{"id":88847,"date":"2022-11-11T14:38:36","date_gmt":"2022-11-11T13:38:36","guid":{"rendered":"https:\/\/www.avanet.com\/shop\/sophos-central-managed-detection-and-response-complete\/"},"modified":"2024-04-19T08:13:33","modified_gmt":"2024-04-19T07:13:33","slug":"sophos-central-managed-detection-and-response-complete","status":"publish","type":"product","link":"https:\/\/www.avanet.com\/it\/shop\/sophos-central-managed-detection-and-response-complete\/","title":{"rendered":"Sophos Central Managed Detection and Response Complete"},"content":{"rendered":"<div data-block=\"hook:130544\" class=\"alignfull\"><article id=\"post-130544\" class=\"post-130544\"><div class=\"entry-content is-layout-constrained\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-a50b114d overflow-x-auto ava-card-spacer\">\n<div class=\"gb-container gb-container-57c73bc9\">\n<div class=\"gb-container gb-container-5e6c23b9\">\n\n<a class=\"gb-button gb-button-75931100 gb-button-text\" href=\"#product-description\">Descrizione<\/a>\n\n\n\n<a class=\"gb-button gb-button-684575e7 gb-button-text\" href=\"#avanet-services\">Servizi<\/a>\n\n\n\n<a class=\"gb-button gb-button-8f7ca155 gb-button-text\" href=\"#info-materials\">Materiale informativo<\/a>\n\n\n\n<a class=\"gb-button gb-button-826fa0e4 gb-button-text\" href=\"#trial-version\">Versione di prova<\/a>\n\n\n\n<a class=\"gb-button gb-button-fda0e505 gb-button-text\" href=\"#help-for-buying\">Aiuto per l'acquisto<\/a>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-29320c59\" id=\"product-description\">\n\n<p class=\"gb-headline gb-headline-8fb21070\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M4.5 2A1.5 1.5 0 003 3.5v13A1.5 1.5 0 004.5 18h11a1.5 1.5 0 001.5-1.5V7.621a1.5 1.5 0 00-.44-1.06l-4.12-4.122A1.5 1.5 0 0011.378 2H4.5zm2.25 8.5a.75.75 0 000 1.5h6.5a.75.75 0 000-1.5h-6.5zm0 3a.75.75 0 000 1.5h6.5a.75.75 0 000-1.5h-6.5z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Descrizione<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-sophos-managed-detection-and-response-kunstliche-intelligenz-gemischt-mit-menschlicher-expertise\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.645), 24px);font-style:normal;font-weight:600\">Sophos Managed Detection and Response<strong> \u2013 Intelligenza artificiale mista a competenza umana<\/strong><\/h2>\n\n\n\n<p>Con \"Sophos Central MDR\" raggiungete il massimo livello di sicurezza che Sophos pu\u00f2 attualmente offrire per la protezione dei vostri endpoint (macOS 10.15+, Windows 8.1+). Questo pacchetto offre tutte le funzioni di <a href=\"https:\/\/www.avanet.com\/it\/shop\/sophos-central-intercept-x-advanced-con-xdr\/\">Intercept X Advanced con XDR<\/a> e il nuovo servizio MDR potenziato.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-aktive-bekampfung-von-bedrohungen-durch-ein-expertenteam-24-7\" style=\"font-style:normal;font-weight:600\"><strong>Lotta attiva alle minacce da parte di un team di esperti, 24 ore su 24, 7 giorni su 7.<\/strong><\/h3>\n\n\n\n<p>Con il servizio MDR, Sophos fornisce un \"Service Operation Center\" (SOC) altamente disponibile. \u00c8 il complemento perfetto per tutti gli amministratori IT che non dispongono di risorse libere per andare a caccia di minacce con gli strumenti di XDR. L'utilizzo di <a href=\"https:\/\/www.avanet.com\/blog\/wozu-endpoint-detection-and-response-edr\/\">XDR<\/a> richiede personale altamente qualificato e specializzato per scansionare in modo proattivo la rete alla ricerca di potenziali minacce e adottare le misure corrette in caso di attacco.<br\/>Con Sophos Central MDR per Server, non \u00e8 pi\u00f9 necessario cercare personale qualificato. Sophos mette a disposizione un team di esperti che lavora 24 ore su 24, 7 giorni su 7, per combattere le minacce.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-funktionsumfang-von-mdr-complete\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.645), 24px);font-style:normal;font-weight:600\"><strong><strong>Ambito funzionale dell'<\/strong> MDR Completo<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-24-7-indizienbasierte-bedrohungssuche\" style=\"font-style:normal;font-weight:600\">Rilevamento delle minacce circostanziali 24\/7<\/h3>\n\n\n\n<p>Se nel vostro sistema \u00e8 stato rilevato un problema che non pu\u00f2 essere risolto automaticamente e che richiede competenze umane, il team MDR \u00e8 a vostra disposizione 24 ore su 24, 7 giorni su 7. Un esperto esamina la nota critica e decide cosa fare in base alla sua esperienza.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-24-7-indizienlose-bedrohungssuche\" style=\"font-style:normal;font-weight:600\">Ricerca di minacce circostanziali 24\/7<\/h3>\n\n\n\n<p>Gli analisti del team MDR esaminano da vicino i dispositivi o gli account utente particolarmente importanti della vostra azienda. In questo modo, esaminano il modo in cui le persone comunicano sulla rete, se sono in esecuzione processi sospetti o se \u00e8 possibile rilevare qualsiasi altro comportamento insolito o atipico. I dati raccolti vengono utilizzati per cercare di prevedere la strategia degli aggressori e identificare nuovi indicatori di attacco (IoA).<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-angriffserkennung\" style=\"font-style:normal;font-weight:600\">Rilevamento degli attacchi<\/h3>\n\n\n\n<p>Il team MDR presta particolare attenzione agli attacchi eseguiti tramite processi legittimi, come PowerShell. Questi attacchi hanno spesso successo perch\u00e9 sono difficili da rilevare per gli strumenti di sorveglianza. Il team MDR monitora questi processi utilizzando analisi sviluppate internamente per garantire che non vengano utilizzati per scopi dannosi.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-security-health-check\" style=\"font-style:normal;font-weight:600\">Controllo della sicurezza<\/h3>\n\n\n\n<p>Il Security Health Check assicura che i prodotti Sophos Central possano sempre funzionare al massimo delle prestazioni. A tal fine, il team MDR esamina i requisiti della rete e fornisce raccomandazioni per le modifiche alla configurazione.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-aktivitatsreports\" style=\"font-style:normal;font-weight:600\">Rapporti di attivit\u00e0<\/h3>\n\n\n\n<p>Potrete conoscere lo stato attuale dei vostri sistemi, quali informazioni sono state raccolte durante il periodo di riferimento e quali minacce sono state scongiurate. Viene quindi creato un istogramma di questi rapporti nel periodo in cui si utilizza il servizio MDR. Con l'aiuto di questi dati, Sophos crea le cosiddette \"scorecard\", con le quali \u00e8 possibile confrontarsi con i periodi precedenti.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-dedizierter-ansprechpartner\" style=\"font-style:normal;font-weight:600\">Persona di contatto dedicata<\/h3>\n\n\n\n<p>Quando viene rilevato un incidente, vi verr\u00e0 assegnato un manager di risposta dedicato che sar\u00e0 al telefono per assistervi nella risoluzione completa del problema!<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-direkter-telefon-support\" style=\"font-style:normal;font-weight:600\">Assistenza telefonica diretta<\/h3>\n\n\n\n<p>Un altro vantaggio della variante MDR Complete \u00e8 l'accesso diretto al team di analisti MDR, disponibile 24 ore su 24 e 7 giorni su 7 per il vostro team. Quindi, se avete una domanda o volete parlare di un caso specifico di minaccia, ad esempio, potete contattare direttamente il Security Operations Centre (SOC) per telefono.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-optimierte-telemetriedaten\" style=\"font-style:normal;font-weight:600\">Dati telemetrici ottimizzati<\/h3>\n\n\n\n<p>Per una telemetria migliorata, la versione Complete va oltre il semplice rilevamento degli eventi nell'endpoint e include nell'analisi delle minacce i dati provenienti da altri prodotti Central o da terze parti supportate.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-proaktive-verbesserung-des-sicherheitsstatus\" style=\"font-style:normal;font-weight:600\">Miglioramento proattivo dello stato di sicurezza<\/h3>\n\n\n\n<p>MDR Complete porta il Security Health Check a un livello superiore. Mentre la normale variante MDR fornisce raccomandazioni generali per la configurazione dei prodotti Central, il team MDR ora prende in considerazione anche il contesto aziendale che sta dietro alle impostazioni di configurazione, ad esempio, di un criterio. Riceverete assistenza per eliminare le vulnerabilit\u00e0 di configurazione e architettura che hanno un impatto negativo sulla vostra sicurezza.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-asset-erkennung\" style=\"font-style:normal;font-weight:600\">Riconoscimento delle attivit\u00e0<\/h3>\n\n\n\n<p>Gli esperti Sophos non solo discuteranno con voi delle operazioni critiche, ma otterranno anche una panoramica delle applicazioni in uso e identificheranno i potenziali punti di attacco che potrebbero sorgere nel sistema. A tal fine, il team MDR prende in considerazione il cosiddetto \"inventario delle risorse\" che lo aiuta a capire quali applicazioni sono in esecuzione su un endpoint e se sono affette da vulnerabilit\u00e0 aperte. In questo modo si ottengono preziose informazioni dettagliate e specifiche per la vostra azienda.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-onboarding-prozess-mit-maximaler-kontrolle-und-transparenz\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.645), 24px);font-style:normal;font-weight:600\"><strong>Processo di onboarding<\/strong> con massimo controllo e trasparenza<\/h2>\n\n\n\n<p>Indipendentemente dal fatto che si scelga la variante MDR normale o MDR Complete, si mantiene il controllo sul modo in cui il team MDR deve lavorare autonomamente. Questo viene regolato fin dall'inizio nel cosiddetto <strong>processo di onboarding<\/strong>. Quando acquistate il servizio Sophos MDR, potete scegliere tra tre opzioni che determinano la risposta che vi aspettate dal team MDR:<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-benachrichtigung\" style=\"font-style:normal;font-weight:600\">Notifica<\/h3>\n\n\n\n<p>A questo livello, se il team MDR di Sophos ha rilevato una minaccia o un attacco, si limiter\u00e0 a informare l'utente, ma non agir\u00e0 per suo conto. Tuttavia, si otterr\u00e0 un rapporto dettagliato sulla causa e sul rilevamento, con le azioni da intraprendere per risolvere manualmente il pericolo.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-zusammenarbeit\" style=\"font-style:normal;font-weight:600\">Cooperazione<\/h3>\n\n\n\n<p>Il team MDR di Sophos collabora con il vostro team IT o anche con una societ\u00e0 di consulenza esterna per rispondere alle minacce appropriate.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\" id=\"h-autorisierung\" style=\"font-style:normal;font-weight:600\">Autorizzazione<\/h3>\n\n\n\n<p>In questo caso, il team MDR si occupa delle azioni di contenimento e neutralizzazione in modo del tutto indipendente e si limita a informarvi sulle misure adottate.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-enthaltene-integrationen-keine-zusatzlichen-kosten\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.645), 24px);font-style:normal;font-weight:600\">Integrazioni incluse <strong>- nessun costo aggiuntivo<\/strong><\/h2>\n\n<p>I dati di sicurezza provenienti dalle seguenti fonti possono essere integrati gratuitamente per essere utilizzati dal team MDR di Sophos. Le fonti di telemetria vengono utilizzate per aumentare la visibilit\u00e0 dell'ambiente, generare nuovi rilevamenti di minacce e migliorare l'affidabilit\u00e0 dei rilevamenti di minacce esistenti.<\/p>\n<div class=\"gb-container gb-container-42d8a81a\">\n<div class=\"gb-container gb-container-ce081f4b\">\n\n<h2 class=\"gb-headline gb-headline-ec6d21c2\"><span class=\"gb-icon\"><svg xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 60 52\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <clippath id=\"a\">     <path d=\"m-.098 51.961h60.002v-52.082h-60.002v52.082z\" clip-rule=\"nonzero\"><\/path>   <\/clippath>   <g fill-rule=\"nonzero\" fill=\"#005bc8\" clip-path=\"url(#a)\">     <path d=\"m16.663 0c-1.976 0-4.246.858-5.892 2.192-1.745 1.415-2.782 3.813-3.009 4.694l-7.762 44.989h42.167c2.673 0 8.255-.453 10.051-7.563l7.639-44.312zm1.492 33.566-2.188-5.443-4.084 5.443h-3.293l6.125-7.769-3.109-7.418h3.054l2.065 5.186 3.933-5.192h3.253l-5.962 7.493 3.306 7.694zm17.425-9.175-.762 4.198c-.253 1.496-1.34 4.977-5.945 4.977h-6.249l.038-.206 2.645-14.981h4.366c2.249 0 3.911.615 4.938 1.83.899 1.065 1.242 2.547.969 4.182zm10.005 3.461 1.622 5.714h-2.861l-1.521-5.362h-3.001l-.951 5.362h-2.831l.038-.206 2.645-14.981h4.526c5.151 0 5.925 2.725 5.925 4.351.004 1.52-.468 4.184-3.591 5.122z\"><\/path>     <path d=\"m29.741 20.892h-2.04l-1.778 10.161h2.892c2.505 0 3.092-1.928 3.229-2.757l.696-3.923c.139-.765.174-1.833-.442-2.574-.503-.607-1.362-.907-2.557-.907z\"><\/path>     <path d=\"m43.233 20.808h-2.098l-.888 5.01h2.816c2.72 0 3.291-1.611 3.291-2.96 0-.88-.323-2.05-3.121-2.05z\"><\/path>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">Sophos XDR<\/span><\/h2>\n\n\n\n<p>L'unica piattaforma XDR che combina integrazioni native di endpoint, Server, firewall, cloud, e-mail, mobile e Microsoft.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#94a3b8;font-size:14px\">Incluso nei prezzi di Sophos MDR e Sophos MDR Complete.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-723cbe56\">\n\n<h2 class=\"gb-headline gb-headline-4b6e17d4\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 60 52\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <path fill-rule=\"nonzero\" fill=\"#005bc8\" d=\"m16.663 0c-1.976 0-4.246.858-5.892 2.195-1.744 1.412-2.782 3.81-3.009 4.691l-7.762 44.989h42.167c2.673 0 8.255-.453 10.051-7.563l7.639-44.312zm10.979 20.873h-7.334l-.696 3.994h6.868l-.418 2.493h-6.895l-1.099 6.211h-2.832l.037-.209 2.645-14.981h10.161zm12.294 12.701h-2.592l-1.104-7.753-3.877 7.753h-2.574l-.015-.158-1.183-11.47h2.645l.557 7.804 3.712-7.804h2.636l.934 7.816 3.341-7.816h2.838z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Sophos Firewall<\/span><\/h2>\n\n\n\n<p>Monitorare e filtrare il traffico di rete in entrata e in uscita per bloccare le minacce avanzate prima che possano causare danni.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#94a3b8;font-size:14px\">Il prodotto \u00e8 disponibile separatamente; \u00e8 integrato senza costi aggiuntivi.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-c53afc3f\">\n\n<h2 class=\"gb-headline gb-headline-45f8296f\"><span class=\"gb-icon\"><svg xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 60 52\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <clippath id=\"a\">     <path d=\"m-.098 51.721h59.762v-51.841h-59.762v51.841z\" clip-rule=\"nonzero\"><\/path>   <\/clippath>   <g fill-rule=\"nonzero\" fill=\"#005bc8\" clip-path=\"url(#a)\">     <path d=\"m36.966 23.913c-1.802 0-2.449 1.447-2.669 2.662l-.314 1.854c-.16.863-.049 1.529.327 1.982.375.455 1.062.704 2.004.704 1.315 0 2.064-.745 2.357-2.345l.379-2.132c.167-.954.064-1.667-.307-2.105-.347-.41-.943-.62-1.777-.62z\"><\/path>     <path d=\"m16.596 0c-1.968 0-4.229.854-5.868 2.182-1.738 1.408-2.771 3.795-2.997 4.673l-7.731 44.78h41.998c2.663 0 8.222-.45 10.011-7.528l7.608-44.107h-43.021zm11.841 26.635h-6.716l-.757 4.247h7.473l-.416 2.419h-10.299l.038-.206 2.635-14.912h10.002l-.45 2.418h-7.153l-.651 3.7h6.717zm13.31-.188-.522 2.983c-.453 2.5-2.249 4.111-4.576 4.111-1.467 0-2.66-.462-3.352-1.279l-.854 4.836h-2.675l2.694-15.372h2.401l-.076.916c.744-.754 1.756-1.147 2.959-1.147 1.339 0 2.478.48 3.211 1.351.757.906 1.039 2.184.794 3.601z\"><\/path>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">Sophos Endpoint Protection<\/span><\/h2>\n\n\n\n<p>Bloccare le minacce avanzate e rilevare i comportamenti dannosi, compresi gli aggressori che si spacciano per utenti legittimi.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#94a3b8;font-size:14px\">Incluso nei prezzi di Sophos MDR e Sophos MDR Complete.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-a2f237ba\">\n\n<h2 class=\"gb-headline gb-headline-e7ba472a\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 61 52\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <path fill-rule=\"nonzero\" fill=\"#005bc8\" d=\"m16.729 0c-1.983 0-4.263.858-5.915 2.192-1.752 1.415-2.794 3.813-3.021 4.694l-7.793 44.989h42.335c2.684 0 8.288-.453 10.091-7.564l7.669-44.311zm8.206 24.528-.419 2.344h-6.775l-.765 4.269h7.533l-.42 2.43h-10.379l.036-.209 2.656-14.981h10.081l-.448 2.43h-7.213l-.654 3.717zm19.787 1.733-1.3 7.31h-2.714l1.205-6.839c.111-.604.147-1.434-.311-1.982-.335-.405-.901-.611-1.677-.611-1.461 0-2.314.855-2.607 2.609l-1.213 6.824h-2.718l1.203-6.839c.112-.603.149-1.433-.308-1.982-.336-.405-.902-.609-1.684-.609-1.444 0-2.302.881-2.627 2.694l-1.193 6.737h-2.715l2.079-11.628h2.424l-.093.97c.765-.781 1.817-1.204 3.016-1.204 1.624 0 2.89.686 3.528 1.891.845-1.205 2.213-1.891 3.795-1.891 1.335 0 2.465.47 3.177 1.321.713.851.958 1.977.733 3.229z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Sophos Email\u200b<\/span><\/h2>\n\n\n\n<p>Proteggete la vostra casella di posta elettronica dalle minacce informatiche e approfittate dell'intelligenza artificiale avanzata che impedisce l'inganno dell'identit\u00e0 e gli attacchi di phishing.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#94a3b8;font-size:14px\">Il prodotto \u00e8 disponibile separatamente; \u00e8 integrato senza costi aggiuntivi.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-b7f9d2ea\">\n\n<h2 class=\"gb-headline gb-headline-083ee923\"><span class=\"gb-icon\"><svg xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 60 52\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <clippath id=\"a\">     <path d=\"m-.098 51.961h60.002v-52.082h-60.002v52.082z\" clip-rule=\"nonzero\"><\/path>   <\/clippath>   <g fill-rule=\"nonzero\" fill=\"#005bc8\" clip-path=\"url(#a)\">     <path d=\"m16.663 0c-1.976 0-4.246.858-5.892 2.192-1.744 1.415-2.782 3.813-3.009 4.694l-7.762 44.989h42.167c2.673 0 8.255-.453 10.051-7.564l7.639-44.311zm10.802 22.916-.063.47h-2.784l.071-.518c.088-.68-.047-1.23-.398-1.632-.463-.528-1.302-.795-2.493-.795-2.654 0-3.202 2.126-3.315 2.776l-.825 4.687c-.11.665-.123 1.606.451 2.284.491.583 1.333.878 2.506.878 2.474 0 2.923-1.766 2.995-2.307l.139-.68h2.757l-.139.963c-.301 2.093-1.983 4.539-5.734 4.539-2.252 0-3.897-.597-4.872-1.774-.863-1.038-1.167-2.536-.859-4.22l.801-4.662c.418-2.417 2.258-4.999 6.155-4.999 2.189 0 3.78.558 4.733 1.646.954 1.087.999 2.421.874 3.344zm5.54-5.185-2.732 15.617h-2.704l.035-.208 2.73-15.617h2.706zm12.238 0-2.731 15.617h-2.411l.075-.913c-.737.752-1.753 1.146-2.971 1.146-1.343 0-2.488-.486-3.223-1.37-.756-.91-1.032-2.183-.775-3.586l.507-3.007c.462-2.549 2.227-4.132 4.612-4.132 1.475 0 2.665.46 3.341 1.276l.929-5.239h2.682z\"><\/path>     <path d=\"m38.644 23.916c-1.322 0-2.073.749-2.367 2.356l-.38 2.161c-.167.954-.061 1.666.313 2.115.348.418.944.624 1.775.624 1.809 0 2.457-1.454 2.682-2.674l.315-1.814c.165-.902.054-1.596-.333-2.057-.385-.462-1.061-.711-2.005-.711z\"><\/path>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">Sophos Cloud<\/span><\/h2>\n\n\n\n<p>Bloccate gli attacchi al cloud e ottenete visibilit\u00e0 sui vostri servizi cloud principali, tra cui AWS, Azure e Google Cloud Platform.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#94a3b8;font-size:14px\">Il prodotto \u00e8 disponibile separatamente; \u00e8 integrato senza costi aggiuntivi.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-0814d94f\">\n\n<h2 class=\"gb-headline gb-headline-c22fa651\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 57 51\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <g fill-rule=\"nonzero\" fill=\"#0ca406\">     <path d=\"m46.691 13.509h-21.831v-2.119c0-1.589-.616-3.082-1.735-4.204-1.119-1.124-2.606-1.742-4.188-1.742h-15.01c-2.166 0-3.927 1.769-3.927 3.943v36.46c0 2.37 1.921 4.299 4.282 4.299h42.409c2.361 0 4.281-1.929 4.281-4.299v-28.04c0-2.37-1.92-4.298-4.281-4.298zm2.519 32.338c0 1.395-1.129 2.53-2.519 2.53h-42.409c-1.39 0-2.52-1.135-2.52-2.53v-36.46c0-1.199.972-2.174 2.165-2.174h15.01c1.112 0 2.156.434 2.942 1.223s1.219 1.838 1.219 2.954v3.004c0 .489.394.884.881.884h22.712c1.39 0 2.519 1.134 2.519 2.529z\"><\/path>     <path d=\"m52.112 8.065h-21.829v-2.117c0-1.588-.616-3.081-1.736-4.206-1.103-1.107-2.629-1.742-4.187-1.742h-15.01c-2.167 0-3.928 1.769-3.928 3.943 0 .489.394.884.881.884.488 0 .881-.395.881-.884 0-1.199.972-2.174 2.166-2.174h15.01c1.094 0 2.167.446 2.941 1.224.787.79 1.22 1.84 1.22 2.955v3.001c0 .49.394.885.881.885h22.71c1.389 0 2.52 1.135 2.52 2.531v28.04c0 1.394-1.131 2.528-2.52 2.528-.487 0-.881.396-.881.885s.394.884.881.884c2.361 0 4.282-1.928 4.282-4.297v-28.04c0-2.371-1.921-4.3-4.282-4.3z\"><\/path>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">90 giorni di conservazione dei dati<\/span><\/h2>\n\n\n\n<p>Memorizza i dati di tutti i prodotti Sophos e di tutti i prodotti di terze parti (non Sophos) nel Sophos Data Lake.<\/p>\n\n\n\n<p class=\"has-text-color\" style=\"color:#94a3b8;font-size:14px\">Incluso nei prezzi di Sophos MDR e Sophos MDR Complete.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-70a0ecc9\">\n\n<h2 class=\"gb-headline gb-headline-97b104bf\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 46 46\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <path fill=\"#f25022\" d=\"m0 0h21.917v21.917h-21.917z\"><\/path>   <path fill=\"#00a4ef\" d=\"m0 23.443h21.917v21.917h-21.917z\"><\/path>   <path fill=\"#7fba00\" d=\"m23.923 0h21.917v21.917h-21.917z\"><\/path>   <path fill=\"#ffb900\" d=\"m23.923 23.443h21.917v21.917h-21.917z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Microsoft Graph Security\u200b<\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Microsoft Defender for Endpoint<\/li>\n\n\n\n<li>Microsoft Defender for Cloud<\/li>\n\n\n\n<li>Microsoft Defender for Cloud Apps<\/li>\n\n\n\n<li>Microsoft Defender for Identity<\/li>\n\n\n\n<li>Identity Protection (Azure AD)<\/li>\n\n\n\n<li>Microsoft Azure Sentinel<\/li>\n\n\n\n<li>Office 365 Security and Compliance Center<\/li>\n\n\n\n<li>Azure Information Protection<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-5214f9a8\">\n\n<h2 class=\"gb-headline gb-headline-ef052594\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 46 46\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <path fill=\"#f25022\" d=\"m0 0h21.917v21.917h-21.917z\"><\/path>   <path fill=\"#00a4ef\" d=\"m0 23.443h21.917v21.917h-21.917z\"><\/path>   <path fill=\"#7fba00\" d=\"m23.923 0h21.917v21.917h-21.917z\"><\/path>   <path fill=\"#ffb900\" d=\"m23.923 23.443h21.917v21.917h-21.917z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Office 365 Management Activity<\/span><\/h2>\n\n\n\n<p>Fornisce informazioni sulle azioni e sugli eventi di utenti, amministratori, sistemi e criteri dai registri delle attivit\u00e0 di Office 365 e Azure Active Directory.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-222c7c3a\">\n\n<h2 class=\"gb-headline gb-headline-6bb1f9b3\"><span class=\"gb-icon\"><svg xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 62 45\" stroke-miterlimit=\"10\" stroke-linejoin=\"round\" stroke-linecap=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <clippath id=\"a\">     <path d=\"m-1.85 45.506h64.801v-47.279h-64.802l.001 47.279z\" clip-rule=\"nonzero\"><\/path>   <\/clippath>   <g stroke-width=\"1.46\" stroke=\"#930cd3\" fill=\"none\" clip-path=\"url(#a)\">     <path d=\"m47.129 12.799h2.907\"><\/path>     <path d=\"m31.525 12.799h10.792\"><\/path>     <path d=\"m55.287 5.294h-48.622v28.172h48.622z\"><\/path>     <path d=\"m59.331 38.093v-35.163c0-1.215-.845-2.199-1.884-2.199h-52.943c-1.041 0-1.883.984-1.883 2.199v35.163z\"><\/path>     <path d=\"m.731 38.157v3.083c0 1.214.844 2.197 1.884 2.197h56.723c1.042 0 1.883-.983 1.883-2.197v-3.083h-60.49z\"><\/path>     <path d=\"m25.567 40.869h10.818l1.26-2.776h-13.338z\"><\/path>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">Protezione degli endpoint di terze parti<\/span><\/h2>\n\n\n\n<p>Compatibile con ...<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Microsoft<\/li>\n\n\n\n<li>CrowdStrike<\/li>\n\n\n\n<li>SentinelOne<\/li>\n\n\n\n<li>Check Point<\/li>\n\n\n\n<li>Trend Micro<\/li>\n\n\n\n<li>BlackBerry (Cylance)<\/li>\n\n\n\n<li>McAfee<\/li>\n\n\n\n<li>Malwarebytes<\/li>\n<\/ul>\n\n<\/div>\n<\/div>\n<h2 class=\"wp-block-heading\" id=\"h-add-on-integrationen\" style=\"font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.645), 24px);font-style:normal;font-weight:600\"><strong>Integrazione<\/strong> di add-on<\/h2>\n\n<p>I dati di sicurezza provenienti dalle seguenti fonti di terze parti possono essere integrati nel team operativo di Sophos MDR acquistando i pacchetti di integrazione.<\/p>\n<div class=\"gb-container gb-container-68ae1c24\">\n<div class=\"gb-container gb-container-2725d7bc\">\n\n<h2 class=\"gb-headline gb-headline-90d7cfb8\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 62 41\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <g fill=\"#930cd3\">     <path d=\"m51.894 9.187c0-.564-.456-1.021-1.017-1.021-.562 0-1.018.457-1.018 1.021 0 .563.456 1.02 1.018 1.02.561 0 1.017-.457 1.017-1.02z\"><\/path>     <path d=\"m47.824 9.187c0-.564-.456-1.021-1.018-1.021-.561 0-1.017.457-1.017 1.021 0 .563.456 1.02 1.017 1.02.562 0 1.018-.457 1.018-1.02z\"><\/path>     <path d=\"m53.929 12.249c0-.564-.456-1.021-1.017-1.021-.562 0-1.018.457-1.018 1.021 0 .563.456 1.02 1.018 1.02.561 0 1.017-.457 1.017-1.02z\"><\/path>     <path d=\"m49.859 12.249c0-.564-.456-1.021-1.018-1.021-.561 0-1.017.457-1.017 1.021 0 .563.456 1.02 1.017 1.02.562 0 1.018-.457 1.018-1.02z\"><\/path>     <path d=\"m43.754 9.187c0-.564-.456-1.021-1.018-1.021-.561 0-1.017.457-1.017 1.021 0 .563.456 1.02 1.017 1.02.562 0 1.018-.457 1.018-1.02z\"><\/path>     <path d=\"m45.789 12.249c0-.564-.456-1.021-1.018-1.021-.561 0-1.017.457-1.017 1.021 0 .563.456 1.02 1.017 1.02.562 0 1.018-.457 1.018-1.02z\"><\/path>     <path d=\"m39.684 9.187c0-.564-.456-1.021-1.018-1.021-.561 0-1.017.457-1.017 1.021 0 .563.456 1.02 1.017 1.02.562 0 1.018-.457 1.018-1.02z\"><\/path>     <path d=\"m41.719 12.249c0-.564-.456-1.021-1.018-1.021-.561 0-1.017.457-1.017 1.021 0 .563.456 1.02 1.017 1.02.562 0 1.018-.457 1.018-1.02z\"><\/path>     <path d=\"m35.613 9.187c0-.564-.455-1.021-1.017-1.021s-1.018.457-1.018 1.021c0 .563.456 1.02 1.018 1.02s1.017-.457 1.017-1.02z\"><\/path>     <path d=\"m37.649 12.249c0-.564-.456-1.021-1.018-1.021s-1.018.457-1.018 1.021c0 .563.456 1.02 1.018 1.02s1.018-.457 1.018-1.02z\"><\/path>     <path fill-rule=\"nonzero\" d=\"m61.052 16.73v-12.026c0-2.594-2.103-4.704-4.688-4.704h-51.675c-2.586 0-4.689 2.109-4.689 4.704v12.026c0 1.5.715 2.822 1.808 3.684-1.093.862-1.808 2.184-1.808 3.683v12.027c0 2.594 2.103 4.704 4.689 4.704h51.675c2.585 0 4.688-2.11 4.688-4.704v-12.026c0-1.5-.715-2.822-1.808-3.684 1.093-.862 1.808-2.184 1.808-3.684zm-2.035 7.368v12.026c0 1.468-1.191 2.662-2.653 2.662h-51.675c-1.463.001-2.654-1.193-2.654-2.662v-12.027c0-1.468 1.191-2.662 2.654-2.662h51.674c1.463 0 2.654 1.194 2.654 2.663zm-54.328-4.704c-1.463 0-2.654-1.195-2.654-2.664v-12.026c0-1.468 1.191-2.663 2.654-2.663h51.674c1.463 0 2.654 1.195 2.654 2.663v12.026c0 1.469-1.191 2.663-2.653 2.663h-51.675v.001z\"><\/path>     <path fill-rule=\"nonzero\" d=\"m10.684 34.704c2.525 0 4.579-2.06 4.579-4.593 0-2.532-2.054-4.593-4.579-4.593-2.524 0-4.579 2.06-4.579 4.593 0 2.534 2.055 4.593 4.579 4.593zm0-7.145c1.402 0 2.544 1.144 2.544 2.552s-1.142 2.552-2.544 2.552-2.544-1.144-2.544-2.552 1.142-2.552 2.544-2.552z\"><\/path>     <path d=\"m51.894 28.58c0-.563-.456-1.021-1.017-1.021-.562 0-1.018.458-1.018 1.021 0 .564.456 1.021 1.018 1.021.561 0 1.017-.457 1.017-1.021z\"><\/path>     <path d=\"m47.824 28.58c0-.563-.456-1.021-1.018-1.021-.561 0-1.017.458-1.017 1.021 0 .564.456 1.021 1.017 1.021.562 0 1.018-.457 1.018-1.021z\"><\/path>     <path d=\"m53.929 31.642c0-.563-.456-1.02-1.017-1.02-.562 0-1.018.457-1.018 1.02 0 .564.456 1.021 1.018 1.021.561 0 1.017-.457 1.017-1.021z\"><\/path>     <path d=\"m49.859 31.642c0-.563-.456-1.02-1.018-1.02-.561 0-1.017.457-1.017 1.02 0 .564.456 1.021 1.017 1.021.562 0 1.018-.457 1.018-1.021z\"><\/path>     <path d=\"m43.754 28.58c0-.563-.456-1.021-1.018-1.021-.561 0-1.017.458-1.017 1.021 0 .564.456 1.021 1.017 1.021.562 0 1.018-.457 1.018-1.021z\"><\/path>     <path d=\"m45.789 31.642c0-.563-.456-1.02-1.018-1.02-.561 0-1.017.457-1.017 1.02 0 .564.456 1.021 1.017 1.021.562 0 1.018-.457 1.018-1.021z\"><\/path>     <path d=\"m39.684 28.58c0-.563-.456-1.021-1.018-1.021-.561 0-1.017.458-1.017 1.021 0 .564.456 1.021 1.017 1.021.562 0 1.018-.457 1.018-1.021z\"><\/path>     <path d=\"m41.719 31.642c0-.563-.456-1.02-1.018-1.02-.561 0-1.017.457-1.017 1.02 0 .564.456 1.021 1.017 1.021.562 0 1.018-.457 1.018-1.021z\"><\/path>     <path d=\"m35.613 28.58c0-.563-.455-1.021-1.017-1.021s-1.018.458-1.018 1.021c0 .564.456 1.021 1.018 1.021s1.017-.457 1.017-1.021z\"><\/path>     <path d=\"m37.649 31.642c0-.563-.456-1.02-1.018-1.02s-1.018.457-1.018 1.02c0 .564.456 1.021 1.018 1.021s1.018-.457 1.018-1.021z\"><\/path>     <path fill-rule=\"nonzero\" d=\"m10.684 6.124c-2.524 0-4.579 2.061-4.579 4.594 0 2.532 2.055 4.593 4.579 4.593 2.525 0 4.579-2.061 4.579-4.593 0-2.533-2.054-4.594-4.579-4.594zm0 7.145c-1.402 0-2.544-1.144-2.544-2.551 0-1.408 1.142-2.552 2.544-2.552s2.544 1.144 2.544 2.552c0 1.407-1.142 2.551-2.544 2.551z\"><\/path>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">Firewall<\/span><\/h2>\n\n\n\n<p>Compatibile con ...<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Palo Alto Networks<\/li>\n\n\n\n<li>Fortinet<\/li>\n\n\n\n<li>Check Point<\/li>\n\n\n\n<li>Cisco<\/li>\n\n\n\n<li>SonicWall<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-0cba5498\">\n\n<h2 class=\"gb-headline gb-headline-b90cc82f\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 62 43\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <path fill-rule=\"nonzero\" fill=\"#930cd3\" d=\"m55.316 20.68c-.081-5.837-4.854-10.561-10.71-10.561-1.321 0-2.632.247-3.857.72-.943-2.861-2.71-5.429-5.072-7.339-2.79-2.257-6.307-3.5-9.9-3.5-8.462 0-15.388 6.706-15.745 15.083-2.693.799-5.117 2.411-6.902 4.608-2.019 2.486-3.13 5.62-3.13 8.826 0 7.724 6.282 14.008 14.004 14.008h36.524c6.311 0 11.445-5.136 11.445-11.447 0-4.47-2.641-8.544-6.657-10.398zm-4.788 19.44h-36.524c-6.396 0-11.6-5.205-11.6-11.603 0-2.656.921-5.251 2.592-7.31 1.648-2.028 3.952-3.455 6.487-4.016.558-.124.951-.623.942-1.195l-.001-.04c-.001-.064-.002-.128-.002-.192 0-7.365 5.991-13.359 13.355-13.359 3.089 0 5.99 1.025 8.388 2.965 2.33 1.883 3.976 4.521 4.635 7.425.084.37.337.679.683.833.347.154.746.137 1.077-.049 1.232-.69 2.63-1.054 4.046-1.054 4.581 0 8.308 3.728 8.308 8.309 0 .167-.008.344-.021.559-.036.53.282 1.021.781 1.207 3.525 1.309 5.894 4.716 5.894 8.478 0 4.986-4.055 9.042-9.04 9.042z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Public Cloud<\/span><\/h2>\n\n\n\n<p>Compatibile con ...<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AWS<\/li>\n\n\n\n<li>Microsoft Azure<\/li>\n\n\n\n<li>Orca Security<\/li>\n\n\n\n<li>Google Cloud<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-ad4d4070\">\n\n<h2 class=\"gb-headline gb-headline-86cdc349\"><span class=\"gb-icon\"><svg xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 49 49\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <clippath id=\"a\">     <path d=\"m-1.71 49.169h50.88v-50.88h-50.88z\" clip-rule=\"nonzero\"><\/path>   <\/clippath>   <clippath id=\"b\">     <path d=\"m0 48.203h48.388v-48.203h-48.388z\" clip-rule=\"evenodd\"><\/path>   <\/clippath>   <g clip-path=\"url(#a)\">     <g clip-path=\"url(#b)\">       <path fill-rule=\"nonzero\" fill=\"#930cd3\" d=\"m24.193 0c-13.347 0-24.193 10.806-24.193 24.102s10.846 24.101 24.193 24.101c13.35 0 24.195-10.805 24.194-24.101 0-13.296-10.845-24.102-24.194-24.102zm0 2.41c12.041 0 21.775 9.697 21.775 21.692 0 5.662-2.187 10.794-5.746 14.653l-1.516-.485-2.036-.56-2.057-.475-2.079-.391-.302-.089-.264-.165-.214-.226-.151-.273-.071-.306.006-.306.085-.301.159-.269.512-.701.438-.744.738-1.468.653-1.502.571-1.54.488-1.573.395-1.584.312-1.611.222-1.629.137-1.633.042-1.639-.042-1.048-.141-1.047-.228-1.026-.32-1.002-.402-.97-.488-.936-.56-.886-.649-.833-.708-.776-.784-.707-.833-.64-.893-.569-.936-.486-.973-.399-1.006-.32-1.035-.227-1.044-.136-1.055-.047-1.052.047-1.044.136-1.037.227-1.006.32-.974.399-.935.486-.888.569-.836.64-.785.707-.709.776-.642.833-.567.886-.487.936-.402.97-.321 1.002-.227 1.026-.137 1.047-.047 1.048.043 1.639.137 1.633.222 1.629.312 1.611.397 1.584.486 1.573.577 1.54.647 1.502.737 1.468.44.744.51.701.161.269.085.301.009.306-.075.306-.152.273-.212.226-.265.165-.302.089-2.075.391-2.06.475-2.037.56-1.517.485c-3.557-3.859-5.746-8.991-5.746-14.653 0-11.995 9.735-21.692 21.774-21.692zm0 7.231.95.046.942.142.917.229.891.316.865.409.815.481.76.566.707.635.633.701.569.763.486.809.407.858.321.89.232.917.141.936.042.946-.036 1.513-.129 1.5-.208 1.492-.282 1.483-.369 1.464-.45 1.446-.524 1.412-.601 1.388-.675 1.351-.331.551-.383.532-.316.476-.24.522-.158.556-.066.574.034.574.117.565.21.537.292.503.369.443.429.386.486.306.541.226.556.136 1.976.372 1.966.452 1.937.532.24.075c-3.792 3.202-8.691 5.141-14.063 5.141-5.369 0-10.268-1.939-14.062-5.141l.241-.075 1.938-.532 1.965-.452 1.976-.372.557-.136.539-.226.487-.306.435-.386.364-.443.292-.503.214-.537.113-.565.032-.574-.066-.574-.156-.556-.242-.522-.316-.476-.382-.532-.331-.551-.676-1.351-.6-1.388-.524-1.412-.449-1.446-.364-1.464-.288-1.483-.208-1.492-.128-1.5-.038-1.513.048-.946.141-.936.227-.917.321-.89.407-.858.487-.809.567-.763.633-.701.709-.635.76-.567.819-.48.859-.409.893-.316.917-.229.94-.142z\"><\/path>     <\/g>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">Identity<\/span><\/h2>\n\n\n\n<p>Compatibile con ...<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Okta<\/li>\n\n\n\n<li>Duo<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-397ac017\">\n\n<h2 class=\"gb-headline gb-headline-df1f88f4\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 56 56\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <g fill-rule=\"nonzero\" fill=\"#930cd3\">     <path d=\"m18.56 17.001h4.426v3.085h-1.654c-.49 0-.888.398-.888.891s.398.892.888.892h12.397c.491 0 .888-.399.888-.892s-.397-.891-.888-.891h-1.654v-3.085h4.426c1.743 0 3.162-1.424 3.162-3.176v-10.65c0-1.751-1.419-3.175-3.162-3.175h-17.941c-1.743 0-3.161 1.424-3.161 3.175v10.65c0 1.752 1.418 3.176 3.161 3.176zm11.74 3.085h-5.538v-3.085h5.538zm-13.125-16.911c0-.767.622-1.392 1.385-1.392h17.941c.764 0 1.386.625 1.386 1.392v10.65c0 .767-.622 1.393-1.386 1.393h-17.941c-.763 0-1.385-.626-1.385-1.393z\"><\/path>     <path d=\"m21.102 33.425h-17.94c-1.743 0-3.162 1.424-3.162 3.176v10.649c0 1.751 1.419 3.176 3.162 3.176h4.426v3.085h-1.654c-.491 0-.888.399-.888.891 0 .493.397.892.888.892h12.396c.491 0 .888-.399.888-.892 0-.492-.397-.891-.888-.891h-1.653v-3.085h4.425c1.744 0 3.163-1.425 3.163-3.176v-10.649c0-1.752-1.419-3.176-3.163-3.176zm-6.201 20.086h-5.537v-3.085h5.537zm7.588-6.261c0 .768-.622 1.392-1.387 1.392h-17.94c-.764 0-1.386-.624-1.386-1.392v-10.649c0-.768.622-1.392 1.386-1.392h17.94c.765 0 1.387.624 1.387 1.392z\"><\/path>     <path d=\"m51.899 33.425h-17.94c-1.744 0-3.162 1.424-3.162 3.176v10.649c0 1.751 1.418 3.176 3.162 3.176h4.425v3.085h-1.653c-.491 0-.888.399-.888.891 0 .493.397.892.888.892h12.396c.492 0 .888-.399.888-.892 0-.492-.396-.891-.888-.891h-1.653v-3.085h4.425c1.744 0 3.163-1.425 3.163-3.176v-10.649c0-1.752-1.419-3.176-3.163-3.176zm-6.201 20.086h-5.537v-3.085h5.537zm7.588-6.261c0 .768-.622 1.392-1.387 1.392h-17.94c-.764 0-1.387-.624-1.387-1.392v-10.649c0-.768.623-1.392 1.387-1.392h17.94c.765 0 1.387.624 1.387 1.392z\"><\/path>     <path d=\"m42.041 30.749c0 .492.398.892.889.892.49 0 .888-.4.888-.892v-3.102c0-.493-.398-.892-.888-.892h-14.511v-2.21c0-.493-.398-.892-.888-.892s-.888.399-.888.892v2.21h-14.511c-.49 0-.888.399-.888.892v3.102c0 .492.398.892.888.892.491 0 .889-.4.889-.892v-2.21h29.02z\"><\/path>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">Network Security<\/span><\/h2>\n\n\n\n<p>Compatibile con ...<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Darktrace<\/li>\n\n\n\n<li>Forcepoint<\/li>\n\n\n\n<li>McAfee (web gateway)<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-f6062022\">\n\n<h2 class=\"gb-headline gb-headline-8854c324\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 55 41\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <path fill-rule=\"nonzero\" fill=\"#930cd3\" d=\"m49.189 0h-44.101c-2.81 0-5.088 2.287-5.088 5.108v30.65c0 2.822 2.278 5.108 5.088 5.108h44.101c2.81 0 5.088-2.286 5.088-5.108v-30.65c0-2.821-2.278-5.108-5.088-5.108zm3.392 35.001-16.043-16.107 16.043-10.264zm-47.493-33.298h44.101c1.87 0 3.392 1.528 3.392 3.405v1.504l-23.35 14.939c-1.264.809-2.878.784-4.112-.059l-23.423-15.984v-.4c0-1.877 1.522-3.405 3.392-3.405zm-3.392 5.862 16.269 11.102-16.269 16.334v-27.436zm47.493 31.599h-44.101c-1.397 0-2.598-.853-3.117-2.067l17.4-17.47 4.796 3.272c.921.628 1.985.943 3.052.943 1.013 0 2.029-.284 2.922-.855l4.954-3.17 17.211 17.28c-.519 1.214-1.72 2.067-3.117 2.067z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Email<\/span><\/h2>\n\n\n\n<p>Compatibile con ...<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Proofpoint<\/li>\n\n\n\n<li>Mimecast<\/li>\n<\/ul>\n\n<\/div>\n\n<div class=\"gb-container gb-container-d4da5acf\">\n\n<h2 class=\"gb-headline gb-headline-77d7ec14\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 57 51\" stroke-miterlimit=\"2\" stroke-linejoin=\"round\" fill-rule=\"evenodd\" clip-rule=\"evenodd\">   <g fill-rule=\"nonzero\" fill=\"#0ca406\">     <path d=\"m46.691 13.509h-21.831v-2.119c0-1.589-.616-3.082-1.735-4.204-1.119-1.124-2.606-1.742-4.188-1.742h-15.01c-2.166 0-3.927 1.769-3.927 3.943v36.46c0 2.37 1.921 4.299 4.282 4.299h42.409c2.361 0 4.281-1.929 4.281-4.299v-28.04c0-2.37-1.92-4.298-4.281-4.298zm2.519 32.338c0 1.395-1.129 2.53-2.519 2.53h-42.409c-1.39 0-2.52-1.135-2.52-2.53v-36.46c0-1.199.972-2.174 2.165-2.174h15.01c1.112 0 2.156.434 2.942 1.223s1.219 1.838 1.219 2.954v3.004c0 .489.394.884.881.884h22.712c1.39 0 2.519 1.134 2.519 2.529z\"><\/path>     <path d=\"m52.112 8.065h-21.829v-2.117c0-1.588-.616-3.081-1.736-4.206-1.103-1.107-2.629-1.742-4.187-1.742h-15.01c-2.167 0-3.928 1.769-3.928 3.943 0 .489.394.884.881.884.488 0 .881-.395.881-.884 0-1.199.972-2.174 2.166-2.174h15.01c1.094 0 2.167.446 2.941 1.224.787.79 1.22 1.84 1.22 2.955v3.001c0 .49.394.885.881.885h22.71c1.389 0 2.52 1.135 2.52 2.531v28.04c0 1.394-1.131 2.528-2.52 2.528-.487 0-.881.396-.881.885s.394.884.881.884c2.361 0 4.282-1.928 4.282-4.297v-28.04c0-2.371-1.921-4.3-4.282-4.3z\"><\/path>   <\/g> <\/svg><\/span><span class=\"gb-headline-text\">Conservazione dei dati per 1 anno<\/span><\/h2>\n\n\n\n<p>Memorizza i dati di tutti i prodotti Sophos e di tutti i prodotti di terze parti (non Sophos) nel Sophos Data Lake.<\/p>\n\n<\/div>\n<\/div>\n\n<div data-block=\"hook:108310\" class=\"alignfull\"><article id=\"post-108310\" class=\"post-108310\"><div class=\"entry-content is-layout-constrained\">\n<style>.avanet-ct-container{overflow-x:auto}.avanet-ct-container tr>th:first-child,.avanet-ct-container tr>td:first-child{position:relative;background-color:#FFFFFF;font-size:.8rem}.avanet-ct-container table,.avanet-ct-container th,.avanet-ct-container td{border:0}.avanet-ct-header{position:relative;width:220px;min-height:360px;padding:40px 20px 20px;border-right:1px solid rgb(232,235,236);background-color:#fff;display:flex;flex-direction:column;align-items:center;justify-content:space-between}.avanet-ct-cell-title{font-size:1.2rem;line-height:1.2rem;color:#475569;margin-bottom:0rem!important}.avanet-ct-container td,.avanet-ct-container th{vertical-align:top}.avanet-ct-row td,.avanet-ct-row th{border-bottom:1px solid rgb(232,235,236)}.avanet-ct-row td:nth-child(n+2){border-right:1px solid rgb(232,235,236);background:rgb(255,255,255);padding:20px 20px;font-size:.8rem}.avanet-ct-row th:nth-child(n+2){padding:0}.avanet-ct-row td:first-child{padding:20px 20px 20px 0;font-weight:600;color:#475569}.avanet-ct-row td:last-child,.avanet-ct-row th:last-child{border-right:none}.avanet-ct-row th:last-child .avanet-ct-header{border-right:none}.avanet-ct-row:last-child td{border-bottom:none}.avanet-ct-selected-product{width:146px;height:34px;color:rgb(255,255,255);font-size:14px;display:flex;align-items:center;justify-content:center;background:#f59e0b;position:absolute;border-radius:2px;top:-1rem;left:50%;transform:translateX(-50%);text-transform:uppercase}.avanet-ct-cta-button{display:inline-block;padding:5px 30px;background-color:#f4f4f5;border-radius:2px;color:#a1a1aa;text-decoration:none!important;font-weight:600;text-transform:uppercase;font-size:.8rem}.avanet-ct-header img{margin-bottom:0rem}.avanet-ct-spacer{height:1rem;background-color:#FFFFFF}@media screen and (min-width:1200px){.avanet-ct-container table{table-layout:fixed}.avanet-ct-container tr>th:first-child,.avanet-ct-container tr>td:first-child{position:relative;font-size:.8rem;width:180px}.avanet-ct-header{width:100%}.avanet-ct-cta-button{padding:5px 20px;font-size:.6rem}}@media screen and (min-width:768px) and (max-width:1199px){.avanet-ct-container tr>th:first-child,.avanet-ct-container tr>td:first-child{position:sticky;left:0;z-index:1}}<\/style>\n\n<h2 class=\"gb-headline gb-headline-522654b5 gb-headline-text\">Specifiche tecniche<\/h2>\n\n<p class=\"gb-headline gb-headline-2fcf27cb gb-headline-text\">Confrontate le funzionalit\u00e0 dei diversi prodotti <strong>Sophos per la protezione degli prodotti<\/strong> Sophos per la dei vostri clienti. Non siete sicuri di quale sia la protezione pi\u00f9 adatta alla vostra attivit\u00e0? Possiamo consigliarvi gratuitamente e senza alcun impegno.  <\/p>\n\n<div class=\"avanet-ct-container\" itemtype=\"http:\/\/schema.org\/Table\">\n  <table>\n    <thead>\n      <tr class=\"avanet-ct-row\">\n        <th><\/th>\n        <th>\n          <div class=\"avanet-ct-spacer\"><\/div>\n          <div class=\"avanet-ct-header\">\n            <p class=\"avanet-ct-cell-title\">Intercept X Essentials<\/p>\n            <img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-intercept-x-essentials-cover-600x600.png\" alt=\"Sophos Central Intercept X Essentials\"\/>\n            <a class=\"avanet-ct-cta-button\" href=\"https:\/\/www.avanet.com\/it\/shop\/sophos-central-intercept-x-essentials\/\">\n Al prodotto\n            <\/a>\n          <\/div>\n        <\/th>\n        <th>\n          <div class=\"avanet-ct-spacer\"><\/div>\n          <div class=\"avanet-ct-header\">\n            <p class=\"avanet-ct-cell-title\">Intercept X Advanced<\/p>\n            <img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-intercept-x-advanced-cover-600x600.png\" alt=\"Sophos Central Intercept X Advanced\"\/>\n            <a class=\"avanet-ct-cta-button\" href=\"https:\/\/www.avanet.com\/it\/shop\/sophos-central-intercept-x-advanced\/\">\n Al prodotto\n            <\/a>\n          <\/div>\n        <\/th>\n        <th>\n          <div class=\"avanet-ct-spacer\"><\/div>\n          <div class=\"avanet-ct-header\">\n            <p class=\"avanet-ct-cell-title\">Intercept X Advanced con XDR<\/p>\n            <img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-intercept-x-advanced-with-xdr-cover-600x600.png\" alt=\"Sophos Central Intercept X Advanced con XDR\"\/>\n            <a class=\"avanet-ct-cta-button\" href=\"https:\/\/www.avanet.com\/it\/shop\/sophos-central-intercept-x-advanced-con-xdr\/\">\n Al prodotto\n            <\/a>\n          <\/div>\n        <\/th>\n        <th>\n          <div class=\"avanet-ct-spacer\"><\/div>\n          <div class=\"avanet-ct-header\">\n            <p class=\"avanet-ct-cell-title\">Sophos MDR Essentials<\/p>\n            <img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-managed-detection-and-response-cover-600x600.png\" alt=\"Rilevamento e risposta gestiti da Sophos\"\/>\n            <a class=\"avanet-ct-cta-button\" href=\"https:\/\/www.avanet.com\/it\/shop\/sophos-central-managed-detection-and-response\/\">\n Al prodotto\n            <\/a>\n          <\/div>\n        <\/th>\n        <th>\n          <div class=\"avanet-ct-spacer\"><\/div>\n          <div class=\"avanet-ct-header\">\n            <span class=\"avanet-ct-selected-product\">Consigliato<\/span>\n            <p class=\"avanet-ct-cell-title\">Sophos MDR Complete<\/p>\n            <img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/www.avanet.com\/assets\/sophos-central-managed-detection-and-response-complete-cover-600x600.png\" alt=\"Sophos Managed Detection and Response Complete\"\/>\n            <a class=\"avanet-ct-cta-button\" href=\"https:\/\/www.avanet.com\/it\/shop\/sophos-central-managed-detection-and-response-complete\/\">\n Al prodotto\n            <\/a>\n          <\/div>\n        <\/th>\n      <\/tr>\n    <\/thead>\n    <tbody>\n      <!-- ROWS -->\n      <tr class=\"avanet-ct-row\">\n        <td>Diverse linee guida<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Aggiornamenti controllati<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Controllo dell'applicazione<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Controllo periferico<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Controllo Web\/Filtraggio URL per categoria<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Scarica la reputazione<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Sicurezza web<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Rilevamento di malware con apprendimento profondo<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Scansione dei file antimalware<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Protezione dal vivo<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Analisi comportamentale prima dell'esecuzione (HIPS)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Potente bloccante.\nApplicazioni indesiderate (PUA) <\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Sistema di prevenzione delle intrusioni (IPS)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Prevenzione della perdita di dati<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Analisi del comportamento in fase di esecuzione (HIPS)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Interfaccia di scansione antimalware (AMSI)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Rilevamento del traffico dannoso (MTD)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Prevenzione degli exploit<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Mitigazioni attive degli avversari<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Protezione dei file Ransomware (CryptoGuard)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Protezione dei dischi e dei record di avvio (WipeGuard)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Protezione Man-in-the-Browser (Navigazione sicura)<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Miglioramento del blocco delle applicazioni<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n  Live Discover (interrogazioni SQL trasversali all'ambiente per la ricerca di minacce e la conformit\u00e0 alla sicurezza)\n e la conformit\u00e0 alla sicurezza)\n \n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n  Libreria di query SQL (query preformulate e personalizzabili)\n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n  Memorizzazione dei dati su disco rigido (fino a 90 giorni) con\n accesso ai dati\n \n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Fonti di dati trasversali ai prodotti (ad es. firewall, e-mail)<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Query trasversali ai prodotti<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Sophos Data Lake (archiviazione dati in cloud)<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>30 giorni<\/td>\n        <td>90 giorni<\/td>\n        <td>90 giorni<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Query programmate<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Casi di minaccia (analisi delle cause)<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Analisi del malware con apprendimento profondo<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Dati avanzati sulle minacce dai SophosLabs on demand<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Esportazione di dati forensi<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Rimozione automatica del malware<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Heartbeat di sicurezza sincronizzato<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Sophos Clean<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n Live Response (accesso al terminale remoto per ulteriori analisi e Misure di risposta)\n \n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Isolamento degli endpoint su richiesta<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Con un solo clic \"Rimuovi e blocca<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>24 ore su 24, 7 giorni su 7, caccia alle minacce basata su prove<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Compatibile con gli strumenti di sicurezza di altri produttori<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Controlli sanitari di sicurezza<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Rapporti di attivit\u00e0<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Sophos MDR ThreatCast<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Rilevamento degli attacchi<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Fermare e contenere le minacce<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Assistenza telefonica diretta per gli incidenti<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Caccia alle minacce 24\/7 senza prove<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Gestione proattiva della postura di sicurezza<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n Risposta completa all'incidente: neutralizzazione completa di minacce\n \n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>\n Analisi delle cause - e come si possono prevenire nuovi attacchi?\n        <\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n      <tr class=\"avanet-ct-row\">\n        <td>Persona di contatto dedicata al Team di Risposta agli Incidenti<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>-<\/td>\n        <td>\u2714<\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/div>\n<\/div><\/article><\/div>\n\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-9133b606 ava-card-spacer\" id=\"avanet-services\">\n<div class=\"gb-container gb-container-62905ae0\">\n\n<h2 class=\"gb-headline gb-headline-8d5720e2\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 20 20\" fill=\"currentColor\" class=\"w-5 h-5\">   <path fill-rule=\"evenodd\" d=\"M9.661 2.237a.531.531 0 01.678 0 11.947 11.947 0 007.078 2.749.5.5 0 01.479.425c.069.52.104 1.05.104 1.59 0 5.162-3.26 9.563-7.834 11.256a.48.48 0 01-.332 0C5.26 16.564 2 12.163 2 7c0-.538.035-1.069.104-1.589a.5.5 0 01.48-.425 11.947 11.947 0 007.077-2.75zm4.196 5.954a.75.75 0 00-1.214-.882l-3.483 4.79-1.88-1.88a.75.75 0 10-1.06 1.061l2.5 2.5a.75.75 0 001.137-.089l4-5.5z\" clip-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Servizi Avanet<\/span><\/h2>\n\n\n\n<h2 class=\"gb-headline gb-headline-c000922f gb-headline-text\"><strong>Miglioriamo la<\/strong> vostra sicurezza<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-85bf1781 gb-headline-text\">I nostri servizi sono pensati per aiutarvi a far funzionare i vostri prodotti Sophos in modo sicuro e affidabile. Oltre al classico supporto per i firewall Sophos o per la piattaforma Central, offriamo i seguenti servizi, che possono essere richiesti in qualsiasi momento:<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-37947fc7\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Servizi di configurazione<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-a5890901\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Controllo della salute<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-469c99da\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Aggiornamenti<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-23394641\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Laboratori<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-bf0d08bf\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Migrazioni<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-0a3902cc\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Manutenzione del firewall<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-9b54ea89\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">SLA<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-d867028f\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M16.704 4.153a.75.75 0 01.143 1.052l-8 10.5a.75.75 0 01-1.127.075l-4.5-4.5a.75.75 0 011.06-1.06l3.894 3.893 7.48-9.817a.75.75 0 011.05-.143z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Audit di sicurezza<\/span><\/p>\n\n\n\n<a class=\"gb-button gb-button-a1b7de4e gb-button-text\" href=\"https:\/\/www.avanet.com\/it\/contatto\/\">Richiedi maggiori informazioni<\/a>\n\n<\/div>\n\n<div class=\"gb-container gb-container-7499e21c\">\n<div class=\"gb-container gb-container-5c65e230\">\n\n<h2 class=\"gb-headline gb-headline-87d289ed\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewbox=\"0 0 34 44\"><path d=\"m1.299.002c-.738.077-1.303.708-1.299 1.45v40.601c0 .795.655 1.45 1.45 1.45h30.934c.796 0 1.45-.655 1.45-1.45v-26.101c0-.006 0-.013 0-.02 0-.796-.654-1.45-1.45-1.45-.795 0-1.45.654-1.45 1.45v.02 24.651h-28.034v-37.701h18.367v8.217c0 .795.655 1.45 1.45 1.45h9.667.003c.796 0 1.451-.655 1.451-1.45 0-.385-.154-.755-.427-1.027l-9.667-9.667c-.272-.272-.642-.424-1.027-.423h-21.267c-.05-.003-.101-.003-.151 0zm22.868 4.939 4.728 4.728h-4.728zm-4.833 9.561c-3.72 0-6.767 3.047-6.767 6.767 0 1.031.294 1.978.71 2.855-.143.278-.311.617-.544 1.057-.527.996-1.25 2.317-1.963 3.64-1.428 2.647-2.855 5.287-2.855 5.287-.382.692-.13 1.576.559 1.964l4.35 2.416c.215.12.458.183.705.183.53 0 1.02-.291 1.273-.757l5.438-9.969c3.292-.45 5.861-3.266 5.861-6.676 0-3.72-3.047-6.767-6.767-6.767zm0 2.9c.192 0 .375.019.559.046-.308.588-.708 1.34-1.178 2.205-.151.234-.231.506-.231.784 0 .796.655 1.451 1.45 1.451.566 0 1.082-.331 1.318-.845.451-.829.832-1.541 1.148-2.145.504.653.801 1.473.801 2.371 0 2.153-1.714 3.867-3.867 3.867-.528.001-1.016.291-1.269.755l-5.105 9.35-1.813-1.012c.461-.848 1.087-2.016 2.175-4.033.716-1.327 1.43-2.646 1.964-3.655.267-.505.491-.928.649-1.239.079-.155.145-.284.197-.393.025-.054.046-.108.075-.181.015-.036.033-.072.061-.166.013-.047.029-.094.045-.227.008-.066.012-.158 0-.302-.012-.143-.226-.664-.227-.664-.393-.607-.619-1.321-.619-2.1 0-2.153 1.714-3.867 3.867-3.867z\" fill-rule=\"nonzero\"><\/path><\/svg><\/span><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-c8e59303 gb-headline-text\">Servizi di configurazione<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-849d50d0 gb-headline-text\">Desiderate che i vostri prodotti Sophos siano configurati da professionisti? Vi supportiamo durante la messa in funzione e la configurazione per un funzionamento senza problemi.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-919c66aa\">\n\n<h2 class=\"gb-headline gb-headline-b70595a3\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewbox=\"0 0 33 43\"><g fill-rule=\"nonzero\"><path d=\"m7.81 17.518c.327.327.763.509 1.235.509s.872-.182 1.235-.509c.69-.69.69-1.78 0-2.434l-4.359-4.322h24.411c.945 0 1.744-.763 1.744-1.744s-.763-1.744-1.744-1.744h-24.411l4.323-4.323c.69-.69.69-1.779 0-2.433-.69-.691-1.78-.691-2.434 0l-7.265 7.265c-.69.69-.69 1.78 0 2.434z\"><\/path><path d=\"m24.302 24.51c-.69-.691-1.78-.691-2.434 0-.69.69-.69 1.78 0 2.433l4.323 4.323h-24.447c-.945 0-1.744.763-1.744 1.744 0 .944.763 1.744 1.744 1.744h24.411l-4.323 4.322c-.69.691-.69 1.78 0 2.434.327.327.763.509 1.235.509s.872-.182 1.235-.509l7.265-7.301c.69-.691.69-1.78 0-2.434z\"><\/path><\/g><\/svg><\/span><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-a5c7ecbc gb-headline-text\">Migrazioni<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-99426999 gb-headline-text\">Volete passare dal vostro firewall SG (UTM) a un firewall XGS con il sistema operativo SFOS? Grazie alla nostra esperienza, siamo anche in grado di gestire il vostro passaggio di consegne senza alcuna preoccupazione.<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-547ef5b2\">\n<div class=\"gb-container gb-container-fe09310a\">\n\n<h2 class=\"gb-headline gb-headline-bd3b1646\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewbox=\"0 0 39 46\"><g><circle cx=\"6.354\" cy=\"6.354\" r=\"1.271\"><\/circle><circle cx=\"31.771\" cy=\"6.354\" r=\"1.271\"><\/circle><circle cx=\"31.771\" cy=\"34.313\" r=\"1.271\"><\/circle><circle cx=\"6.354\" cy=\"34.313\" r=\"1.271\"><\/circle><g fill-rule=\"nonzero\"><path d=\"m19.063 10.167c-5.606 0-10.167 4.56-10.167 10.166s4.561 10.167 10.167 10.167c5.605 0 10.166-4.561 10.166-10.167s-4.561-10.166-10.166-10.166zm-.854 14.505-4.493-4.493 1.797-1.797 2.696 2.696 4.493-4.493 1.797 1.797z\"><\/path><path d=\"m34.313 0h-30.501c-2.102 0-3.812 1.71-3.812 3.813v38.125c0 2.102 1.71 3.812 3.812 3.812h30.501c2.102 0 3.812-1.71 3.812-3.812v-38.126c0-2.102-1.71-3.812-3.812-3.812zm-24.146 43.208h-6.355c-.7 0-1.27-.57-1.27-1.27v-1.494c.398.142.824.223 1.27.223h6.355zm3.812 0h-1.271v-2.541h1.271zm3.813 0h-1.271v-2.541h1.271zm3.812 0h-1.271v-2.541h1.271zm3.813 0h-1.271v-2.541h1.271zm10.166-1.27c0 .7-.57 1.27-1.27 1.27h-6.355v-2.541h6.355c.446 0 .872-.081 1.27-.223zm0-38.126v33.042c0 .701-.57 1.271-1.27 1.271h-30.501c-.7 0-1.27-.57-1.27-1.271v-33.042c0-.7.57-1.27 1.27-1.27h30.501c.7 0 1.27.57 1.27 1.27z\"><\/path><\/g><\/g><\/svg><\/span><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-b2a78fde gb-headline-text\">Controllo della salute<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-d7a0b735 gb-headline-text\">Avete impostato voi stessi i vostri prodotti Sophos e volete che controlliamo la configurazione? Controlliamo le vostre impostazioni e vi forniamo le nostre raccomandazioni.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-9fe28494\">\n\n<h2 class=\"gb-headline gb-headline-aedf3cc2\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" clip-rule=\"evenodd\" fill-rule=\"evenodd\" stroke-linejoin=\"round\" stroke-miterlimit=\"2\" viewbox=\"0 0 49 60\"><path d=\"m22.586 4.304v-2.805c0-.822.677-1.499 1.499-1.499.823 0 1.499.677 1.499 1.499v2.805h21.087.007c.819.015 1.482.698 1.473 1.513v33.066c0 .822-.677 1.499-1.499 1.499h-14.283l7.015 14.711c.103.208.156.436.156.668 0 .822-.676 1.499-1.499 1.499-.586 0-1.122-.345-1.362-.873l-7.614-16.005h-3.481v17.668c0 .823-.676 1.499-1.499 1.499-.822 0-1.499-.676-1.499-1.499v-17.668h-3.488l-7.624 15.972c-.241.533-.773.878-1.36.881-.221 0-.439-.048-.644-.142-.52-.249-.853-.776-.853-1.353 0-.224.05-.446.147-.648l7.017-14.717h-14.282c-.822 0-1.499-.677-1.499-1.499v-33.073c0-.822.677-1.499 1.499-1.499zm-19.588 2.998v30.062h42.174v-30.062zm17.121 13.135c-.879-.961-1.374-2.223-1.374-3.54 0-2.879 2.369-5.248 5.248-5.248s5.248 2.369 5.248 5.248c0 1.317-.496 2.579-1.374 3.54 3.86 1.452 3.899 5.554 3.886 7.305v3.385c0 .822-.677 1.499-1.499 1.499h-12.523c-.822 0-1.499-.677-1.499-1.499v-3.385c0-1.753.048-5.852 3.887-7.305zm8.632 9.191-.022-1.886c0-1.884-.191-3.262-1.128-4.053-.619-.521-1.551-.769-2.921-.769h-1.421c-1.373 0-2.307.248-2.926.77-.938.79-1.129 2.168-1.129 4.052v1.886zm-4.758-14.973c-1.246 0-2.27 1.024-2.27 2.27 0 1.245 1.024 2.269 2.27 2.269h.014c1.239-.008 2.255-1.029 2.255-2.269 0-1.241-1.016-2.262-2.255-2.27z\" fill-rule=\"nonzero\"><\/path><\/svg><\/span><\/h2>\n\n\n\n<h3 class=\"gb-headline gb-headline-9fce7ef8 gb-headline-text\">Laboratori<\/h3>\n\n\n\n<p class=\"gb-headline gb-headline-fc658173 gb-headline-text\">Il vostro compito \u00e8 quello di conoscere i prodotti Sophos nella vostra azienda? Vi offriamo una formazione mirata e completamente personalizzata in base alle vostre esigenze.<\/p>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-a7fa59d1 ava-card-zero-margin\" id=\"info-materials\">\n<div class=\"gb-container gb-container-8aeebd39\">\n\n<p class=\"gb-headline gb-headline-8b3709cd\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M4.125 3C3.089 3 2.25 3.84 2.25 4.875V18a3 3 0 003 3h15a3 3 0 01-3-3V4.875C17.25 3.839 16.41 3 15.375 3H4.125zM12 9.75a.75.75 0 000 1.5h1.5a.75.75 0 000-1.5H12zm-.75-2.25a.75.75 0 01.75-.75h1.5a.75.75 0 010 1.5H12a.75.75 0 01-.75-.75zM6 12.75a.75.75 0 000 1.5h7.5a.75.75 0 000-1.5H6zm-.75 3.75a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5H6a.75.75 0 01-.75-.75zM6 6.75a.75.75 0 00-.75.75v3c0 .414.336.75.75.75h3a.75.75 0 00.75-.75v-3A.75.75 0 009 6.75H6z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M18.75 6.75h1.875c.621 0 1.125.504 1.125 1.125V18a1.5 1.5 0 01-3 0V6.75z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Materiale informativo<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-ae48c488 gb-headline-text\"><strong>Approfondite<\/strong> le vostre conoscenze e scoprite di pi\u00f9 su \u00abSophos Central Endpoint Protection\u00bb<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-bc37bd7b\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-central-it.pdf\">Sophos Central \u2013 Scheda dati<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-85a1944c\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-managed-detection-and-response-ds-it.pdf\">Sophos Managed Detection and Response (MDR) \u2013 Scheda dati<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-fb499f6c\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-managed-detection-and-response-br-it.pdf\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-managed-detection-and-response-br-it.pdf\">Sophos Managed Detection and Response (MDR) - Brochure della soluzione<\/a><\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-c1c993ca\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-mdr-services-buyers-guide-it.pdf\">Sophos Managed Detection and Response (MDR) \u2013 Guida all'acquisto<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-42159a0b\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-mdr-breach-protection-warranty-ds-it.pdf\">Sophos Breach Protection Warranty \u2013 Scheda dati<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-7204cb0e\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-rapid-response-ds-it.pdf\">Sophos Rapid Response \u2013 Scheda dati<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-8a0162a8\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-xdr-beginner-guide-it.pdf\">Extended Detection and Response (XDR) \u2013 Guida introduttiva<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-489e1c67\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-xdr-licensing-guide-en.pdf\">Sophos XDR \u2013 Guida alla licenza<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-6272d76b\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-xdr-use-cases-en.pdf\">Sophos XDR \u2013 Casi d'uso<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-07e816fa\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-network-detection-and-response-ds-it.pdf\">Sophos Network Detection and Response (NDR) \u2013 Scheda dati<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-1f137b06\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-network-detection-and-response-deskaid-en.pdf\">Sophos Network Detection and Response (NDR) \u2013 Breve descrizione<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-d7c98875\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-endpoint-buyers-guide-en.pdf\">Sophos Endpoint Security \u2013 Guida all'acquisto<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-ffb77489\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-security-cybersecurity-system-en.pdf\">Cybersecurity System \u2013 Guida all'acquisto<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-023feebb\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-en.pdf\">Sophos Intercept X \u2013 Scheda dati<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-7a7c7b98\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-solution-brief-en.pdf\">Sophos Intercept X \u2013 Breve descrizione<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-385de979\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-for-mac-it.pdf\">Sophos Intercept X per macOS<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-19ae20bb\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-deep-learning-en.pdf\">Sophos Intercept X Deep Learning<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-f2fcb6b2\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-intercept-x-essentials-faq-it.pdf\">Domande frequenti su Intercept X Essentials e Intercept X Essentials for Server<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-621f9a29\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/www.avanet.com\/assets\/sophos-endpoint-license-guide-en.pdf\">Panoramica delle funzioni di Sophos Intercept X, XDR e MTR<\/a><\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-cf221c9f\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-6 h-6\" fill=\"currentColor\" viewbox=\"0 0 24 24\">   <path clip-rule=\"evenodd\" d=\"M5.625 1.5c-1.036 0-1.875.84-1.875 1.875v17.25c0 1.035.84 1.875 1.875 1.875h12.75c1.035 0 1.875-.84 1.875-1.875V12.75A3.75 3.75 0 0016.5 9h-1.875a1.875 1.875 0 01-1.875-1.875V5.25A3.75 3.75 0 009 1.5H5.625zM7.5 15a.75.75 0 01.75-.75h7.5a.75.75 0 010 1.5h-7.5A.75.75 0 017.5 15zm.75 2.25a.75.75 0 000 1.5H12a.75.75 0 000-1.5H8.25z\" fill-rule=\"evenodd\"><\/path>   <path d=\"M12.971 1.816A5.23 5.23 0 0114.25 5.25v1.875c0 .207.168.375.375.375H16.5a5.23 5.23 0 013.434 1.279 9.768 9.768 0 00-6.963-6.963z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><a href=\"https:\/\/support.sophos.com\/support\/s\/article\/KB-000035144?language=en_US\" target=\"_blank\" data-type=\"URL\" rel=\"noreferrer noopener nofollow\">Sophos Central Windows Endpoint: Requisiti di sistema<\/a><\/span><\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-7346e745\">\n\n<figure class=\"gb-block-image gb-block-image-b8173d28\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"1074\" class=\"gb-image gb-image-b8173d28\" src=\"https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection.png\" alt=\"Info Materials Sophos Central Endpoint and Server Protection Hero Image\" title=\"sophos-assets-central-endpoint-and-server-protection\" srcset=\"https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection.png 1280w, https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection-64x54.png 64w, https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection-300x252.png 300w, https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection-1024x859.png 1024w, https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection-768x644.png 768w, https:\/\/www.avanet.com\/assets\/sophos-assets-central-endpoint-and-server-protection-600x503.png 600w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n<\/div>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-shadow-bottom\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer ava-card-spacer\"><\/div>\n<div class=\"gb-container gb-container-7c6db709 ava-card-zero-margin ava-card-spacer\">\n<div class=\"gb-container gb-container-71364037\" id=\"education-government\">\n\n<p class=\"gb-headline gb-headline-61672cc7\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M9.674 2.075a.75.75 0 01.652 0l7.25 3.5A.75.75 0 0117 6.957V16.5h.25a.75.75 0 010 1.5H2.75a.75.75 0 010-1.5H3V6.957a.75.75 0 01-.576-1.382l7.25-3.5zM11 6a1 1 0 11-2 0 1 1 0 012 0zM7.5 9.75a.75.75 0 00-1.5 0v5.5a.75.75 0 001.5 0v-5.5zm3.25 0a.75.75 0 00-1.5 0v5.5a.75.75 0 001.5 0v-5.5zm3.25 0a.75.75 0 00-1.5 0v5.5a.75.75 0 001.5 0v-5.5z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">ISTRUZIONE E GOVERNO<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-ec41806a gb-headline-text\">Premi speciali per istituzioni educative e governative<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-9b651157 gb-headline-text\">Sophos offre sconti speciali per le scuole e le istituzioni governative, per soddisfare specifiche esigenze di budget. Ci si pu\u00f2 aspettare almeno uno sconto del <strong>20&nbsp;%<\/strong>.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-7dc152d1 gb-headline-text\">Chiedetecelo e prepareremo per voi un'offerta completamente gratuita e senza impegno.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-896d83be gb-headline-text\">* I prezzi speciali per le istituzioni scolastiche e governative sono disponibili solo nella regione DACH.<\/p>\n\n\n\n<a class=\"gb-button gb-button-27b36d7e gb-button-text\" href=\"https:\/\/www.avanet.com\/it\/contatto\/\">Richiedi prezzi speciali<\/a>\n\n<\/div>\n\n<div class=\"gb-container gb-container-0ee14872\" id=\"trial-version\">\n\n<p class=\"gb-headline gb-headline-e79d319c\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path clip-rule=\"evenodd\" d=\"M10 1a.75.75 0 01.75.75v1.5a.75.75 0 01-1.5 0v-1.5A.75.75 0 0110 1zM5.05 3.05a.75.75 0 011.06 0l1.062 1.06A.75.75 0 116.11 5.173L5.05 4.11a.75.75 0 010-1.06zm9.9 0a.75.75 0 010 1.06l-1.06 1.062a.75.75 0 01-1.062-1.061l1.061-1.06a.75.75 0 011.06 0zM3 8a.75.75 0 01.75-.75h1.5a.75.75 0 010 1.5h-1.5A.75.75 0 013 8zm11 0a.75.75 0 01.75-.75h1.5a.75.75 0 010 1.5h-1.5A.75.75 0 0114 8zm-6.828 2.828a.75.75 0 010 1.061L6.11 12.95a.75.75 0 01-1.06-1.06l1.06-1.06a.75.75 0 011.06 0zm3.594-3.317a.75.75 0 00-1.37.364l-.492 6.861a.75.75 0 001.204.65l1.043-.799.985 3.678a.75.75 0 001.45-.388l-.978-3.646 1.292.204a.75.75 0 00.74-1.16l-3.874-5.764z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Versione di prova<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-7d901e07 gb-headline-text\">Prova <strong>gratuitamente<\/strong> Sophos Central<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-50c18159 gb-headline-text\">Prova gratuitamente <strong>per 30 giorni<\/strong> la potente piattaforma per la gestione centralizzata della sicurezza.  <\/p>\n\n\n\n<p class=\"gb-headline gb-headline-dbbe2354\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"size-4\" fill=\"currentColor\" viewbox=\"0 0 16 16\">   <path clip-rule=\"evenodd\" d=\"M8 15A7 7 0 1 0 8 1a7 7 0 0 0 0 14Zm3.844-8.791a.75.75 0 0 0-1.188-.918l-3.7 4.79-1.649-1.833a.75.75 0 1 0-1.114 1.004l2.25 2.5a.75.75 0 0 0 1.15-.043l4.25-5.5Z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><strong>Tutti i prodotti<\/strong> - Prova il pacchetto di protezione completo, compresa la protezione XDR per endpoint, e-mail, dispositivi mobili e server.<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-fae0bf75\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"size-4\" fill=\"currentColor\" viewbox=\"0 0 16 16\">   <path clip-rule=\"evenodd\" d=\"M8 15A7 7 0 1 0 8 1a7 7 0 0 0 0 14Zm3.844-8.791a.75.75 0 0 0-1.188-.918l-3.7 4.79-1.649-1.833a.75.75 0 1 0-1.114 1.004l2.25 2.5a.75.75 0 0 0 1.15-.043l4.25-5.5Z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><strong>Un'unica console<\/strong>: lavora in modo efficiente gestendo tutti i prodotti Sophos da un'unica piattaforma cloud.<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-47c98d5f\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"size-4\" fill=\"currentColor\" viewbox=\"0 0 16 16\">   <path clip-rule=\"evenodd\" d=\"M8 15A7 7 0 1 0 8 1a7 7 0 0 0 0 14Zm3.844-8.791a.75.75 0 0 0-1.188-.918l-3.7 4.79-1.649-1.833a.75.75 0 1 0-1.114 1.004l2.25 2.5a.75.75 0 0 0 1.15-.043l4.25-5.5Z\" fill-rule=\"evenodd\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\"><strong>Accesso immediato<\/strong> - pronto all'uso in pochi minuti.<\/span><\/p>\n\n\n<div class=\"gb-container gb-container-2f4b592c\">\n\n<a class=\"gb-button gb-button-3879b29b gb-button-text\" href=\"https:\/\/cloud.sophos.com\/manage\/login\" target=\"_blank\" rel=\"noopener\">Demo online<\/a>\n\n\n\n<a class=\"gb-button gb-button-4dfceed4\" href=\"https:\/\/www.sophos.com\/it-it\/products\/sophos-central\/free-trial?id=0013000001EjyeY\" target=\"_blank\" rel=\"noopener\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"w-5 h-5\" fill=\"currentColor\" viewbox=\"0 0 20 20\">   <path d=\"M10.75 2.75a.75.75 0 00-1.5 0v8.614L6.295 8.235a.75.75 0 10-1.09 1.03l4.25 4.5a.75.75 0 001.09 0l4.25-4.5a.75.75 0 00-1.09-1.03l-2.955 3.129V2.75z\"><\/path>   <path d=\"M3.5 12.75a.75.75 0 00-1.5 0v2.5A2.75 2.75 0 004.75 18h10.5A2.75 2.75 0 0018 15.25v-2.5a.75.75 0 00-1.5 0v2.5c0 .69-.56 1.25-1.25 1.25H4.75c-.69 0-1.25-.56-1.25-1.25v-2.5z\"><\/path> <\/svg><\/span><span class=\"gb-button-text\">Apri un account gratuito<\/span><\/a>\n\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-6c30642c gb-headline-text\">Utilizza i seguenti dati di accesso per iniziare la tua demo online. <strong>Nome utente<\/strong>: demo@sophos.com \/ <strong>Password<\/strong>: Demo@sophos.com<\/p>\n\n<\/div>\n<\/div><div class=\"gb-container gb-container-6291cecc ava-card-spacer last\" id=\"help-for-buying\">\n\n<p class=\"gb-headline gb-headline-04e182da\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 20 20\" fill=\"currentColor\" class=\"w-5 h-5\">   <path d=\"M3.505 2.365A41.369 41.369 0 019 2c1.863 0 3.697.124 5.495.365 1.247.167 2.18 1.108 2.435 2.268a4.45 4.45 0 00-.577-.069 43.141 43.141 0 00-4.706 0C9.229 4.696 7.5 6.727 7.5 8.998v2.24c0 1.413.67 2.735 1.76 3.562l-2.98 2.98A.75.75 0 015 17.25v-3.443c-.501-.048-1-.106-1.495-.172C2.033 13.438 1 12.162 1 10.72V5.28c0-1.441 1.033-2.717 2.505-2.914z\"><\/path>   <path d=\"M14 6c-.762 0-1.52.02-2.271.062C10.157 6.148 9 7.472 9 8.998v2.24c0 1.519 1.147 2.839 2.71 2.935.214.013.428.024.642.034.2.009.385.09.518.224l2.35 2.35a.75.75 0 001.28-.531v-2.07c1.453-.195 2.5-1.463 2.5-2.915V8.998c0-1.526-1.157-2.85-2.729-2.936A41.645 41.645 0 0014 6z\"><\/path> <\/svg><\/span><span class=\"gb-headline-text\">Aiuto per l'acquisto<\/span><\/p>\n\n\n\n<h2 class=\"gb-headline gb-headline-a74d99bb gb-headline-text\">Ci sono <strong>domande sul prodotto<\/strong>?<\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-c5a9534f gb-headline-text\">Chiedete di nuovo prima di acquistare, prima di ritrovarvi con il prodotto sbagliato.<\/p>\n\n\n\n<a class=\"gb-button gb-button-7a0bb7da gb-button-text\" href=\"https:\/\/www.avanet.com\/it\/contatto\/\">Fai una domanda<\/a>\n\n<\/div><\/div><\/article><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":99136,"template":"","meta":{"_acf_changed":false},"product_brand":[],"product_cat":[598],"product_tag":[],"class_list":{"0":"post-88847","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-uncategorized","8":"first","9":"instock","10":"taxable","11":"shipping-taxable","12":"purchasable","13":"product-type-variable","14":"has-default-attributes"},"acf":[],"_links":{"self":[{"href":"https:\/\/www.avanet.com\/it\/wp-json\/wp\/v2\/product\/88847","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.avanet.com\/it\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.avanet.com\/it\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.avanet.com\/it\/wp-json\/wp\/v2\/media\/99136"}],"wp:attachment":[{"href":"https:\/\/www.avanet.com\/it\/wp-json\/wp\/v2\/media?parent=88847"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.avanet.com\/it\/wp-json\/wp\/v2\/product_brand?post=88847"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.avanet.com\/it\/wp-json\/wp\/v2\/product_cat?post=88847"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.avanet.com\/it\/wp-json\/wp\/v2\/product_tag?post=88847"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}