{"id":34713,"date":"2023-08-14T10:23:13","date_gmt":"2023-08-14T10:23:13","guid":{"rendered":"https:\/\/waterfall-security.com\/solutions\/by-need\/rispettare-gli-standard-e-le-normative-sulla-sicurezza-ot-industriale\/"},"modified":"2025-08-21T13:49:21","modified_gmt":"2025-08-21T13:49:21","slug":"rispettare-gli-standard-e-le-normative-sulla-sicurezza-ot-industriale","status":"publish","type":"need","link":"https:\/\/waterfall-security.com\/it\/solutions\/by-need\/rispettare-gli-standard-e-le-normative-sulla-sicurezza-ot-industriale\/","title":{"rendered":"Rispettare gli standard e le normative sulla sicurezza OT\/industriale"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"34713\" class=\"elementor elementor-34713 elementor-3039\" data-elementor-post-type=\"need\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17c233be e-flex e-con-boxed e-con e-parent\" data-id=\"17c233be\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5b6f8e20 e-con-full e-flex e-con e-child\" data-id=\"5b6f8e20\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4982d205 e-con-full e-flex e-con e-child\" data-id=\"4982d205\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65683d2a elementor-widget elementor-widget-heading\" data-id=\"65683d2a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Rispettare gli standard e le normative sulla sicurezza OT\/industriale<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bb8ecce elementor-widget elementor-widget-text-editor\" data-id=\"5bb8ecce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Governi, clienti e azionisti richiedono sempre pi\u00f9 il rispetto delle normative, degli standard e delle migliori pratiche. Le sanzioni e le altre conseguenze in caso di inosservanza possono essere significative e i programmi di conformit\u00e0 mal progettati possono rivelarsi molto costosi.<\/p><p>I gateway di sicurezza unidirezionali di Waterfall garantiscono un livello di sicurezza informatica che soddisfa e supera la conformit\u00e0 alle normative e agli standard. La sicurezza di Waterfall \u00e8 cos\u00ec solida che \u00e8 conforme anche alle normative future non ancora entrate in vigore.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-06645a3 e-flex e-con-boxed e-con e-child\" data-id=\"06645a3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-705b036 elementor-widget elementor-widget-button\" data-id=\"705b036\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/contattaci\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Parla con un esperto<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50cfb27b e-con-full e-flex e-con e-child\" data-id=\"50cfb27b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e16aac8 elementor-align-center elementor-widget elementor-widget-lottie\" data-id=\"e16aac8\" data-element_type=\"widget\" data-settings=\"{&quot;source_json&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/waterfall-security.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/File-1-Updated-1.json&quot;,&quot;id&quot;:11274,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;&quot;,&quot;source&quot;:&quot;libreria&quot;},&quot;loop&quot;:&quot;s\\u00ec&quot;,&quot;source&quot;:&quot;media_file&quot;,&quot;caption_source&quot;:&quot;none&quot;,&quot;link_to&quot;:&quot;none&quot;,&quot;trigger&quot;:&quot;arriving_to_viewport&quot;,&quot;viewport&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;play_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;start_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;end_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;renderer&quot;:&quot;svg&quot;}\" data-widget_type=\"lottie.default\">\n\t\t\t\t\t<div class=\"e-lottie__container\"><div class=\"e-lottie__animation\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-18e871f1 e-flex e-con-boxed e-con e-parent\" data-id=\"18e871f1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69b1073b h2_with_svg elementor-widget-mobile__width-iniziale elementor-widget elementor-widget-heading\" data-id=\"69b1073b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Con Waterfall otterrai<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5589f740 elementor-widget elementor-widget-cust-tab-r-men\" data-id=\"5589f740\" data-element_type=\"widget\" data-widget_type=\"cust-tab-r-men.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"custom-tabs-widget right_menu desc_v\">\n            <div class=\"custom-tabs-nav\">\n                                    <div class=\"custom-tabs-nav-item active\">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Compliance-1.png\" alt=\"Conformit\u00e0\">\n                                                <span class=\"tab-title\">Conformit\u00e0<\/span>\n                    <\/div>\n                                    <div class=\"custom-tabs-nav-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Peace-of-mind.png\" alt=\"Agevolazione\">\n                                                <span class=\"tab-title\">Agevolazione<\/span>\n                    <\/div>\n                                    <div class=\"custom-tabs-nav-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Safely-network.png\" alt=\"Sicurezza\">\n                                                <span class=\"tab-title\">Sicurezza<\/span>\n                    <\/div>\n                                    <div class=\"custom-tabs-nav-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Savings-1.png\" alt=\"Risparmio\">\n                                                <span class=\"tab-title\">Risparmio<\/span>\n                    <\/div>\n                                    <div class=\"custom-tabs-nav-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Protection.png\" alt=\"A prova di futuro\">\n                                                <span class=\"tab-title\">A prova di futuro<\/span>\n                    <\/div>\n                            <\/div>\n            <div class=\"custom-tabs-content\">\n                                    <div class=\"custom-tabs-content-item active\">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Compliance-1.png\" alt=\"Conformit\u00e0\">\n                                                <span class=\"tab-title\">Conformit\u00e0<\/span>\n                        <div class=\"tab_content_acs\">\n                            <p><span class=\"TextRun SCXW237962470 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237962470 BCX0\">Gli standard e le normative internazionali pi\u00f9 rigorosi richiedono o raccomandano la protezione del gateway unidirezionale per le reti industriali. I gateway unidirezionali sono pi\u00f9 potenti dei firewall e pertanto sono conformi a tutti gli standard, alle <\/span><span class=\"NormalTextRun SCXW237962470 BCX0\">normative<\/span><span class=\"NormalTextRun SCXW237962470 BCX0\"> e alle best practice sulla sicurezza industriale.<\/span><\/span><span class=\"EOP SCXW237962470 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                        <\/div>\n                    <\/div>\n                                    <div class=\"custom-tabs-content-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Peace-of-mind.png\" alt=\"Agevolazione\">\n                                                <span class=\"tab-title\">Agevolazione<\/span>\n                        <div class=\"tab_content_acs\">\n                            I <p><span class=\"TextRun SCXW213531728 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW213531728 BCX0\">gateway unidirezionali <\/span><span class=\"NormalTextRun SCXW213531728 BCX0\">garantiscono<\/span><span class=\"NormalTextRun SCXW213531728 BCX0\"> una protezione delle reti industriali cos\u00ec elevata che molti standard allentano altri requisiti di protezione per le reti protette in modo unidirezionale. Ad esempio, nelle normative NERC CIP del Nord America, 37 dei 125 <\/span><span class=\"NormalTextRun SCXW213531728 BCX0\">requisiti<\/span><span class=\"NormalTextRun SCXW213531728 BCX0\"> di sicurezza si applicano alle reti protette da firewall, ma non alle reti protette in modo unidirezionale.<\/span><\/span><span class=\"EOP SCXW213531728 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                        <\/div>\n                    <\/div>\n                                    <div class=\"custom-tabs-content-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Safely-network.png\" alt=\"Sicurezza\">\n                                                <span class=\"tab-title\">Sicurezza<\/span>\n                        <div class=\"tab_content_acs\">\n                            <p><span class=\"TextRun SCXW95731830 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW95731830 BCX0\">Gli standard e la conformit\u00e0 si concentrano spesso sulla sicurezza minima, ovvero il minimo che tutti i siti sono <\/span><span class=\"NormalTextRun SCXW95731830 BCX0\">tenuti<\/span><span class=\"NormalTextRun SCXW95731830 BCX0\"> a <\/span><span class=\"NormalTextRun SCXW95731830 BCX0\">rispettare<\/span><span class=\"NormalTextRun SCXW95731830 BCX0\">, indipendentemente da quanto importante o meno sia ciascun sito. S\u00ec, i gateway unidirezionali garantiscono la conformit\u00e0 agli standard e alle best practice e <\/span><span class=\"NormalTextRun SCXW95731830 BCX0\">forniscono<\/span><span class=\"NormalTextRun SCXW95731830 BCX0\"> la massima sicurezza di rete per le reti industriali.<\/span><\/span><span class=\"EOP SCXW95731830 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                        <\/div>\n                    <\/div>\n                                    <div class=\"custom-tabs-content-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Savings-1.png\" alt=\"Risparmio\">\n                                                <span class=\"tab-title\">Risparmio<\/span>\n                        <div class=\"tab_content_acs\">\n                            <p><span class=\"TextRun SCXW109648339 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW109648339 BCX0\">I gateway unidirezionali semplificano la conformit\u00e0. Grazie ai gateway, non ci sono registri del <\/span><span class=\"NormalTextRun SCXW109648339 BCX0\">firewall<\/span><span class=\"NormalTextRun SCXW109648339 BCX0\"> da esaminare e non ci sono intrusioni nella rete che <\/span><span class=\"NormalTextRun SCXW109648339 BCX0\">potrebbero<\/span><span class=\"NormalTextRun SCXW109648339 BCX0\"> penetrare nell'hardware del gateway. I gateway unidirezionali semplificano i programmi di conformit\u00e0 e riducono i costi.<\/span><\/span><span class=\"EOP SCXW109648339 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                        <\/div>\n                    <\/div>\n                                    <div class=\"custom-tabs-content-item \">\n                                                    <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Protection.png\" alt=\"A prova di futuro\">\n                                                <span class=\"tab-title\">A prova di futuro<\/span>\n                        <div class=\"tab_content_acs\">\n                            <p><span class=\"TextRun SCXW143975954 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW143975954 BCX0\">Tutti gli attacchi di sabotaggio informatico sono informazioni: l'unico modo in cui una rete di automazione pu\u00f2 passare da uno stato non compromesso a uno compromesso \u00e8 che le informazioni dell'attacco entrino in qualche modo nella rete. Tuttavia, indipendentemente da come si evolveranno gli attacchi in futuro, nessuna informazione relativa all'attacco potr\u00e0 penetrare nell'hardware del gateway. Gateway unidirezionali con programmi di sicurezza e conformit\u00e0 agli standard a prova di futuro.<\/span><\/span><span class=\"EOP SCXW143975954 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                        <\/div>\n                    <\/div>\n                            <\/div>\n        <\/div>\n        <div class=\"custom-accordion-widget custom-tabs-widget-mob right_menu mob_v\">\n            <div class=\"accordion-container\">\n                <div class=\"accordion-tabs\">\n                    <div class=\"accordion-tabs_wrapper\">\n                                                    <div class=\"accordion-tab\">\n\n                                <h3 class=\"accordion-title\">                                         <span><img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Compliance-1.png\" alt=\"Conformit\u00e0\">\n                                            Conformit\u00e0<\/span> <svg width=\"16\" height=\"10\" viewBox=\"0 0 16 10\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M15.1749 0.950854L8.08744 9.05078L1 0.950854\" stroke=\"white\" \/>\n                                        <\/svg>\n                                <\/h3>\n                                <div class=\"accordion-content\">\n                                    <p><span class=\"TextRun SCXW237962470 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW237962470 BCX0\">Gli standard e le normative internazionali pi\u00f9 rigorosi richiedono o raccomandano la protezione del gateway unidirezionale per le reti industriali. I gateway unidirezionali sono pi\u00f9 potenti dei firewall e pertanto sono conformi a tutti gli standard, alle <\/span><span class=\"NormalTextRun SCXW237962470 BCX0\">normative<\/span><span class=\"NormalTextRun SCXW237962470 BCX0\"> e alle best practice sulla sicurezza industriale.<\/span><\/span><span class=\"EOP SCXW237962470 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                                <\/div>\n                            <\/div>\n                                                    <div class=\"accordion-tab\">\n\n                                <h3 class=\"accordion-title\">                                         <span><img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Peace-of-mind.png\" alt=\"Agevolazione\">\n                                            Agevolazione<\/span> <svg width=\"16\" height=\"10\" viewBox=\"0 0 16 10\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M15.1749 0.950854L8.08744 9.05078L1 0.950854\" stroke=\"white\" \/>\n                                        <\/svg>\n                                <\/h3>\n                                <div class=\"accordion-content\">\n                                    I <p><span class=\"TextRun SCXW213531728 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW213531728 BCX0\">gateway unidirezionali <\/span><span class=\"NormalTextRun SCXW213531728 BCX0\">garantiscono<\/span><span class=\"NormalTextRun SCXW213531728 BCX0\"> una protezione delle reti industriali cos\u00ec elevata che molti standard allentano altri requisiti di protezione per le reti protette in modo unidirezionale. Ad esempio, nelle normative NERC CIP del Nord America, 37 dei 125 <\/span><span class=\"NormalTextRun SCXW213531728 BCX0\">requisiti<\/span><span class=\"NormalTextRun SCXW213531728 BCX0\"> di sicurezza si applicano alle reti protette da firewall, ma non alle reti protette in modo unidirezionale.<\/span><\/span><span class=\"EOP SCXW213531728 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                                <\/div>\n                            <\/div>\n                                                    <div class=\"accordion-tab\">\n\n                                <h3 class=\"accordion-title\">                                         <span><img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Safely-network.png\" alt=\"Sicurezza\">\n                                            Sicurezza<\/span> <svg width=\"16\" height=\"10\" viewBox=\"0 0 16 10\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M15.1749 0.950854L8.08744 9.05078L1 0.950854\" stroke=\"white\" \/>\n                                        <\/svg>\n                                <\/h3>\n                                <div class=\"accordion-content\">\n                                    <p><span class=\"TextRun SCXW95731830 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW95731830 BCX0\">Gli standard e la conformit\u00e0 si concentrano spesso sulla sicurezza minima, ovvero il minimo che tutti i siti sono <\/span><span class=\"NormalTextRun SCXW95731830 BCX0\">tenuti<\/span><span class=\"NormalTextRun SCXW95731830 BCX0\"> a <\/span><span class=\"NormalTextRun SCXW95731830 BCX0\">rispettare<\/span><span class=\"NormalTextRun SCXW95731830 BCX0\">, indipendentemente da quanto importante o meno sia ciascun sito. S\u00ec, i gateway unidirezionali garantiscono la conformit\u00e0 agli standard e alle best practice e <\/span><span class=\"NormalTextRun SCXW95731830 BCX0\">forniscono<\/span><span class=\"NormalTextRun SCXW95731830 BCX0\"> la massima sicurezza di rete per le reti industriali.<\/span><\/span><span class=\"EOP SCXW95731830 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                                <\/div>\n                            <\/div>\n                                                    <div class=\"accordion-tab\">\n\n                                <h3 class=\"accordion-title\">                                         <span><img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Savings-1.png\" alt=\"Risparmio\">\n                                            Risparmio<\/span> <svg width=\"16\" height=\"10\" viewBox=\"0 0 16 10\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M15.1749 0.950854L8.08744 9.05078L1 0.950854\" stroke=\"white\" \/>\n                                        <\/svg>\n                                <\/h3>\n                                <div class=\"accordion-content\">\n                                    <p><span class=\"TextRun SCXW109648339 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW109648339 BCX0\">I gateway unidirezionali semplificano la conformit\u00e0. Grazie ai gateway, non ci sono registri del <\/span><span class=\"NormalTextRun SCXW109648339 BCX0\">firewall<\/span><span class=\"NormalTextRun SCXW109648339 BCX0\"> da esaminare e non ci sono intrusioni nella rete che <\/span><span class=\"NormalTextRun SCXW109648339 BCX0\">potrebbero<\/span><span class=\"NormalTextRun SCXW109648339 BCX0\"> penetrare nell'hardware del gateway. I gateway unidirezionali semplificano i programmi di conformit\u00e0 e riducono i costi.<\/span><\/span><span class=\"EOP SCXW109648339 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                                <\/div>\n                            <\/div>\n                                                    <div class=\"accordion-tab\">\n\n                                <h3 class=\"accordion-title\">                                         <span><img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/08\/Protection.png\" alt=\"A prova di futuro\">\n                                            A prova di futuro<\/span> <svg width=\"16\" height=\"10\" viewBox=\"0 0 16 10\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M15.1749 0.950854L8.08744 9.05078L1 0.950854\" stroke=\"white\" \/>\n                                        <\/svg>\n                                <\/h3>\n                                <div class=\"accordion-content\">\n                                    <p><span class=\"TextRun SCXW143975954 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW143975954 BCX0\">Tutti gli attacchi di sabotaggio informatico sono informazioni: l'unico modo in cui una rete di automazione pu\u00f2 passare da uno stato non compromesso a uno compromesso \u00e8 che le informazioni dell'attacco entrino in qualche modo nella rete. Tuttavia, indipendentemente da come si evolveranno gli attacchi in futuro, nessuna informazione relativa all'attacco potr\u00e0 penetrare nell'hardware del gateway. Gateway unidirezionali con programmi di sicurezza e conformit\u00e0 agli standard a prova di futuro.<\/span><\/span><span class=\"EOP SCXW143975954 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>                                <\/div>\n                            <\/div>\n                                            <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-278ed331 clients_one_line elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"278ed331\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4492b50c\" data-id=\"4492b50c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67fff664 h2_with_svg elementor-widget elementor-widget-heading\" data-id=\"67fff664\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Regolamentazione supportata<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-427ec777 elementor-hidden-tablet elementor-nascosto-mobile elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"427ec777\" data-element_type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;5&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;slides_to_show_mobile&quot;:&quot;2&quot;,&quot;slides_to_scroll_mobile&quot;:&quot;1&quot;,&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 di 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Gartner-logo-1.png\" alt=\"Gartner logo\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 di 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1141.png\" alt=\"IEC standards for OT security for cyber operations\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 di 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1142.png\" alt=\"ANSII - cybersecurity compliance for OT operations\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 di 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1143.png\" alt=\"NERC and NERC CIP for OT security for power generation\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 di 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1145.png\" alt=\"OT Security regulation and compliance with Industry IoT Consortium\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 di 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1144-1.png\" alt=\"Frame 1144\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 di 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Gartner-logo-1.png\" alt=\"Gartner logo\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\"><path d=\"M31.5 15.6361C31.5 7.28737 24.5713 0.499831 16 0.499829C7.42869 0.499828 0.500004 7.28736 0.500003 15.6361C0.500001 23.9849 7.42869 30.7725 16 30.7725C24.5713 30.7725 31.5 23.9849 31.5 15.6361Z\" stroke=\"#251E47\"><\/path><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M10.9238 15.6363L18.0873 21.7619L18.7897 20.9774L12.5437 15.6363L18.7897 10.2952L18.0873 9.51074L10.9238 15.6363Z\" fill=\"#251E47\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\"><path d=\"M0.5 15.6363C0.5 23.9851 7.42869 30.7726 16 30.7726C24.5713 30.7726 31.5 23.9851 31.5 15.6363C31.5 7.28754 24.5713 0.5 16 0.5C7.42869 0.5 0.5 7.28754 0.5 15.6363Z\" stroke=\"#251E47\"><\/path><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M21.0762 15.6362L13.9127 9.51058L13.2103 10.2951L19.4563 15.6362L13.2103 20.9772L13.9127 21.7617L21.0762 15.6362Z\" fill=\"#251E47\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30b89c66 elementor-hidden-desktop elementor-widget elementor-widget-image-carousel\" data-id=\"30b89c66\" data-element_type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;5&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;slides_to_show_mobile&quot;:&quot;2&quot;,&quot;slides_to_scroll_mobile&quot;:&quot;1&quot;,&quot;slides_to_show_tablet&quot;:&quot;5&quot;,&quot;navigation&quot;:&quot;nessuno&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 di 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Gartner-logo-1.png\" alt=\"Gartner logo\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 di 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1141.png\" alt=\"IEC standards for OT security for cyber operations\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 di 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1142.png\" alt=\"ANSII - cybersecurity compliance for OT operations\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 di 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1143.png\" alt=\"NERC and NERC CIP for OT security for power generation\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 di 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1145.png\" alt=\"OT Security regulation and compliance with Industry IoT Consortium\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 di 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Frame-1144-1.png\" alt=\"Frame 1144\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 di 7\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Gartner-logo-1.png\" alt=\"Gartner logo\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-f94fe8a e-flex e-con-boxed e-con e-parent\" data-id=\"f94fe8a\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ed9563d elementor-widget__width-initial h2_with_svg elementor-widget elementor-widget-heading\" data-id=\"5ed9563d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Le soluzioni Waterfall specifiche per il settore<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b1f2a12 custom_tab_widget elementor-widget elementor-widget-custom-carousel-block\" data-id=\"3b1f2a12\" data-element_type=\"widget\" data-widget_type=\"custom-carousel-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"custom-carousel-block\">\n            <div class=\"carousel-navigation\">\n                                    <span class=\"carousel-nav-item\">Elettricit\u00e0<\/span>\n                                    <span class=\"carousel-nav-item\">Petrolio e gas<\/span>\n                                    <span class=\"carousel-nav-item\">Ferrovia<\/span>\n                                    <span class=\"carousel-nav-item\">Impianti<\/span>\n                                    <span class=\"carousel-nav-item\">Acqua<\/span>\n                                    <span class=\"carousel-nav-item\">Produzione<\/span>\n                            <\/div>\n            <div class=\"carousel-slides\">\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/aSub-Industry-Visual.png\" alt=\"slide_1\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">Sicurezza informatica per le centrali elettriche<\/h2>\n                                <div class=\"slide-text\"><p>Le aziende fornitrici di energia elettrica possono stare tranquille sapendo che gli attacchi informatici remoti non possono raggiungere i loro gateway unidirezionali per azionare in modo errato i sistemi di controllo responsabili della sicurezza dei lavoratori e del pubblico, per prevenire danni alle turbine con tempi di consegna lunghi e ad altre apparecchiature o per garantire una produzione continua ed efficiente di energia elettrica.<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"https:\/\/waterfall-security.com\/solutions\/by-industry\/electric-power\/\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Sub-Industry-Visualas.png\" alt=\"slide_2\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">Sicurezza informatica nel settore petrolifero e del gas<\/h2>\n                                <div class=\"slide-text\"><p>I proprietari e gli operatori di piattaforme offshore, oleodotti e raffinerie possono stare tranquilli sapendo che nessun attacco di sabotaggio informatico \u00e8 in grado di penetrare l'hardware del gateway unidirezionale e mettere a rischio la sicurezza dei lavoratori o del pubblico, l'ambiente, le apparecchiature con tempi di consegna lunghi e l'affidabilit\u00e0 della produzione e del funzionamento, senza arresti non pianificati.<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"\/solutions\/by-industry\/oil-gas\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Sub-Industry-Visualf.png\" alt=\"slide_3\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">Sicurezza informatica nel settore ferroviario<\/h2>\n                                <div class=\"slide-text\"><p>Gli operatori dei sistemi ferroviari e metropolitani possono stare tranquilli quando vengono implementati gateway unidirezionali per proteggere reti vitali, tra cui sistemi di commutazione, sistemi di alimentazione elettrica e centri di controllo operativo, da attacchi informatici provenienti da reti IT o Internet, indipendentemente da quanto sofisticati siano ora o potrebbero diventare in futuro.<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"\/solutions\/by-industry\/rail-industry\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Sub-Industry-Visual-1.png\" alt=\"slide_4\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">Sicurezza informatica per gli impianti<\/h2>\n                                <div class=\"slide-text\"><p>I gestori di data center, aeroporti, campus governativi e militari e di altre strutture molto importanti possono dormire sonni tranquilli sapendo che i gateway unidirezionali sono inattaccabili di fronte agli attacchi che attraversano le reti IT esposte a Internet, mettendo a rischio la sicurezza pubblica, le apparecchiature importanti e le operazioni continue e connesse.<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"\/solutions\/by-industry\/facilities\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Sub-Industry-Visual-2.png\" alt=\"slide_5\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">Sicurezza informatica per il trattamento delle acque<\/h2>\n                                <div class=\"slide-text\"><p>Grazie all'implementazione dei gateway unidirezionali, i responsabili comunali possono essere certi del funzionamento continuo e corretto dei loro sistemi di automazione e delle infrastrutture di trattamento delle acque, anche di fronte agli attacchi pi\u00f9 sofisticati provenienti da Internet, sia oggi che in futuro.<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"\/solutions\/by-industry\/water-treatment\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                                    <div class=\"carousel-slide\">\n                        <div class=\"wrap\">\n                            <div class=\"slide-image\">\n                                <img decoding=\"async\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2023\/06\/Sub-Industry-Visual-3.png\" alt=\"slide_6\">\n                            <\/div>\n                            <div class=\"slide-content\">\n                                <h2 class=\"slide-title\">Sicurezza informatica per la produzione<\/h2>\n                                <div class=\"slide-text\"><p>Nessuno vuole comparire sui giornali la prossima settimana spiegando come un'altra dozzina di stabilimenti sia stata colpita da un ransomware o da altri attacchi informatici. N\u00e9 ransomware n\u00e9 gli attacchi pi\u00f9 sofisticati di Internet possono violare i gateway unidirezionali di Waterfall e rappresentare una minaccia per la qualit\u00e0 del prodotto o per le operazioni di produzione continue e corrette.<\/p><\/div>\n                                                                    <a class=\"learn-more-link\" href=\"\/solutions\/by-industry\/manufacturing\">\n                                        Learn more <svg width=\"11\" height=\"8\" viewBox=\"0 0 11 8\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n                                            <path d=\"M10.3536 4.35355C10.5488 4.15829 10.5488 3.84171 10.3536 3.64645L7.17157 0.464466C6.97631 0.269204 6.65973 0.269204 6.46447 0.464466C6.2692 0.659728 6.2692 0.976311 6.46447 1.17157L9.29289 4L6.46447 6.82843C6.2692 7.02369 6.2692 7.34027 6.46447 7.53553C6.65973 7.7308 6.97631 7.7308 7.17157 7.53553L10.3536 4.35355ZM0 4.5H10V3.5H0V4.5Z\" fill=\"#FF9900\" \/>\n                                        <\/svg>\n\n                                    <\/a>\n                                                            <\/div>\n                        <\/div>\n                    <\/div>\n                            <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cc4b39c e-flex e-con-boxed e-con e-parent\" data-id=\"cc4b39c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f1f7fd4 elementor-widget elementor-widget-template\" data-id=\"f1f7fd4\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"5488\" class=\"elementor elementor-5488\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b26e79f cta_block e-flex e-con-boxed e-con e-parent\" data-id=\"b26e79f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;position&quot;:&quot;absolute&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2697fb2 elementor-widget elementor-widget-heading\" data-id=\"2697fb2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">One way for data. <br>\nZero entry for attackers.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac59687 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"ac59687\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/contact-us\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Free consultation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"featured_media":0,"template":"","class_list":["post-34713","need","type-need","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/need\/34713","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/need"}],"about":[{"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/types\/need"}],"version-history":[{"count":1,"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/need\/34713\/revisions"}],"predecessor-version":[{"id":35612,"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/need\/34713\/revisions\/35612"}],"wp:attachment":[{"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/media?parent=34713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}