{"id":34940,"date":"2024-06-23T13:40:55","date_gmt":"2024-06-23T13:40:55","guid":{"rendered":"https:\/\/waterfall-security.com\/technology-and-products\/hera\/"},"modified":"2025-08-21T13:49:35","modified_gmt":"2025-08-21T13:49:35","slug":"hera","status":"publish","type":"technology___product","link":"https:\/\/waterfall-security.com\/it\/technology-and-products\/hera\/","title":{"rendered":"HERA"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"34940\" class=\"elementor elementor-34940 elementor-23465\" data-elementor-post-type=\"technology___product\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33d7d71e hera-banner e-flex e-con-boxed e-con e-parent\" data-id=\"33d7d71e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4d51f6c8 e-con-full hera-banner-area e-flex e-con e-child\" data-id=\"4d51f6c8\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e0e0b49 e-con-full hera-banner-title-section e-flex e-con e-child\" data-id=\"e0e0b49\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c8c2305 hera-banner-main-title elementor-widget elementor-widget-heading\" data-id=\"c8c2305\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Accesso remoto forzato tramite hardware per ambienti OT<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c48177b hera-banner-description elementor-widget elementor-widget-text-editor\" data-id=\"6c48177b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>HERA reinventa l&#8217;accesso remoto sicuro OT con protezioni fisiche integrate per garantire una sicurezza senza pari ai tuoi sistemi critici.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-749361b3 hera-btns-area e-flex e-con-boxed e-con e-child\" data-id=\"749361b3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-537df92a hera-banner-btn-one elementor-widget elementor-widget-button\" data-id=\"537df92a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/contattaci\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Prenota una dimostrazione<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46d20575 e-con-full e-flex e-con e-child\" data-id=\"46d20575\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7fca8863 video__open hera-banner-main-image elementor-widget elementor-widget-image\" data-id=\"7fca8863\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2024\/06\/hera-ot-remote-access-video.png\" title=\"hera ot remote access video\" alt=\"hera ot remote access video\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3cd7b2dd hera-features-section e-flex e-con-boxed e-con e-parent\" data-id=\"3cd7b2dd\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-221c48c3 e-con-full hera-features-container e-flex e-con e-child\" data-id=\"221c48c3\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-18ac5a3d hera-features-box e-con-full e-flex e-con e-child\" data-id=\"18ac5a3d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ebf9ff1 elementor-widget-laptop__width-initial hera-features-img elementor-widget elementor-widget-image\" data-id=\"1ebf9ff1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/icon-2.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a5c9edd elementor-widget-mobile__width-initial hera-features-title elementor-widget elementor-widget-text-editor\" data-id=\"3a5c9edd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3>Integrazione IT\/OT con segmentazione fisica<\/h3><p>Una difesa fisica che protegge gli ambienti OT da tutte le minacce informatiche, consentendo al contempo un accesso remoto gestibile e senza interruzioni.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-16ec087b hera-features-box e-con-full e-flex e-con e-child\" data-id=\"16ec087b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e061188 elementor-widget-laptop__width-initial hera-features-img elementor-widget elementor-widget-image\" data-id=\"e061188\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/icon-4.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bfc27a2 elementor-widget-mobile__width-initial hera-features-title elementor-widget elementor-widget-text-editor\" data-id=\"5bfc27a2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3>Accesso remoto completo<\/h3><p>Sperimenta un accesso remoto completamente sicuro con tutto ci\u00f2 di cui hai bisogno in un&#8217;unica soluzione.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c636ba7 hera-features-box e-con-full e-flex e-con e-child\" data-id=\"4c636ba7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54abd212 elementor-widget-laptop__width-initial hera-features-img elementor-widget elementor-widget-image\" data-id=\"54abd212\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/icon-4.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f315543 elementor-widget-mobile__width-initial hera-features-title elementor-widget elementor-widget-text-editor\" data-id=\"7f315543\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3>Affidabile e sicuro<\/h3><p>Tecnologia unidirezionale collaudata che protegge con successo gli ambienti OT in tutto il mondo dal 2007.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-57c9347 e-con-full hera-hardware-section e-flex e-con e-parent\" data-id=\"57c9347\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-399084d7 h2_with_svg elementor-widget elementor-widget-heading\" data-id=\"399084d7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Accesso remoto forzato tramite hardware in azione<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-592d8b29 hera-hardware-box e-flex e-con-boxed e-con e-child\" data-id=\"592d8b29\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48affbd0 elementor-widget elementor-widget-image\" data-id=\"48affbd0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/HERA-diagram-v2.png\" data-elementor-open-lightbox=\"yes\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MzE4NzAsInVybCI6ZmFsc2V9\">\n\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/HERA-diagram-v2.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c0c9f13 e-con-full hera-security-section e-flex e-con e-parent\" data-id=\"3c0c9f13\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-72574c91 elementor-widget-mobile__width-iniziale hera-security-title elementor-widget elementor-widget-heading\" data-id=\"72574c91\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Difesa integrata, sicurezza senza pari<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2103d0af e-flex e-con-boxed e-con e-child\" data-id=\"2103d0af\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-418fb97c hera-defence-box e-con-full e-flex e-con e-child\" data-id=\"418fb97c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-13ccfe21 elementor-widget-laptop__width-initial hera-defence-img elementor-widget elementor-widget-image\" data-id=\"13ccfe21\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/icon-6@2x.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ef74719 elementor-widget-mobile__width-initial hera-defence-title elementor-widget elementor-widget-text-editor\" data-id=\"1ef74719\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3>Proteggere fisicamente il perimetro OT<\/h3><p>HERA\u00ae protegge i tuoi ambienti OT con due gateway unidirezionali di prima qualit\u00e0, eliminando il rischio di propagazione degli attacchi nella rete OT.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-307fb84e hera-defence-box e-con-full e-flex e-con e-child\" data-id=\"307fb84e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-527f4ee5 elementor-widget-laptop__width-initial hera-defence-img elementor-widget elementor-widget-image\" data-id=\"527f4ee5\" data-element_type=\"widget\" id=\"globe-image\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/icon-7@2x.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-231ec934 elementor-widget-mobile__width-initial hera-defence-title elementor-widget elementor-widget-text-editor\" data-id=\"231ec934\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3>Isolamento del protocollo migliorato<\/h3><p>I canali in entrata e in uscita crittografati fisicamente separati consentono un rigoroso isolamento del protocollo, prevenendo gli attacchi &#8220;Man-in-the-Middle&#8221;. Dal client al server vengono inviati solo gli input del mouse e della tastiera.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-45efdcaa hera-defence-box e-con-full e-flex e-con e-child\" data-id=\"45efdcaa\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-687713f7 elementor-widget-laptop__width-initial hera-defence-img elementor-widget elementor-widget-image\" data-id=\"687713f7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/icon-8@2x.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94e6cfc elementor-widget-mobile__width-initial hera-defence-title elementor-widget elementor-widget-text-editor\" data-id=\"94e6cfc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3>Software specializzato lato client<\/h3><p>La tecnologia Trusted Platform Module (TPM) basata su hardware protegge l&#8217;archiviazione delle chiavi per bloccare gli attacchi di furto delle chiavi e utilizza la crittografia dei messaggi per prevenire gli attacchi lato client. L&#8217;associazione dell&#8217;hardware all&#8217;utente e al sito garantisce la pi\u00f9 forte autenticazione a pi\u00f9 fattori.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1981d93d hera-faq-box e-flex e-con-boxed e-con e-parent\" data-id=\"1981d93d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9f9e7e6 hera-faq-title-area elementor-widget elementor-widget-heading\" data-id=\"9f9e7e6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Accesso remoto sicuro con controllo a granularit\u00e0 fine<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ff36a60 e-con-full hera-secure-box e-flex e-con e-child\" data-id=\"5ff36a60\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6955671e hera-faq-area elementor-widget elementor-widget-n-accordion\" data-id=\"6955671e\" data-element_type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"hera-faq-wrap-one\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"hera-faq-wrap-one\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Registrazione della sessione <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"hera-faq-wrap-one\" class=\"elementor-element elementor-element-2f87357a e-con-full hera-faq-item e-flex e-con e-child\" data-id=\"2f87357a\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"hera-faq-wrap-one\" class=\"elementor-element elementor-element-7be2da2d e-con-full e-flex e-con e-child\" data-id=\"7be2da2d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3fe0df05 elementor-widget elementor-widget-image\" data-id=\"3fe0df05\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/Session-Recording-4.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"hera-faq-wrap-one\" class=\"elementor-element elementor-element-2a564b6e e-con-full secure-faq-content e-flex e-con e-child\" data-id=\"2a564b6e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d519e50 elementor-widget elementor-widget-text-editor\" data-id=\"7d519e50\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Ottieni visibilit\u00e0 e responsabilit\u00e0 complete tramite la registrazione delle sessioni in tempo reale per tutte le attivit\u00e0 di accesso remoto. Ogni interazione dell&#8217;utente all&#8217;interno dell&#8217;ambiente OT viene registrata, creando un registro di controllo dettagliato per la conformit\u00e0, l&#8217;analisi forense e il monitoraggio della sicurezza.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1761\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1761\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Moderazione della sessione <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1761\" class=\"elementor-element elementor-element-13ae4bb6 e-con-full hera-faq-item e-flex e-con e-child\" data-id=\"13ae4bb6\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1761\" class=\"elementor-element elementor-element-152c0947 e-con-full e-flex e-con e-child\" data-id=\"152c0947\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d53df24 elementor-widget elementor-widget-image\" data-id=\"5d53df24\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/Session-Moderation-1.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1761\" class=\"elementor-element elementor-element-2f1a413a e-con-full secure-faq-content e-flex e-con e-child\" data-id=\"2f1a413a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26d3d500 elementor-widget elementor-widget-text-editor\" data-id=\"26d3d500\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Monitora fino a 10 sessioni utente attive simultanee da parte di un amministratore e guardale in tempo reale. Disconnetti gli utenti che si comportano in modo sospetto, prendi il controllo delle sessioni attive o condividi la tua sessione con un altro utente. Consenti ad altri di visualizzare la tua sessione attiva per collaborare o supervisionare.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1762\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1762\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Gestione utenti a granularit\u00e0 fine <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1762\" class=\"elementor-element elementor-element-4594db4a e-con-full hera-faq-item e-flex e-con e-child\" data-id=\"4594db4a\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1762\" class=\"elementor-element elementor-element-7321fdfb e-con-full e-flex e-con e-child\" data-id=\"7321fdfb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-597794bc elementor-widget elementor-widget-image\" data-id=\"597794bc\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/Fine-Grain-User-Management-1.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1762\" class=\"elementor-element elementor-element-5b5d8238 e-con-full secure-faq-content e-flex e-con e-child\" data-id=\"5b5d8238\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b39056 elementor-widget elementor-widget-text-editor\" data-id=\"6b39056\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Gestisci in modo efficiente l&#8217;accesso con un sistema di gestione dei ruoli perfezionato, che consente la creazione di gruppi di utenti e gruppi di risorse. Aggiungi o rimuovi utenti, disconnettili da sessioni o risorse e assegna ruoli quali moderatori, utenti o collaboratori per un controllo semplificato. Sincronizzazione perfetta con Active Directory per una gestione degli utenti semplificata ed efficiente in tutto il sistema.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1763\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1763\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Controlli Zero Trust <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1763\" class=\"elementor-element elementor-element-40bc6cd2 hera-faq-item e-flex e-con-boxed e-con e-child\" data-id=\"40bc6cd2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1763\" class=\"elementor-element elementor-element-328c622 e-con-full e-flex e-con e-child\" data-id=\"328c622\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27816f82 elementor-widget elementor-widget-image\" data-id=\"27816f82\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/Zero-Trust-Controls-1.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1763\" class=\"elementor-element elementor-element-16c2d3ab e-con-full secure-faq-content e-flex e-con e-child\" data-id=\"16c2d3ab\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2994dd99 elementor-widget elementor-widget-text-editor\" data-id=\"2994dd99\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Implementa un accesso zero-trust basato sull&#8217;orario per migliorare la sicurezza verificando ogni richiesta di accesso. Concedi l&#8217;accesso a utenti specifici solo durante orari designati o entro finestre temporali predefinite, assicurando un controllo preciso e riducendo al minimo i potenziali rischi.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1764\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1764\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Registrazione e reporting SIEM <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1764\" class=\"elementor-element elementor-element-152eedd3 hera-faq-item e-flex e-con-boxed e-con e-child\" data-id=\"152eedd3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1764\" class=\"elementor-element elementor-element-68726ef5 e-con-full e-flex e-con e-child\" data-id=\"68726ef5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2647db32 elementor-widget elementor-widget-image\" data-id=\"2647db32\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/Logging-SIEM-Reporting-1.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1764\" class=\"elementor-element elementor-element-5a42129a e-con-full secure-faq-content e-flex e-con e-child\" data-id=\"5a42129a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-562b5208 elementor-widget elementor-widget-text-editor\" data-id=\"562b5208\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Registra e monitora metriche dettagliate ed estese all&#8217;interno di un sistema di monitoraggio dedicato, fornendo una chiara traccia di controllo per ogni attivit\u00e0. I registri possono anche essere esportati senza problemi verso strumenti SIEM per analisi avanzate e gestione degli eventi di sicurezza, garantendo una supervisione completa.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1765\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1765\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Gestione di pi\u00f9 siti <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1765\" class=\"elementor-element elementor-element-4cfb28f7 hera-faq-item e-flex e-con-boxed e-con e-child\" data-id=\"4cfb28f7\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1765\" class=\"elementor-element elementor-element-25d0e04d e-con-full e-flex e-con e-child\" data-id=\"25d0e04d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16c66b90 elementor-widget elementor-widget-image\" data-id=\"16c66b90\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/Multi-Site-Management-1.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1765\" class=\"elementor-element elementor-element-ded2804 e-con-full secure-faq-content e-flex e-con e-child\" data-id=\"ded2804\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-565df065 elementor-widget elementor-widget-text-editor\" data-id=\"565df065\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Gestione semplice di pi\u00f9 siti da un&#8217;unica interfaccia. Supervisione e controllo delle operazioni in diverse sedi senza la necessit\u00e0 di accesso o interfacce separati.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1766\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1766\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Software lato client <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1766\" class=\"elementor-element elementor-element-72bb01d6 hera-faq-item e-flex e-con-boxed e-con e-child\" data-id=\"72bb01d6\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1766\" class=\"elementor-element elementor-element-6f51299a e-con-full e-flex e-con e-child\" data-id=\"6f51299a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a64d8ef elementor-widget elementor-widget-image\" data-id=\"4a64d8ef\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/waterfall-security.com\/wp-content\/uploads\/2025\/03\/Client-Side-Software-1.png\" title=\"\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1766\" class=\"elementor-element elementor-element-56887ecd e-con-full secure-faq-content e-flex e-con e-child\" data-id=\"56887ecd\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e7b508d elementor-widget elementor-widget-text-editor\" data-id=\"4e7b508d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Garantisci connessioni sicure con software lato client, eliminando qualsiasi rischio di attacchi &#8220;Man-in-the-Middle&#8221;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b734400 cta_block e-flex e-con-boxed e-con e-parent\" data-id=\"7b734400\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-426e5054 hera-secure-box e-flex e-con-boxed e-con e-child\" data-id=\"426e5054\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3631d217 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"3631d217\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Accesso remoto sicuro <br> senza i rischi della connettivit\u00e0 di rete.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d17b324 elementor-align-sinistra hera-secure-btn elementor-widget elementor-widget-button\" data-id=\"7d17b324\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/contattaci\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Prenota una consulenza gratuita<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"featured_media":34922,"parent":0,"menu_order":0,"template":"","class_list":["post-34940","technology___product","type-technology___product","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/technology___product\/34940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/technology___product"}],"about":[{"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/types\/technology___product"}],"version-history":[{"count":1,"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/technology___product\/34940\/revisions"}],"predecessor-version":[{"id":35896,"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/technology___product\/34940\/revisions\/35896"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/media\/34922"}],"wp:attachment":[{"href":"https:\/\/waterfall-security.com\/it\/wp-json\/wp\/v2\/media?parent=34940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}