{"id":57,"date":"2024-06-25T16:27:57","date_gmt":"2024-06-25T14:27:57","guid":{"rendered":"https:\/\/dev.ukotek.com\/?page_id=57"},"modified":"2024-11-18T07:46:25","modified_gmt":"2024-11-18T06:46:25","slug":"proteccion-del-entorno-de-trabajo","status":"publish","type":"page","link":"https:\/\/ukotek.com\/it\/soluciones\/proteccion-del-entorno-de-trabajo\/","title":{"rendered":"Protezione dell'ambiente di lavoro"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"57\" class=\"elementor elementor-57\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b1b009e e-flex e-con-boxed e-con e-parent\" data-id=\"b1b009e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b28449 elementor-widget elementor-widget-spacer\" data-id=\"8b28449\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-72841ab e-flex e-con-boxed e-con e-parent\" data-id=\"72841ab\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-16f1c2b e-con-full e-flex e-con e-child\" data-id=\"16f1c2b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57325e8 elementor-widget elementor-widget-heading\" data-id=\"57325e8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Protezione proattiva dell'ambiente di lavoro<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09686b4 elementor-widget elementor-widget-heading\" data-id=\"09686b4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Protezione avanzata dalle minacce con PERCEPTION POINT<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9b9db5a e-con-full e-flex e-con e-child\" data-id=\"9b9db5a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2015876 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"2015876\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"134\" height=\"48\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/10\/Recurso-3.svg\" class=\"attachment-full size-full wp-image-2332\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9520869 e-flex e-con-boxed e-con e-parent\" data-id=\"9520869\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc3ee1c elementor-pagination-position-outside elementor--h-position-center elementor--v-position-middle elementor-widget elementor-widget-slides\" data-id=\"fc3ee1c\" data-element_type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;dots&quot;,&quot;transition&quot;:&quot;fade&quot;,&quot;autoplay_speed&quot;:2000,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;transition_speed&quot;:500}\" data-widget_type=\"slides.default\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-slides-wrapper elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Slides\" dir=\"ltr\" data-animation=\"\" data-no-translation-aria-label=\"\">\n\t\t\t\t<div class=\"swiper-wrapper elementor-slides\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-repeater-item-4355350 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><h3 class=\"elementor-slide-heading\">Siete pronti a neutralizzare le minacce di phishing avanzate?<\/h3><\/div><\/div><\/div><div class=\"elementor-repeater-item-de8bff6 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><h3 class=\"elementor-slide-heading\">Siete pronti a rilevare le minacce informatiche in tempo reale?<\/h3><\/div><\/div><\/div><div class=\"elementor-repeater-item-6f7e703 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><h3 class=\"elementor-slide-heading\">Siete pronti a eliminare le minacce nelle applicazioni collaborative?<\/h3><\/div><\/div><\/div><div class=\"elementor-repeater-item-81bf0bd swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\" role=\"img\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><h3 class=\"elementor-slide-heading\">Protezione dagli attacchi di evasione e offuscamento?<\/h3><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d3d6e5b e-flex e-con-boxed e-con e-parent\" data-id=\"d3d6e5b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ad5b8b3 e-con-full e-flex e-con e-child\" data-id=\"ad5b8b3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9adb53c elementor-widget elementor-widget-text-editor\" data-id=\"9adb53c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Perception Point combina una piattaforma avanzata di prevenzione delle minacce basata sull'intelligenza artificiale con un servizio di risposta agli incidenti gestito per proteggere lo spazio di lavoro.<\/p><p>Fondendo la tecnologia GenAI e le conoscenze umane, Perception Point protegge i canali pi\u00f9 importanti dell'azienda da qualsiasi minaccia.<\/p><p>Riconosciuto come leader di mercato nel rilevamento con un tasso del 99,5%, Perception Point protegge le organizzazioni da phishing, malware e altre minacce informatiche, garantendo una comunicazione sicura e ininterrotta.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46ac13d elementor-widget elementor-widget-premium-addon-button\" data-id=\"46ac13d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t\t\r\n\r\n\t\t<a class=\"premium-button premium-button-style2 premium-btn-sm premium-button-style2-shutouthor\" href=\"https:\/\/meetings-eu1.hubspot.com\/alejandro-perez-lopez-de-brinas\" target=\"_blank\">\r\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span >\r\n\t\t\t\t\t\tRichiesta di consulenza\t\t\t\t\t<\/span>\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t<\/a>\r\n\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-95b69da e-con-full e-flex e-con e-child\" data-id=\"95b69da\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6200616 elementor-widget elementor-widget-text-editor\" data-id=\"6200616\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>DATI CHIAVE<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da07d1f premium-type-column elementor-widget elementor-widget-premium-icon-list\" data-id=\"da07d1f\" data-element_type=\"widget\" data-settings=\"{&quot;rbadges_repeater&quot;:[]}\" data-widget_type=\"premium-icon-list.default\">\n\t\t\t\t\t\t\t\t<ul class=\"premium-bullet-list-box\">\r\n\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-5629bd8 premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Prevenci\u00f3n de amenazas basada en IA contra amenazas conocidas, desconocidas y evasivas\"> Prevenzione delle minacce basata sull'intelligenza artificiale contro le minacce conosciute, sconosciute ed evasive. <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-bc4eed1 premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Protege el workspace moderno: correo electr\u00f3nico, navegadores y aplicaciones en la nube\"> Protezione dello spazio di lavoro moderno: e-mail, browser e applicazioni cloud <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t<li class=\"premium-bullet-list-content elementor-repeater-item-bb67e4a premium-bullet-list-content-grow-effect\">\r\n\t\t\t\t<div class=\"premium-bullet-list-text\">\r\n\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-wrapper\">\r\n\t\t\t\t\t<div class=\"premium-drawable-icon\"><svg class=\"premium-svg-nodraw e-font-icon-svg e-fas-dot-circle\" aria-hidden=\"true\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z\"><\/path><\/svg><\/div>\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t\t<span   data-text=\"Respuesta a incidentes 24x7\"> Risposta agli incidenti 24x7 <\/span>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t\t<div class=\"premium-bullet-list-divider premium-bullet-list-divider premium-bullet-list-divider\"><\/div>\r\n\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-86172ad e-flex e-con-boxed e-con e-parent\" data-id=\"86172ad\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1c3212c e-con-full e-flex e-con e-child\" data-id=\"1c3212c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-113b2f1 elementor-widget elementor-widget-text-editor\" data-id=\"113b2f1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>LA SFIDA<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a3d830 elementor-widget elementor-widget-text-editor\" data-id=\"8a3d830\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Gli aggressori stanno utilizzando nuove vie, come le applicazioni di collaborazione e i browser aziendali, per causare danni. Mentre la posta elettronica rimane il principale vettore di minaccia, il 28% degli attacchi proviene da strumenti di collaborazione in cloud. Inoltre, la digitalizzazione e i modelli di lavoro ibridi hanno reso il browser un obiettivo chiave per gli attacchi che eludono le soluzioni di sicurezza tradizionali, causando ransomware, perdite finanziarie e violazioni dei dati.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-673a9df e-con-full e-flex e-con e-child\" data-id=\"673a9df\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c8479f elementor-invisible elementor-widget elementor-widget-image\" data-id=\"9c8479f\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1556\" height=\"932\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/UKOTEK_Perception-Point-1.png\" class=\"attachment-full size-full wp-image-1352\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/UKOTEK_Perception-Point-1.png 1556w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/UKOTEK_Perception-Point-1-300x180.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/UKOTEK_Perception-Point-1-1024x613.png 1024w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/UKOTEK_Perception-Point-1-768x460.png 768w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/UKOTEK_Perception-Point-1-1536x920.png 1536w\" sizes=\"(max-width: 1556px) 100vw, 1556px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0e08c5d e-flex e-con-boxed e-con e-parent\" data-id=\"0e08c5d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c3476c9 e-con-full e-flex e-con e-child\" data-id=\"c3476c9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-304e65f elementor-widget elementor-widget-text-editor\" data-id=\"304e65f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>LA SOLUZIONE<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f0ce11 elementor-widget elementor-widget-heading\" data-id=\"7f0ce11\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PUNTO DI PERCEZIONE: Proteggere di pi\u00f9, gestire di meno.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4b84017 e-flex e-con-boxed e-con e-parent\" data-id=\"4b84017\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-36ce8de e-con-full e-flex e-con e-child\" data-id=\"36ce8de\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-90e29bd elementor-invisible elementor-widget elementor-widget-image\" data-id=\"90e29bd\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1251\" height=\"543\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Screenshot-2024-07-29-at-12.04.36-1.png\" class=\"attachment-full size-full wp-image-1353\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Screenshot-2024-07-29-at-12.04.36-1.png 1251w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Screenshot-2024-07-29-at-12.04.36-1-300x130.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Screenshot-2024-07-29-at-12.04.36-1-1024x444.png 1024w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Screenshot-2024-07-29-at-12.04.36-1-768x333.png 768w\" sizes=\"(max-width: 1251px) 100vw, 1251px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ef34ea e-con-full e-flex e-con e-child\" data-id=\"7ef34ea\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55c86c3 elementor-widget elementor-widget-text-editor\" data-id=\"55c86c3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Perception Point affronta queste sfide con la sua prevenzione delle minacce basata sull'intelligenza artificiale per proteggere il moderno spazio di lavoro: e-mail, browser e applicazioni SaaS.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e82c4e e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"3e82c4e\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-64e5d16 e-con-full elementor-hidden-mobile e-flex e-con e-child\" data-id=\"64e5d16\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c88033 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"9c88033\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1249\" height=\"2810\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Malware-_x2013_-threat-page-.png\" class=\"attachment-full size-full wp-image-1678\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Malware-_x2013_-threat-page-.png 1249w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Malware-_x2013_-threat-page--133x300.png 133w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Malware-_x2013_-threat-page--455x1024.png 455w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Malware-_x2013_-threat-page--768x1728.png 768w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Malware-_x2013_-threat-page--683x1536.png 683w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/Malware-_x2013_-threat-page--910x2048.png 910w\" sizes=\"(max-width: 1249px) 100vw, 1249px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b18682e e-con-full e-flex e-con e-child\" data-id=\"b18682e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce11f68 elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"ce11f68\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Antispam (solo per le e-mail): <\/h3><p class=\"elementor-image-box-description\">Il filtro antispam brevettato segnala e filtra rapidamente lo spam e la posta indesiderata. Il livello Anti-Spam include controlli per i protocolli di autenticazione del mittente come DMARC, DKIM e SPF, oltre a ulteriori capacit\u00e0 interne di apprendimento automatico.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-229fc6b elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"229fc6b\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Informazioni sulle minacce: <\/h3><p class=\"elementor-image-box-description\">Combina diverse fonti di informazioni sulle minacce con un motore unico, sviluppato internamente, che cerca URL e file dannosi.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f85194 elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"4f85194\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Firme statiche: <\/h3><p class=\"elementor-image-box-description\">I migliori motori AV basati sulle firme, combinati con algoritmi proprietari, identificano firme altamente complesse, malware evasivo, ransomware e altro ancora.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae62092 elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"ae62092\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Piattaforma assistita da hardware (HAP\u2122): <\/h3><p class=\"elementor-image-box-description\">La tecnologia brevettata a livello di CPU agisce prima nella kill chain delle minacce rispetto a qualsiasi altra soluzione. Scansione dinamica e blocco deterministico degli attacchi in tempo quasi reale (entro pochi secondi) nella fase di sfruttamento prima del lancio\/esecuzione del malware.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d8d4d4 elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"8d8d4d4\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Disimballatore ricorsivo: <\/h3><p class=\"elementor-image-box-description\">Il motore anti-evasione avanzato decomprime i contenuti in unit\u00e0 pi\u00f9 piccole (file e URL) per annullare le tecniche di evasione e identificare i payload nascosti che eludono facilmente i sistemi di rilevamento tradizionali. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-250677a elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"250677a\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Anti-Phishing: <\/h3><p class=\"elementor-image-box-description\">Il miglioramento della reputazione degli URL e i motori di analisi del testo basati sull'intelligenza artificiale, insieme alla tecnologia interna di riconoscimento delle immagini di Perception Point, identificano le tecniche di phishing e tutti i tipi di attacchi avanzati di phishing.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb49c9e elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"cb49c9e\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">BEC E ATO: <\/h3><p class=\"elementor-image-box-description\">Previene le minacce di payload e phishing, come le frodi CEO, gli attacchi VEC e quelli alla catena di fornitura che non includono necessariamente contenuti dannosi. Intercetta i tentativi di acquisizione di account utilizzando l'intelligenza artificiale e l'analisi contestuale e comportamentale.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d80c896 e-flex e-con-boxed e-con e-parent\" data-id=\"d80c896\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-00c084f elementor-invisible elementor-widget elementor-widget-image\" data-id=\"00c084f\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1447\" height=\"545\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/threats-evolved-img-1.png\" class=\"attachment-full size-full wp-image-1682\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/threats-evolved-img-1.png 1447w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/threats-evolved-img-1-300x113.png 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/threats-evolved-img-1-1024x386.png 1024w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/threats-evolved-img-1-768x289.png 768w\" sizes=\"(max-width: 1447px) 100vw, 1447px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9d53d5d e-flex e-con-boxed e-con e-parent\" data-id=\"9d53d5d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b54a350 e-con-full e-flex e-con e-child\" data-id=\"b54a350\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fe4f27a elementor-widget elementor-widget-heading\" data-id=\"fe4f27a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">UKOTEK - Partner certificato PERCEPTION POINT in Spagna<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-deae6b2 elementor-widget elementor-widget-text-editor\" data-id=\"deae6b2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Con oltre 20 anni di esperienza nel settore della cybersecurity, il team di Ukotek assiste le organizzazioni nell'implementazione di soluzioni avanzate per proteggere i loro asset digitali e garantire la loro continuit\u00e0 operativa.<\/p><p>Siamo specializzati nella fornitura di tecnologie innovative che proteggono le aziende dalle minacce informatiche in continua evoluzione. Il nostro team di esperti fornisce consulenza e assistenza tecnica personalizzata per garantire a ogni cliente una protezione ottimale.<\/p><p>Offriamo soluzioni scalabili adattate alle esigenze di ogni organizzazione.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c752ef e-con-full e-flex e-con e-child\" data-id=\"5c752ef\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-232be54 elementor-widget elementor-widget-heading\" data-id=\"232be54\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Vorrei ricevere maggiori informazioni su Perception Point<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-638d5c3 elementor-widget elementor-widget-html\" data-id=\"638d5c3\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js\"><\/script>\r\n<script>\r\n  hbspt.forms.create({\r\n    region: \"eu1\",\r\n    portalId: \"144892228\",\r\n    formId: \"75af3df5-2ae8-4109-8326-4f8e45bd339a\"\r\n  });\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Protecci\u00f3n proactiva del entorno de trabajo Protecci\u00f3n avanzada contra amenazas con PERCEPTION POINT \u00bfListo para neutralizar amenazas avanzadas de phishing? \u00bfPreparado para detectar malware en tiempo real? \u00bfListo para eliminar amenazas en aplicaciones de colaboraci\u00f3n? \u00bfProtegido contra ataques de evasi\u00f3n y ofuscaci\u00f3n? Perception Point combina una plataforma avanzada de prevenci\u00f3n de amenazas impulsada por IA [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":46,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-57","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protecci\u00f3n del Entorno de trabajo - Ukotek<\/title>\n<meta name=\"description\" content=\"Junto con su partner Perception Point, Ukotek ofrece una plataforma avanzada de prevenci\u00f3n de amenazas impulsada por IA, con un servicio gestionado de respuesta a incidentes 24\/7 para proteger el workspace moderno: correo electr\u00f3nico, navegadores y aplicaciones en la nube.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ukotek.com\/it\/soluciones\/proteccion-del-entorno-de-trabajo\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecci\u00f3n del Entorno de trabajo - Ukotek\" \/>\n<meta property=\"og:description\" content=\"Junto con su partner Perception Point, Ukotek ofrece una plataforma avanzada de prevenci\u00f3n de amenazas impulsada por IA, con un servicio gestionado de respuesta a incidentes 24\/7 para proteger el workspace moderno: correo electr\u00f3nico, navegadores y aplicaciones en la nube.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ukotek.com\/it\/soluciones\/proteccion-del-entorno-de-trabajo\/\" \/>\n<meta property=\"og:site_name\" content=\"Ukotek\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-18T06:46:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/\",\"url\":\"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/\",\"name\":\"Protecci\u00f3n del Entorno de trabajo - Ukotek\",\"isPartOf\":{\"@id\":\"https:\/\/ukotek.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/10\/Recurso-3.svg\",\"datePublished\":\"2024-06-25T14:27:57+00:00\",\"dateModified\":\"2024-11-18T06:46:25+00:00\",\"description\":\"Junto con su partner Perception Point, Ukotek ofrece una plataforma avanzada de prevenci\u00f3n de amenazas impulsada por IA, con un servicio gestionado de respuesta a incidentes 24\/7 para proteger el workspace moderno: correo electr\u00f3nico, navegadores y aplicaciones en la nube.\",\"breadcrumb\":{\"@id\":\"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#primaryimage\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/10\/Recurso-3.svg\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/10\/Recurso-3.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/ukotek.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluciones\",\"item\":\"https:\/\/ukotek.com\/soluciones\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protecci\u00f3n del Entorno de trabajo\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ukotek.com\/#website\",\"url\":\"https:\/\/ukotek.com\/\",\"name\":\"Ukotek\",\"description\":\"Ciber Security\",\"publisher\":{\"@id\":\"https:\/\/ukotek.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ukotek.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ukotek.com\/#organization\",\"name\":\"Ukotek\",\"url\":\"https:\/\/ukotek.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"width\":783,\"height\":224,\"caption\":\"Ukotek\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecci\u00f3n del Entorno de trabajo - Ukotek","description":"Junto con su partner Perception Point, Ukotek ofrece una plataforma avanzada de prevenci\u00f3n de amenazas impulsada por IA, con un servicio gestionado de respuesta a incidentes 24\/7 para proteger el workspace moderno: correo electr\u00f3nico, navegadores y aplicaciones en la nube.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ukotek.com\/it\/soluciones\/proteccion-del-entorno-de-trabajo\/","og_locale":"it_IT","og_type":"article","og_title":"Protecci\u00f3n del Entorno de trabajo - Ukotek","og_description":"Junto con su partner Perception Point, Ukotek ofrece una plataforma avanzada de prevenci\u00f3n de amenazas impulsada por IA, con un servicio gestionado de respuesta a incidentes 24\/7 para proteger el workspace moderno: correo electr\u00f3nico, navegadores y aplicaciones en la nube.","og_url":"https:\/\/ukotek.com\/it\/soluciones\/proteccion-del-entorno-de-trabajo\/","og_site_name":"Ukotek","article_modified_time":"2024-11-18T06:46:25+00:00","twitter_card":"summary_large_image","twitter_misc":{"Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/","url":"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/","name":"Protecci\u00f3n del Entorno de trabajo - Ukotek","isPartOf":{"@id":"https:\/\/ukotek.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#primaryimage"},"image":{"@id":"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#primaryimage"},"thumbnailUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/10\/Recurso-3.svg","datePublished":"2024-06-25T14:27:57+00:00","dateModified":"2024-11-18T06:46:25+00:00","description":"Junto con su partner Perception Point, Ukotek ofrece una plataforma avanzada de prevenci\u00f3n de amenazas impulsada por IA, con un servicio gestionado de respuesta a incidentes 24\/7 para proteger el workspace moderno: correo electr\u00f3nico, navegadores y aplicaciones en la nube.","breadcrumb":{"@id":"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#primaryimage","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/10\/Recurso-3.svg","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/10\/Recurso-3.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/ukotek.com\/soluciones\/proteccion-del-entorno-de-trabajo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/ukotek.com\/"},{"@type":"ListItem","position":2,"name":"Soluciones","item":"https:\/\/ukotek.com\/soluciones\/"},{"@type":"ListItem","position":3,"name":"Protecci\u00f3n del Entorno de trabajo"}]},{"@type":"WebSite","@id":"https:\/\/ukotek.com\/#website","url":"https:\/\/ukotek.com\/","name":"Ukotek","description":"Ciber Security","publisher":{"@id":"https:\/\/ukotek.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ukotek.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/ukotek.com\/#organization","name":"Ukotek","url":"https:\/\/ukotek.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","width":783,"height":224,"caption":"Ukotek"},"image":{"@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/pages\/57","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/comments?post=57"}],"version-history":[{"count":89,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/pages\/57\/revisions"}],"predecessor-version":[{"id":2535,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/pages\/57\/revisions\/2535"}],"up":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/pages\/46"}],"wp:attachment":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/media?parent=57"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}