<\/span><\/span><span class=\"EOP SCXW56857755 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p><\/div>\n                            <\/div>\n                            <div class=\"slide-image-image_right\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2024\/01\/1_optimized.png\" alt=\"slide_2\">\n                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide-image_right\">\n                        <div class=\"wrap-image_right\">\n                            <div class=\"slide-content-image_right\">\n                                <h2 class=\"slide-title-image_right\">Industrie pesanti<\/h2>\n                                <div class=\"slide-text-image_right\"><p><span data-contrast=\"auto\">Gli attacchi informatici che compromettono qualsiasi parte del processo industriale rappresentano un rischio per la sicurezza operativa e dei lavoratori e possono avere gravi ripercussioni sulla produzione e sull'output.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p><p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Le tecnologie unidirezionali vengono utilizzate per proteggere la connettivit\u00e0 OT industriale e l'accesso remoto nei sistemi OT, senza introdurre i percorsi di attacco informatico che accompagnano sempre i firewall IT\/OT.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p><\/div>\n                            <\/div>\n                            <div class=\"slide-image-image_right\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2024\/01\/2_optimized-1-1.png\" alt=\"slide_3\">\n                            <\/div>\n                        <\/div>\n                    <\/div>\n                            <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-422626f3 e-con-full e-flex e-con e-parent\" data-id=\"422626f3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-37a1580b elementor-widget-mobile__width-iniziale h2_with_svg elementor-widget elementor-widget-heading\" data-id=\"37a1580b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Con Waterfall otterrai<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c93eefa e-flex e-con-boxed e-con e-child\" data-id=\"5c93eefa\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4452313 e-flex e-con-boxed e-con e-child\" data-id=\"4452313\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8ad16df waterfall_get_block e-flex e-con-boxed e-con e-child\" data-id=\"8ad16df\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48ab490 elementor-widget elementor-widget-image\" data-id=\"48ab490\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Integration.png\" title=\"Integration\" alt=\"Integration\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cbc48a1 elementor-widget elementor-widget-heading\" data-id=\"cbc48a1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Integrazione IT\/OT sicura<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99fac83 elementor-widget elementor-widget-text-editor\" data-id=\"99fac83\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>I gateway di sicurezza unidirezionali forniscono alle attivit\u00e0 di estrazione mineraria e di lavorazione dei metalli l&#8217;accesso ai dati industriali OT, come l&#8217;utilizzo delle apparecchiature per la manutenzione predittiva e l&#8217;ordinazione automatica dei pezzi di ricambio, ma senza fornire ad aggressori o malware alcun accesso ai sistemi industriali.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-08f430b waterfall_get_block e-flex e-con-boxed e-con e-child\" data-id=\"08f430b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a100666 elementor-widget elementor-widget-image\" data-id=\"a100666\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Monitoring-3.png\" title=\"Monitoring\" alt=\"Monitoring\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2b6c2f elementor-widget elementor-widget-heading\" data-id=\"d2b6c2f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Monitoraggio continuo<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8542cde elementor-widget elementor-widget-text-editor\" data-id=\"8542cde\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>I gateway unidirezionali forniscono ai centri operativi di sicurezza (SOC) aziendali e esternalizzati un accesso sicuro ai dati di rete vitali, in modo che le attivit\u00e0 di estrazione e fusione possano sfruttare competenze specializzate ed economie di scala.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-de2c1d1 waterfall_get_block e-flex e-con-boxed e-con e-child\" data-id=\"de2c1d1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4328083 elementor-widget elementor-widget-image\" data-id=\"4328083\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Safety.png\" title=\"Safety\" alt=\"Safety\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3767a5 elementor-widget elementor-widget-heading\" data-id=\"b3767a5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Accesso remoto sicuro <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5e78a6 elementor-widget elementor-widget-text-editor\" data-id=\"c5e78a6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW208099249 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW208099249 BCX8\">HERA\u00ae, Hardware-Enforced Remote Access di Waterfall, offre le funzionalit\u00e0 dell&#8217;accesso remoto senza i rischi e le minacce inerenti alla connettivit\u00e0 di rete.<\/span><\/span><span class=\"EOP SCXW208099249 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2cf8fbdf e-flex e-con-boxed e-con e-parent\" data-id=\"2cf8fbdf\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f433a8d h2_with_svg elementor-widget elementor-widget-heading\" data-id=\"2f433a8d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Casi d'uso<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-792a7292 e-flex e-con-boxed e-con e-child\" data-id=\"792a7292\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5956899 e-flex e-con-boxed e-con e-child\" data-id=\"5956899\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c47673d e-con-full e-flex e-con e-child\" data-id=\"c47673d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3238559 elementor-widget elementor-widget-heading\" data-id=\"3238559\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Attivit\u00e0 di estrazione mineraria<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42fc456 elementor-widget elementor-widget-text-editor\" data-id=\"42fc456\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>I gateway unidirezionali vengono utilizzati per la replicazione sicura dei dati dalla rete OT delle attivit\u00e0 di estrazione mineraria alla rete IT e al cloud. Ci\u00f2 consente agli addetti all&#8217;estrazione mineraria di monitorare in modo sicuro e in tempo reale le schermate di rete critiche e di accedere alle reti critiche in modo controllato, se \u00e8 necessario apportare modifiche.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-80cc975 e-con-full e-flex e-con e-child\" data-id=\"80cc975\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e9fa12 elementor-widget elementor-widget-heading\" data-id=\"4e9fa12\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Fusione dell'acciaio<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b863d0e elementor-widget elementor-widget-text-editor\" data-id=\"b863d0e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>I gateway unidirezionali Waterfall forniscono una protezione inattaccabile di livello ingegneristico alle operazioni di fusione dell&#8217;acciaio per connettere in modo sicuro le reti OT industriali alla rete IT, consentendo loro di inviare dati in modo sicuro a fornitori terzi, compresi quelli basati sul cloud.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-af2606b e-con-full e-flex e-con e-child\" data-id=\"af2606b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8df6253 elementor-widget elementor-widget-heading\" data-id=\"8df6253\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Accesso remoto <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c09671c elementor-widget elementor-widget-text-editor\" data-id=\"c09671c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW171169290 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW171169290 BCX8\">Hardware Enforced Remote Access (HERA\u00ae) consente la gestione remota, gli aggiornamenti e la risoluzione dei problemi per le reti OT, in tutta sicurezza. Quando l&#8217;accesso remoto sicuro basato su software rappresenta un rischio troppo elevato, l&#8217;hardware HERA\u00ae fornisce funzionalit\u00e0 remote senza i rischi della connettivit\u00e0 remota.<\/span><\/span><span class=\"EOP SCXW171169290 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c41bc5d e-con-full e-flex e-con e-parent\" data-id=\"3c41bc5d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d57c611 h2_with_svg elementor-widget elementor-widget-heading\" data-id=\"4d57c611\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Come funziona<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-70c8dc94 e-flex e-con-boxed e-con e-child\" data-id=\"70c8dc94\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1a4ffce3 e-flex e-con-boxed e-con e-child\" data-id=\"1a4ffce3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12a578e3 elementor-widget elementor-widget-image\" data-id=\"12a578e3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Group-1117.png\" title=\"Group 1117\" alt=\"Group 1117\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f94745f e-flex e-con-boxed e-con e-child\" data-id=\"1f94745f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ebcb0e1 elementor-widget elementor-widget-heading\" data-id=\"ebcb0e1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Connetti<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3341d3 elementor-widget__width-iniziale elementor-widget elementor-widget-text-editor\" data-id=\"e3341d3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Una rete industriale in sicurezza verso una rete IT<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e390978 e-flex e-con-boxed e-con e-child\" data-id=\"1e390978\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68689e04 elementor-widget elementor-widget-image\" data-id=\"68689e04\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Group-1117-1.png\" title=\"Group 1117-1\" alt=\"Group 1117-1\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-44a3b370 e-flex e-con-boxed e-con e-child\" data-id=\"44a3b370\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e3a608 elementor-widget elementor-widget-heading\" data-id=\"1e3a608\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Proteggi<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-959b926 elementor-widget__width-iniziale elementor-widget elementor-widget-text-editor\" data-id=\"959b926\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>La rete industriale con tecnologia hardware applicata<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-747a1aed e-flex e-con-boxed e-con e-child\" data-id=\"747a1aed\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45bd46c5 elementor-widget elementor-widget-image\" data-id=\"45bd46c5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Group-1117-2.png\" title=\"Group 1117-2\" alt=\"Group 1117-2\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-846ca64 e-flex e-con-boxed e-con e-child\" data-id=\"846ca64\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39dc4d94 elementor-widget elementor-widget-heading\" data-id=\"39dc4d94\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Replica<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2c7263 elementor-widget__width-iniziale elementor-widget elementor-widget-text-editor\" data-id=\"d2c7263\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Server operativi in tempo reale per la rete IT aziendale<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-17be8ca5 e-flex e-con-boxed e-con e-child\" data-id=\"17be8ca5\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d362276 elementor-widget elementor-widget-image\" data-id=\"4d362276\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"diagrams for webpage wf all products wf500\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MzQ5NjYsInVybCI6Imh0dHBzOlwvXC93YXRlcmZhbGwtc2VjdXJpdHkuY29tXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIzXC8wOFwvZGlhZ3JhbXMtZm9yLXdlYnBhZ2Utd2YtYWxsLXByb2R1Y3RzLXdmNTAwLnBuZyJ9\">\n\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/diagrams-for-webpage-wf-all-products-wf500.png\" title=\"diagrams for webpage wf all products wf500\" alt=\"diagrams for webpage wf all products wf500\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2cf1f6ce e-flex e-con-boxed e-con e-parent\" data-id=\"2cf1f6ce\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ca763d2 elementor-widget-mobile__width-iniziale h2_with_svg elementor-widget elementor-widget-heading\" data-id=\"3ca763d2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Risorse correlate<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-875f283 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"875f283\" data-element_type=\"widget\" data-settings=\"{&quot;template_id&quot;:18975,&quot;_skin&quot;:&quot;post&quot;,&quot;columns&quot;:&quot;3&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-loop-nothing-found-message\">\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1cad9c8e elementor-align-centro elementor-widget elementor-widget-button\" data-id=\"1cad9c8e\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/ot-centro-approfondimenti\/estrazione-metalli\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Vedi altro<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32adc771 elementor-widget elementor-widget-template\" data-id=\"32adc771\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"738\" class=\"elementor elementor-738\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f365520 cta_block e-flex e-con-boxed e-con e-parent\" data-id=\"3f365520\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46f2ba25 elementor-widget elementor-widget-heading\" data-id=\"46f2ba25\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Consult with a unidirectional<br> solutions architect<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-560f6104 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"560f6104\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/contact-us\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Free consultation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"featured_media":0,"template":"","class_list":["post-34428","industry","type-industry","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/industry\/34428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/industry"}],"about":[{"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/types\/industry"}],"version-history":[{"count":1,"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/industry\/34428\/revisions"}],"predecessor-version":[{"id":35895,"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/industry\/34428\/revisions\/35895"}],"wp:attachment":[{"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/media?parent=34428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}