{"id":51,"date":"2024-06-25T16:26:53","date_gmt":"2024-06-25T14:26:53","guid":{"rendered":"https:\/\/dev.ukotek.com\/?page_id=51"},"modified":"2025-02-21T13:25:49","modified_gmt":"2025-02-21T12:25:49","slug":"gestion-de-exposicion-al-riesgo","status":"publish","type":"page","link":"https:\/\/ukotek.com\/it\/soluciones\/gestion-de-exposicion-al-riesgo\/","title":{"rendered":"Gestione dell'esposizione al rischio"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"51\" class=\"elementor elementor-51\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61bc6af e-flex e-con-boxed e-con e-parent\" data-id=\"61bc6af\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f813466 elementor-widget elementor-widget-spacer\" data-id=\"f813466\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b996428 e-flex e-con-boxed e-con e-parent\" data-id=\"b996428\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4c29c47 e-con-full e-flex e-con e-child\" data-id=\"4c29c47\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7417c0c elementor-widget elementor-widget-heading\" data-id=\"7417c0c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Gestione continua dell'esposizione al rischio (CTEM)<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1bc6ca elementor-widget elementor-widget-heading\" data-id=\"f1bc6ca\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Valutare e dare priorit\u00e0 ai rischi reali della vostra azienda con PICUS<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e5dbd02 e-con-full e-flex e-con e-child\" data-id=\"e5dbd02\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f8314c6 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"f8314c6\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"94\" height=\"23\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/10\/Recurso-2.svg\" class=\"attachment-full size-full wp-image-2348\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-06a65c6 e-flex e-con-boxed e-con e-parent\" data-id=\"06a65c6\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e96481a elementor-pagination-position-outside elementor--h-position-center elementor--v-position-middle elementor-widget elementor-widget-slides\" data-id=\"e96481a\" data-element_type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;dots&quot;,&quot;transition&quot;:&quot;fade&quot;,&quot;autoplay_speed&quot;:2000,&quot;transition_speed&quot;:1000,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;}\" data-widget_type=\"slides.default\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-slides-wrapper elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Diapositive\" dir=\"ltr\" data-animation=\"\">\n\t\t\t\t<div class=\"swiper-wrapper elementor-slides\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-repeater-item-4355350 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><h3 class=\"elementor-slide-heading\">Conoscete le vostre esposizioni pi\u00f9 critiche e come mitigarle? <\/h3><\/div><\/div><\/div><div class=\"elementor-repeater-item-de8bff6 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><h3 class=\"elementor-slide-heading\">Quanto velocemente \u00e8 possibile rimediare a un'esposizione a una minaccia o a una vulnerabilit\u00e0? <\/h3><\/div><\/div><\/div><div class=\"elementor-repeater-item-6f7e703 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><h3 class=\"elementor-slide-heading\">Sapete come un aggressore potrebbe sfruttare le falle di sicurezza o le vulnerabilit\u00e0 della vostra azienda?<\/h3><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a420cef e-flex e-con-boxed e-con e-parent\" data-id=\"a420cef\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d65265c e-con-full e-flex e-con e-child\" data-id=\"d65265c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e72d01 elementor-widget elementor-widget-text-editor\" data-id=\"2e72d01\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Picus Security \u00e8 un'innovativa piattaforma di simulazione di attacchi informatici che consente alle organizzazioni di valutare e migliorare continuamente la propria posizione di sicurezza.<\/p><p>Emulando le pi\u00f9 recenti tecniche di attacco avanzate, tra cui ransomware e minacce persistenti avanzate (APT), Picus Security identifica le vulnerabilit\u00e0 e fornisce raccomandazioni specifiche per rafforzare le difese di sicurezza, assicurando che le aziende siano sempre un passo avanti rispetto ai criminali informatici.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8039e5 elementor-widget elementor-widget-premium-addon-button\" data-id=\"f8039e5\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t\t\r\n\r\n\t\t<a class=\"premium-button premium-button-style2 premium-btn-sm premium-button-style2-shutouthor\" href=\"https:\/\/meetings-eu1.hubspot.com\/alejandro-perez-lopez-de-brinas\" target=\"_blank\">\r\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span >\r\n\t\t\t\t\t\tRichiesta di consulenza\t\t\t\t\t<\/span>\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t<\/a>\r\n\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-64a3c22 e-con-full e-flex e-con e-child\" data-id=\"64a3c22\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-47d105f elementor-widget elementor-widget-text-editor\" data-id=\"47d105f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>DATI CHIAVE<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-736e52e premium-type-column elementor-widget elementor-widget-premium-icon-list\" data-id=\"736e52e\" data-element_type=\"widget\" data-settings=\"{&quot;rbadges_repeater&quot;:[]}\" data-widget_type=\"premium-icon-list.default\">\n\t\t\t\t\t\t\t\t<ul class=\"premium-bullet-list-box\">\r\n\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-5629bd8 premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Plataforma para simulaci\u00f3n de brechas y ataques\"> Piattaforma per la simulazione di violazioni e attacchi <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-bc4eed1 premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Validaci\u00f3n de seguridad contin\u00faa impulsada por IA\"> La convalida della sicurezza continua ad essere guidata dall'IA <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-bb67e4a premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Automatizaci\u00f3n para verificar la seguridad a gran escala\"> Automazione per verificare la sicurezza su larga scala <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider premium-bullet-list-divider premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-e549fe4 premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Priorizaci\u00f3n de decisiones\"> Priorit\u00e0 delle decisioni <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider premium-bullet-list-divider premium-bullet-list-divider premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4de08fe e-flex e-con-boxed e-con e-parent\" data-id=\"4de08fe\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cd9aee7 e-con-full e-flex e-con e-child\" data-id=\"cd9aee7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6aa57f2 elementor-widget elementor-widget-text-editor\" data-id=\"6aa57f2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>LA SFIDA<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-31e2610 elementor-widget elementor-widget-text-editor\" data-id=\"31e2610\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Le minacce si evolvono rapidamente e mirano a nuove esposizioni all'interno di ambienti IT in continua evoluzione. Allo stesso tempo, la crescente pressione da parte dei leader aziendali e delle autorit\u00e0 di regolamentazione rende pi\u00f9 importante che mai dimostrare l'efficacia e il valore della sicurezza.<\/p><p>Per ridurre al minimo il rischio informatico, \u00e8 fondamentale identificare e affrontare i problemi di sicurezza il prima possibile.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bad9c41 e-con-full e-flex e-con e-child\" data-id=\"bad9c41\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a5df19f elementor-invisible elementor-widget elementor-widget-image\" data-id=\"a5df19f\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1514\" height=\"850\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Screenshot-2024-06-19-at-14.50.02-1.png\" class=\"attachment-full size-full wp-image-1017\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Screenshot-2024-06-19-at-14.50.02-1.png 1514w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Screenshot-2024-06-19-at-14.50.02-1-300x168.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Screenshot-2024-06-19-at-14.50.02-1-1024x575.png 1024w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Screenshot-2024-06-19-at-14.50.02-1-768x431.png 768w\" sizes=\"(max-width: 1514px) 100vw, 1514px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a213e53 e-flex e-con-boxed e-con e-parent\" data-id=\"a213e53\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a4ca6d9 e-con-full e-flex e-con e-child\" data-id=\"a4ca6d9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b7d024 elementor-widget elementor-widget-text-editor\" data-id=\"4b7d024\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>LA SOLUZIONE<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bf080c elementor-widget elementor-widget-heading\" data-id=\"4bf080c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PICUS per una costante convalida della sicurezza\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e58cf4a e-flex e-con-boxed e-con e-parent\" data-id=\"e58cf4a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d30c962 e-con-full e-flex e-con e-child\" data-id=\"d30c962\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b2b0328 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"b2b0328\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2016\" height=\"2016\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/picus-platform-graphic.png\" class=\"attachment-full size-full wp-image-1018\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/picus-platform-graphic.png 2016w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/picus-platform-graphic-300x300.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/picus-platform-graphic-1024x1024.png 1024w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/picus-platform-graphic-150x150.png 150w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/picus-platform-graphic-768x768.png 768w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/picus-platform-graphic-1536x1536.png 1536w\" sizes=\"(max-width: 2016px) 100vw, 2016px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8661e16 e-con-full e-flex e-con e-child\" data-id=\"8661e16\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea807b2 elementor-widget elementor-widget-text-editor\" data-id=\"ea807b2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>La piattaforma di validazione della sicurezza di Picus Security riduce il rischio informatico misurando accuratamente l'esposizione alle minacce informatiche attraverso simulazioni di attacchi reali.<\/p><p>Identifica i percorsi di attacco ad alto rischio e massimizza l'efficacia delle regole di rilevamento SIEM. Fornisce inoltre una visione consolidata degli asset interni ed esterni, offrendo informazioni cruciali sui rischi di sicurezza e conformit\u00e0.<\/p><p>Fornisce informazioni utili e aiuta a colmare rapidamente le lacune, assicurando che la vostra organizzazione sia sempre un passo avanti rispetto alle minacce.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d3e1ce e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"4d3e1ce\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-50896ae e-con-full e-flex e-con e-child\" data-id=\"50896ae\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f4a7257 elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"f4a7257\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"1236\" height=\"950\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Quantify-Cyber-Risk-2.png\" class=\"attachment-full size-full wp-image-1019\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Quantify-Cyber-Risk-2.png 1236w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Quantify-Cyber-Risk-2-300x231.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Quantify-Cyber-Risk-2-1024x787.png 1024w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Quantify-Cyber-Risk-2-768x590.png 768w\" sizes=\"(max-width: 1236px) 100vw, 1236px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Quantificare il rischio informatico: <\/h3><p class=\"elementor-image-box-description\">Simulate attacchi reali per misurare l'efficacia delle vostre operazioni di sicurezza, valutare la preparazione alle minacce e dimostrare la vostra posizione di sicurezza ai leader aziendali. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6770bca elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"6770bca\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"1332\" height=\"986\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Reduce-Threat-exposure-1.png-1.png\" class=\"attachment-full size-full wp-image-1020\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Reduce-Threat-exposure-1.png-1.png 1332w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Reduce-Threat-exposure-1.png-1-300x222.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Reduce-Threat-exposure-1.png-1-1024x758.png 1024w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Reduce-Threat-exposure-1.png-1-768x569.png 768w\" sizes=\"(max-width: 1332px) 100vw, 1332px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Ridurre l'esposizione alle minacce:<\/h3><p class=\"elementor-image-box-description\">Prendete decisioni prioritarie in materia di sicurezza con approfondimenti di convalida arricchiti dalle informazioni pi\u00f9 recenti su asset, vulnerabilit\u00e0 e minacce informatiche. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cc8443 elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"8cc8443\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"1162\" height=\"1020\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Amplify-Team-Impact-1-1-1-e1725976316245.png\" class=\"attachment-full size-full wp-image-1021\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Amplify-Team-Impact-1-1-1-e1725976316245.png 1162w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Amplify-Team-Impact-1-1-1-e1725976316245-300x263.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Amplify-Team-Impact-1-1-1-e1725976316245-1024x899.png 1024w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Amplify-Team-Impact-1-1-1-e1725976316245-768x674.png 768w\" sizes=\"(max-width: 1162px) 100vw, 1162px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Amplificare l'impatto del team: <\/h3><p class=\"elementor-image-box-description\">Automatizzate le attivit\u00e0 manuali per convalidare la vostra sicurezza su scala. Risolvete le lacune nella copertura delle minacce e le errate configurazioni con mitigazioni attuabili.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-91241f0 e-flex e-con-boxed e-con e-parent\" data-id=\"91241f0\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-78096ce elementor-widget elementor-widget-image\" data-id=\"78096ce\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ukotek.com\/it\/blue-report-2024-picus-security-gestion-de-exposicion-a-amenazas\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"280\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/12\/Picus-BlueReport-2024-preview1-LandingPage-450x280-1.png\" class=\"attachment-large size-large wp-image-2642\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/12\/Picus-BlueReport-2024-preview1-LandingPage-450x280-1.png 450w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/12\/Picus-BlueReport-2024-preview1-LandingPage-450x280-1-300x187.png 300w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fbbf431 e-flex e-con-boxed e-con e-parent\" data-id=\"fbbf431\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b65789f e-con-full e-flex e-con e-child\" data-id=\"b65789f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e10aea9 elementor-widget elementor-widget-heading\" data-id=\"e10aea9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">UKOTEK - distributore principale di PICUS in Spagna<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1528f8 elementor-widget elementor-widget-text-editor\" data-id=\"a1528f8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Con oltre 20 anni di esperienza nel settore della cybersecurity, il team di Ukotek assiste le organizzazioni nell'implementazione di soluzioni avanzate per proteggere i loro asset digitali e garantire la loro continuit\u00e0 operativa.<\/p><p>Siamo specializzati nella fornitura di tecnologie innovative che proteggono le aziende dalle minacce informatiche in continua evoluzione. Il nostro team di esperti fornisce consulenza e assistenza tecnica personalizzata per garantire a ogni cliente una protezione ottimale.<\/p><p>Offriamo soluzioni scalabili adattate alle esigenze di ogni organizzazione.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a95769c e-con-full e-flex e-con e-child\" data-id=\"a95769c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6eb2d7d elementor-widget elementor-widget-heading\" data-id=\"6eb2d7d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Vorrei ricevere maggiori informazioni su Picus<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62fe4da elementor-widget elementor-widget-html\" data-id=\"62fe4da\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js\"><\/script>\r\n<script>\r\n  hbspt.forms.create({\r\n    region: \"eu1\",\r\n    portalId: \"144892228\",\r\n    formId: \"0e402f1b-b623-4bd2-8767-99ec88d0d54e\"\r\n  });\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-67042f5 e-flex e-con-boxed e-con e-parent\" data-id=\"67042f5\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Gesti\u00f3n continua de la exposici\u00f3n al riesgo (CTEM) Eval\u00faa y prioriza los riesgos reales en tu empresa con PICUS \u00bfConoces tus exposiciones m\u00e1s cr\u00edticas y c\u00f3mo mitigarlas? \u00bfCon qu\u00e9 rapidez puedes remediar una exposici\u00f3n a una amenaza o una vulnerabilidad? \u00bfSabes c\u00f3mo podr\u00eda un atacante aprovechar las brechas o vulnerabilidades de seguridad de tu empresa? [&hellip;]<\/p>","protected":false},"author":1,"featured_media":1018,"parent":46,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-51","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Gesti\u00f3n de Exposici\u00f3n al riesgo - Ukotek<\/title>\n<meta name=\"description\" content=\"Con su partner Picus Security Ukotek ofrece soluciones para la gesti\u00f3n continua de la exposici\u00f3n al riesgo (CTEM) , ayudando a las empresas a identificar, evaluar y mitigar riesgos en ciberseguridad.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ukotek.com\/it\/soluciones\/gestion-de-exposicion-al-riesgo\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gesti\u00f3n de Exposici\u00f3n al riesgo - Ukotek\" \/>\n<meta property=\"og:description\" content=\"Con su partner Picus Security Ukotek ofrece soluciones para la gesti\u00f3n continua de la exposici\u00f3n al riesgo (CTEM) , ayudando a las empresas a identificar, evaluar y mitigar riesgos en ciberseguridad.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ukotek.com\/it\/soluciones\/gestion-de-exposicion-al-riesgo\/\" \/>\n<meta property=\"og:site_name\" content=\"Ukotek\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-21T12:25:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/picus-platform-graphic.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2016\" \/>\n\t<meta property=\"og:image:height\" content=\"2016\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ukotek.com\/soluciones\/gestion-de-exposicion-al-riesgo\/\",\"url\":\"https:\/\/ukotek.com\/soluciones\/gestion-de-exposicion-al-riesgo\/\",\"name\":\"Gesti\u00f3n de Exposici\u00f3n al riesgo - Ukotek\",\"isPartOf\":{\"@id\":\"https:\/\/ukotek.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ukotek.com\/soluciones\/gestion-de-exposicion-al-riesgo\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/soluciones\/gestion-de-exposicion-al-riesgo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/picus-platform-graphic.png\",\"datePublished\":\"2024-06-25T14:26:53+00:00\",\"dateModified\":\"2025-02-21T12:25:49+00:00\",\"description\":\"Con su partner Picus Security Ukotek ofrece soluciones para la gesti\u00f3n continua de la exposici\u00f3n al riesgo (CTEM) , ayudando a las empresas a identificar, evaluar y mitigar riesgos en ciberseguridad.\",\"breadcrumb\":{\"@id\":\"https:\/\/ukotek.com\/soluciones\/gestion-de-exposicion-al-riesgo\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ukotek.com\/soluciones\/gestion-de-exposicion-al-riesgo\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/ukotek.com\/soluciones\/gestion-de-exposicion-al-riesgo\/#primaryimage\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/picus-platform-graphic.png\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/picus-platform-graphic.png\",\"width\":2016,\"height\":2016},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ukotek.com\/soluciones\/gestion-de-exposicion-al-riesgo\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/ukotek.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluciones\",\"item\":\"https:\/\/ukotek.com\/soluciones\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Gesti\u00f3n de Exposici\u00f3n al riesgo\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ukotek.com\/#website\",\"url\":\"https:\/\/ukotek.com\/\",\"name\":\"Ukotek\",\"description\":\"Ciber Security\",\"publisher\":{\"@id\":\"https:\/\/ukotek.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ukotek.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ukotek.com\/#organization\",\"name\":\"Ukotek\",\"url\":\"https:\/\/ukotek.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"width\":783,\"height\":224,\"caption\":\"Ukotek\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gesti\u00f3n de Exposici\u00f3n al riesgo - Ukotek","description":"Con su partner Picus Security Ukotek ofrece soluciones para la gesti\u00f3n continua de la exposici\u00f3n al riesgo (CTEM) , ayudando a las empresas a identificar, evaluar y mitigar riesgos en ciberseguridad.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ukotek.com\/it\/soluciones\/gestion-de-exposicion-al-riesgo\/","og_locale":"it_IT","og_type":"article","og_title":"Gesti\u00f3n de Exposici\u00f3n al riesgo - Ukotek","og_description":"Con su partner Picus Security Ukotek ofrece soluciones para la gesti\u00f3n continua de la exposici\u00f3n al riesgo (CTEM) , ayudando a las empresas a identificar, evaluar y mitigar riesgos en ciberseguridad.","og_url":"https:\/\/ukotek.com\/it\/soluciones\/gestion-de-exposicion-al-riesgo\/","og_site_name":"Ukotek","article_modified_time":"2025-02-21T12:25:49+00:00","og_image":[{"width":2016,"height":2016,"url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/picus-platform-graphic.png","type":"image\/png"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ukotek.com\/soluciones\/gestion-de-exposicion-al-riesgo\/","url":"https:\/\/ukotek.com\/soluciones\/gestion-de-exposicion-al-riesgo\/","name":"Gesti\u00f3n de Exposici\u00f3n al riesgo - Ukotek","isPartOf":{"@id":"https:\/\/ukotek.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ukotek.com\/soluciones\/gestion-de-exposicion-al-riesgo\/#primaryimage"},"image":{"@id":"https:\/\/ukotek.com\/soluciones\/gestion-de-exposicion-al-riesgo\/#primaryimage"},"thumbnailUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/picus-platform-graphic.png","datePublished":"2024-06-25T14:26:53+00:00","dateModified":"2025-02-21T12:25:49+00:00","description":"Con su partner Picus Security Ukotek ofrece soluciones para la gesti\u00f3n continua de la exposici\u00f3n al riesgo (CTEM) , ayudando a las empresas a identificar, evaluar y mitigar riesgos en ciberseguridad.","breadcrumb":{"@id":"https:\/\/ukotek.com\/soluciones\/gestion-de-exposicion-al-riesgo\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ukotek.com\/soluciones\/gestion-de-exposicion-al-riesgo\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/ukotek.com\/soluciones\/gestion-de-exposicion-al-riesgo\/#primaryimage","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/picus-platform-graphic.png","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/picus-platform-graphic.png","width":2016,"height":2016},{"@type":"BreadcrumbList","@id":"https:\/\/ukotek.com\/soluciones\/gestion-de-exposicion-al-riesgo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/ukotek.com\/"},{"@type":"ListItem","position":2,"name":"Soluciones","item":"https:\/\/ukotek.com\/soluciones\/"},{"@type":"ListItem","position":3,"name":"Gesti\u00f3n de Exposici\u00f3n al riesgo"}]},{"@type":"WebSite","@id":"https:\/\/ukotek.com\/#website","url":"https:\/\/ukotek.com\/","name":"Ukotek","description":"Ciber Security","publisher":{"@id":"https:\/\/ukotek.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ukotek.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/ukotek.com\/#organization","name":"Ukotek","url":"https:\/\/ukotek.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","width":783,"height":224,"caption":"Ukotek"},"image":{"@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/pages\/51","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/comments?post=51"}],"version-history":[{"count":198,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/pages\/51\/revisions"}],"predecessor-version":[{"id":2913,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/pages\/51\/revisions\/2913"}],"up":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/pages\/46"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/media\/1018"}],"wp:attachment":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/media?parent=51"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}