{"id":26134,"date":"2022-07-29T08:26:40","date_gmt":"2022-07-29T08:26:40","guid":{"rendered":"https:\/\/wegg.it\/?p=26134"},"modified":"2024-02-02T09:43:13","modified_gmt":"2024-02-02T09:43:13","slug":"eliminare-password-approccio-zero-trust","status":"publish","type":"post","link":"https:\/\/wegg.it\/eng\/eliminare-password-approccio-zero-trust\/","title":{"rendered":"Eliminare le password con un approccio Zero Trust"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26134\" class=\"elementor elementor-26134\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-53e0c95 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53e0c95\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-531edbf\" data-id=\"531edbf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8bb2f54 elementor-hidden-mobile elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8bb2f54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Livello_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 92.25 92.25\" style=\"enable-background:new 0 0 92.25 92.25;\" xml:space=\"preserve\"><polygon points=\"90.25,2.93 90.25,88.84 1.41,0 0,1.41 88.84,90.25 2.93,90.25 2.93,92.25 92.25,92.25 92.25,2.93 \"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5ee191b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5ee191b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2c6e3a6\" data-id=\"2c6e3a6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20926b3 elementor-widget elementor-widget-image\" data-id=\"20926b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/charlesdeluvio-Lks7vei-eAg--1024x683.jpg\" class=\"attachment-large size-large wp-image-26137\" alt=\"\" srcset=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/charlesdeluvio-Lks7vei-eAg--1024x683.jpg 1024w, https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/charlesdeluvio-Lks7vei-eAg--300x200.jpg 300w, https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/charlesdeluvio-Lks7vei-eAg--768x512.jpg 768w, https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/charlesdeluvio-Lks7vei-eAg--1536x1024.jpg 1536w, https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/charlesdeluvio-Lks7vei-eAg-.jpg 1587w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-025de72 elementor-widget elementor-widget-post-info\" data-id=\"025de72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-8dd652e elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/wegg.it\/eng\/2022\/07\/29\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>July 29, 2022<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3e7748 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"a3e7748\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Eliminare le password con un approccio Zero Trust<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71e4747 elementor-widget elementor-widget-text-editor\" data-id=\"71e4747\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<article>\n<div class=\"l\">\n<div class=\"l\"><section>\n<div class=\"kn lz oq or os\"><article>\n<div class=\"l\">\n<div class=\"l\"><section>\n<div class=\"is it iu iv iw\"><article>\n<div class=\"l\">\n<div class=\"l\"><section>\n<div class=\"is it iu iv iw\">\n<p id=\"dd49\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\"><em class=\"lw\">Perch\u00e9 le <strong>password<\/strong> sono una <strong>minaccia alla sicurezza<\/strong> e in che modo le aziende possono rendere pi\u00f9 sicure le loro postazioni con un <strong>approccio Zero Trust.\u00a0<\/strong><\/em><\/p>\n\n<article>\n<div class=\"l\">\n<div class=\"l\"><section>\n<div>\n<div class=\"is it iu iv iw\">\n<p id=\"5f71\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\">Tutti odiano le password. Anche tu, ammettilo!<\/p>\nSono una perdita di tempo: difficili da ricordare (soprattutto quelle consigliate, composte da una combinazione di lettere, numeri, maiuscole e simboli), lunghe da inserire e fastidiose da reimpostare. Ma, soprattutto, sono\u00a0<strong class=\"lc ja\">una delle principali fonti di violazione<\/strong>\u00a0dei dati aziendali sul cloud.\n<p id=\"4042\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\">Da quando i dipendenti hanno cominciato a\u00a0<strong class=\"lc ja\">lavorare in mobilit\u00e0,\u00a0<\/strong>e quindi al di fuori del perimetro IT aziendale, la sicurezza basata sulla password non \u00e8 pi\u00f9 sufficiente. L\u2019accesso alle informazioni avviene da una variet\u00e0 di\u00a0<strong class=\"lc ja\">dispositivi, applicazioni<\/strong>,\u00a0<strong class=\"lc ja\">reti, luoghi e servizi<\/strong>\u00a0<strong class=\"lc ja\">non attendibili<\/strong>. Basta pensare che solo il\u00a0<strong class=\"lc ja\">75% degli utenti<\/strong>\u00a0usa la VPN aziendale, molti si collegano da reti non sicure come wi-fi pubblico nei caff\u00e8 o nelle piazze.<\/p>\nLa verifica avviene sull\u2019<strong class=\"lc ja\">utente<\/strong>, non sul contesto (dispositivo, app o rete utilizzata). Una volta rubata o compromessa la password, non ci sono altre \u201c<strong class=\"lc ja\">barriere<\/strong>\u201d all\u2019ingresso delle minacce.\n<p id=\"3b3b\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\">La cosa assurda \u00e8 che le aziende stanno effettuando grandi investimenti e spendendo tanto per la sicurezza (<strong class=\"lc ja\">120 miliardi all\u2019anno<\/strong>, secondo Forrester), eppure due terzi di esse subiscono lo stesso delle violazioni durante l\u2019anno (<strong class=\"lc ja\">data breach<\/strong>). Il motivo \u00e8 da individuarsi proprio nelle password. Secondo Verizon Data Breaches Investigations, l\u201981% delle violazioni riguarda\u00a0<strong class=\"lc ja\">password deboli o rubate<\/strong>.<\/p>\n\n<h2 id=\"14af\" class=\"lw lx iz bn ly lz ma mb mc md me mf mg kf mh kg mi ki mj kj mk kl ml km mm mn gb\"><strong class=\"ba\">Vivere in un mondo password-less<\/strong><\/h2>\n<p id=\"ebb5\" class=\"pw-post-body-paragraph la lb iz lc b ld mo ka lf lg mp kd li lj mq ll lm ln mr lp lq lr ms lt lu lv is gb\" data-selectable-paragraph=\"\">La stragrande maggioranza delle aziende, infatti, per autenticare gli utenti usa ancora\u00a0<strong class=\"lc ja\">tecnologie tradizionali<\/strong>\u00a0come le password. Anche metodi di autenticazione pi\u00f9 avanzati come il\u00a0<strong class=\"lc ja\">Single-Sign On<\/strong>\u00a0comunque richiedono ancora la password.<\/p>\n<p id=\"403f\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\">Se non si vuole essere esposti a rischi, non si pu\u00f2 fare affidamento solo su\u00a0<strong class=\"lc ja\">password e identit\u00e0<\/strong>. Ecco perch\u00e9 la sicurezza va ripensata con l\u2019approccio \u201c<strong class=\"lc ja\">zero trust<\/strong>\u201d. Questo framework, introdotto da Forrester pi\u00f9 di qualche anno fa, presuppone che i fattori di rischio siano gi\u00e0 presenti sulla rete e l\u2019accesso sicuro \u00e8 determinato da un approccio \u201c<strong class=\"lc ja\">never trust, always verify<\/strong>\u201d.<\/p>\n<p id=\"bd8b\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\">Controllare sempre. Mai fidarsi. Prima di prendere una\u00a0<strong class=\"lc ja\">decisione di accesso<\/strong>, il sistema deve verificare una\u00a0<strong class=\"lc ja\">serie di attributi<\/strong>\u00a0dell\u2019ambiente come l\u2019utente, il dispositivo, l\u2019app, la rete e lo stato delle minacce. Una delle tecnologie che rientrano in questo framework \u00e8 lo\u00a0<strong class=\"lc ja\">Zero Sign On<\/strong>\u00a0(ZSO), in grado di \u201cuccidere\u201d le password.<\/p>\nParliamo di una\u00a0<strong class=\"lc ja\">tecnologia mobile-centric<\/strong>, perch\u00e9 rende il dispositivo mobile il\u00a0<strong class=\"lc ja\">fattore primario<\/strong>\u00a0per l\u2019autenticazione degli utenti. Prima di abilitare l\u2019accesso, verifica il\u00a0<strong class=\"lc ja\">certificato d\u2019identit\u00e0<\/strong>\u00a0sul dispositivo e tutto il contesto di background. La sicurezza viene, quindi, applicata a\u00a0<strong class=\"lc ja\">livello di dispositivo e app<\/strong>, ovvero da dove\u00a0<strong class=\"lc ja\">vengono consumati e fruiti i dati<\/strong>.\n<p id=\"cb7a\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\">L\u2019utente, allo stesso tempo, pu\u00f2 accedere alle risorse aziendali senza dover\u00a0<strong class=\"lc ja\">inserire una password<\/strong>. Pu\u00f2 farlo da qualsiasi dispositivo (anche non aziendale), sistema operativo, luogo o app\u2026 la sicurezza \u00e8 sempre\u00a0<strong class=\"lc ja\">verificata\u00a0<\/strong>prima dell\u2019accesso!<\/p>\n\n<h2 id=\"d378\" class=\"lw lx iz bn ly lz ma mb mc md me mf mg kf mh kg mi ki mj kj mk kl ml km mm mn gb\"><strong class=\"ba\">Tutti i vantaggi di una tecnologia password-less<\/strong><\/h2>\n<p id=\"42aa\" class=\"pw-post-body-paragraph la lb iz lc b ld mo ka lf lg mp kd li lj mq ll lm ln mr lp lq lr ms lt lu lv is gb\" data-selectable-paragraph=\"\">Una tale tecnologia offre vantaggi innegabili:<\/p>\n<p id=\"3a32\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\">\u25cf <strong>r<\/strong><strong class=\"lc ja\">iduce il rischio di data breach<\/strong><\/p>\n<p id=\"28d8\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\">Eliminando le password, si riduce il\u00a0<strong class=\"lc ja\">rischio di violazioni<\/strong>. Tra l\u2019altro sappiamo benissimo che queste ultime hanno un costo altissimo, tra dati rubati e danni di reputazione: che si aggira, secondo una ricerca di IBM, su\u00a0<strong class=\"lc ja\">3.86 milioni di dollari americani<\/strong>. Con lo Zero Sign On, l\u2019azienda pu\u00f2 fornire un accesso senza password sicuro a qualsiasi app aziendale o servizio cloud, come\u00a0<strong class=\"lc ja\">Microsoft Office 365 o Salesforce<\/strong>.<\/p>\n<p id=\"8f8c\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\">\u25cf <strong>r<\/strong><strong class=\"lc ja\">iduce tempo e costi di help desk<\/strong><\/p>\n<p id=\"bd91\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\">Dimenticata la password? No problem, non serve pi\u00f9 scrivere all\u2019help desk. Senza password, utenti e azienda risparmiano il tempo speso a\u00a0<strong class=\"lc ja\">seguire e impostare procedure<\/strong>\u00a0in risoluzione di questo problema.<\/p>\n<p id=\"4985\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\">\u25cf <strong>m<\/strong><strong class=\"lc ja\">igliora l\u2019esperienza utente<\/strong><\/p>\n<p id=\"d359\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\">L\u2019accesso alle risorse aziendali avviene\u00a0<strong class=\"lc ja\">senza frizioni<\/strong>. Non serve pi\u00f9 memorizzare, inserire o resettare password. Oltre a velocizzare l\u2019accesso alle risorse aziendali, rende anche pi\u00f9 attrattivo il lavoro per i dipendenti.<\/p>\n<p id=\"1ea5\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\">Sapere che si pu\u00f2 accedere in sicurezza da qualsiasi posto e da qualsiasi dispositivo (anche quelli personali) \u00e8 un fattore discriminante nella scelta di un lavoro, perch\u00e9 c\u2019\u00e8 la possibilit\u00e0 di\u00a0<strong class=\"lc ja\">lavorare in full-remote<\/strong>\u00a0senza problemi. Per di pi\u00f9 oggi\u00a0<strong class=\"lc ja\">molti talenti<\/strong>\u00a0lo richiedono a chi li assume.<\/p>\n\n<h2 id=\"3274\" class=\"lw lx iz bn ly lz ma mb mc md me mf mg kf mh kg mi ki mj kj mk kl ml km mm mn gb\"><strong class=\"ba\">Il ruolo dell\u2019IT e del business<\/strong><\/h2>\n<p id=\"62db\" class=\"pw-post-body-paragraph la lb iz lc b ld mo ka lf lg mp kd li lj mq ll lm ln mr lp lq lr ms lt lu lv is gb\" data-selectable-paragraph=\"\">I team che si occupano di gestire l\u2019infrastruttura aziendale hanno anche il compito di\u00a0<strong class=\"lc ja\">predisporre i dispositivi per gli utenti<\/strong>, in modo che siano gi\u00e0 configurati con le risorse e le applicazioni aziendali che servono per lavorare.<\/p>\n<p id=\"6a51\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\">Per velocizzare questo processo, spesso l\u2019IT usa strumenti\u00a0<strong class=\"lc ja\">UEM (Unified Endpoint Management)<\/strong>\u00a0che mediante una console unica permettono di gestire, proteggere e distribuire gli applicativi su qualsiasi dispositivo<strong class=\"lc ja\">.<\/strong>\u00a0Non tutti gli strumenti presenti sul mercato per\u00f2 permettono di gestire in maniera unica i\u00a0<strong class=\"lc ja\">sistemi operativi<\/strong>\u00a0tipici della mobilit\u00e0 (iOS, Android) e sono richiesti altri tool aggiuntivi, come i\u00a0<strong class=\"lc ja\">MDM<\/strong>\u00a0(Mobile Device Management).<\/p>\n<p id=\"2d96\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\">Nella scelta, vanno considerati\u00a0<strong class=\"lc ja\">due elementi<\/strong>: il fatto che sia una\u00a0<strong class=\"lc ja\">piattaforma UEM mobile centrica<\/strong>, ovvero che permetta di gestire in maniera ottimale qualsiasi dispositivo aziendale e che adotti un\u00a0<strong class=\"lc ja\">approccio Zero Trust.<\/strong><\/p>\n<p id=\"6fbc\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\">Anche le\u00a0<strong class=\"lc ja\">linee di business<\/strong>\u00a0devono avere voce in capitolo:\u00a0<strong class=\"lc ja\">un solo strumento<\/strong>\u00a0per garantire l\u2019accesso sicuro, la protezione totale dei dati aziendali e un\u2019UX eccezionale per l\u2019utente finale. I vantaggi ricadono in primis sul\u00a0<strong class=\"lc ja\">business<\/strong>, per cui \u00e8 indispensabile conoscere queste tematiche cos\u00ec importanti.<\/p>\n<p id=\"7f98\" class=\"pw-post-body-paragraph la lb iz lc b ld le ka lf lg lh kd li lj lk ll lm ln lo lp lq lr ls lt lu lv is gb\" data-selectable-paragraph=\"\">Con sistemi Zero Sign On e livelli di sicurezza aggiuntivi come autenticazione multifattore, applicazioni integrate di identificazione e risoluzione delle minacce, QR Code per autenticare con la biometria i dispositivi non gestiti, dimenticarsi la password \u00e8\u00a0<strong class=\"lc ja\">d\u2019obbligo!<\/strong><\/p>\n\n<\/div>\n<\/div>\n<\/section><\/div>\n<\/div>\n<\/article><\/div>\n<\/section><\/div>\n<\/div>\n<\/article><\/div>\n<\/section><\/div>\n<\/div>\n<\/article><\/div>\n<\/section><\/div>\n<\/div>\n<\/article>\n<p id=\"f7d7\" class=\"pw-subtitle-paragraph jw iy iz bn b jx jy jz ka kb kc kd ke kf kg kh ki kj kk kl km kn co\"><em>*L&#8217;articolo, a firma Camilla Bottin, \u00e8 stato originariamente pubblicato su <a href=\"https:\/\/medium.com\/catobistrategy\/dimenticati-la-password-letteralmente-b954fbc4bd8f\"<a href=\"https:\/\/medium.com\/catobistrategy\/sei-in-grado-di-gestire-da-remoto-tutti-i-tuoi-device-d64ecd85b01a\" \n rel=\"dofollow\">Catobium &#8211; Il Magazine dei Writers di Catobi.\u00a0<\/a><\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d4c0349\" data-id=\"d4c0349\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54a6278 elementor-widget elementor-widget-text-editor\" data-id=\"54a6278\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Approfondimenti<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dceb23 elementor-grid-1 elementor-posts--thumbnail-none elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-posts\" data-id=\"6dceb23\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;classic_columns&quot;:&quot;1&quot;,&quot;classic_columns_tablet&quot;:&quot;2&quot;,&quot;classic_columns_mobile&quot;:&quot;1&quot;,&quot;classic_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;classic_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;classic_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.classic\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-classic elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-37464 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti category-asset-management category-riduzione-spesa-it category-spend-optimization tag-compliance tag-contratti-sap tag-fue tag-riduzione-spesa tag-rise-with-sap tag-sap tag-sap-s-4-hana tag-sap-s-4-hana-cloud tag-software-asset-management\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/licensing-rise-with-sap-tutti-gli-elementi-da-considerare\/\" >\n\t\t\t\tLicensing Rise with SAP: tutti gli elementi da considerare\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-35956 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti category-asset-management category-riduzione-non-conformita category-riduzione-spesa-it category-spend-optimization tag-cloud tag-compliance tag-ibm tag-licenze-ibm tag-price-hike tag-spend-optimization\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/software-servizi-cloud-ibm-rincaro-prezzi-2024\/\" >\n\t\t\t\tSoftware e servizi cloud IBM: prepariamoci a un rincaro dei prezzi\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-38750 post type-post status-publish format-standard has-post-thumbnail hentry category-agile-support category-asset-management category-business-process-management category-cloud-management category-digital-experience category-digitalizzazione-processi category-facilitare-adozione-digitale category-financial-management category-gestione-asset-it category-live-event category-migliorare-erogazione-servizi category-news category-riduzione-spesa-it category-risk-avoidance category-spend-optimization tag-adozione-digitale tag-digitalizzazione-dei-processi tag-gestione-dei-processi-aziendali tag-innovazione-aziendale tag-low-code-development tag-mendix tag-transformazione-digitale\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/low-code-day-italy-innovazione-e-digitalizzazione-nei-processi-aziendali\/\" >\n\t\t\t\tLow-Code Day Italy: innovazione e digitalizzazione nei processi aziendali\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-26165 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti category-digital-experience category-digital-service-experience category-riduzione-resistenza-cambiamento tag-digitalizzazione tag-tecnologia tag-work-life-balance\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/tecnologia-work-life-balance-legame\/\" >\n\t\t\t\tTecnologia e work-life balance: sono correlati?\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-37996 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti category-asset-management category-riduzione-spesa-it category-spend-optimization\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/stop-alle-licenze-perpetue-per-adobe-acrobat-valutazioni-da-fare\/\" >\n\t\t\t\tStop alle licenze perpetue per Adobe Acrobat: valutazioni da fare\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-24865 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti tag-digitale tag-futuro tag-human-value tag-manifesto-persona-digitale tag-trasformazione-digitale\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/lettera-aperta-futuro-digitale\/\" >\n\t\t\t\tLettera aperta al (nostro) futuro digitale\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bc87895 elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bc87895\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7e6f41e\" data-id=\"7e6f41e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-01244f8 elementor-widget elementor-widget-image\" data-id=\"01244f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" data-src=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/04\/02-s-pattern02.png\" title=\"02-s pattern02\" alt=\"02-s pattern02\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 1655px; --smush-placeholder-aspect-ratio: 1655\/388;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb98fd6 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"cb98fd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Livello_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 92.25 92.25\" style=\"enable-background:new 0 0 92.25 92.25;\" xml:space=\"preserve\"><polygon points=\"90.25,2.93 90.25,88.84 1.41,0 0,1.41 88.84,90.25 2.93,90.25 2.93,92.25 92.25,92.25 92.25,2.93 \"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f32d69c elementor-widget elementor-widget-heading\" data-id=\"f32d69c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vorresti eliminare le password e garantire un accesso sicuro?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a20b313 elementor-widget elementor-widget-heading\" data-id=\"a20b313\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CONTATTACI PER APPROFONDIRE!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe88395 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fe88395\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-372754d elementor-button-align-center elementor-widget elementor-widget-form\" data-id=\"372754d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Contattaci per una consulenza\" aria-label=\"Contattaci per una consulenza\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"26134\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"372754d\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Eliminare le password con un approccio Zero Trust - WEGG\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"26134\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tNome:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-cognome elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-cognome\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tCognome:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[cognome]\" id=\"form-field-cognome\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tEmail aziendale:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_fa5f1b6 elementor-col-50\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_fa5f1b6\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tNumero di Telefono:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_fa5f1b6]\" id=\"form-field-field_fa5f1b6\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Sono accettati solo numeri e caratteri telefonici (#, -, *, ecc.).\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_c83c665 elementor-col-50\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_c83c665\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tRuolo aziendale:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_c83c665]\" id=\"form-field-field_c83c665\" class=\"elementor-field elementor-size-sm  elementor-field-textual\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tSpiegaci meglio la tua situazione:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"4\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_687c4cc elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_687c4cc]\" id=\"form-field-field_687c4cc\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\" checked=\"checked\">\n\t\t\t\t<label for=\"form-field-field_687c4cc\">Ho preso visione dell'<a href=\"https:\/\/wegg.it\/privacy-policy\">informativa privacy<\/a> di WEGG e acconsento il trattamento dei miei dati.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_ea8ed71 elementor-col-100\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_ea8ed71]\" id=\"form-field-field_ea8ed71\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\">\n\t\t\t\t<label for=\"form-field-field_ea8ed71\">Voglio rimanere in contatto con WEGG e ricevere contenuti gratuiti.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text\">\n\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_d2bf274]\" id=\"form-field-field_d2bf274\" class=\"elementor-field elementor-size-sm \" style=\"display:none !important;\">\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Invia<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Perch\u00e9 \u00e8 pi\u00f9 sicuro eliminare le password nell&#8217;accesso ai dispositivi? In che modo pu\u00f2 essere efficace un approccio Zero Trust?<\/p>","protected":false},"author":8828,"featured_media":30595,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[14,103,94,71,72],"tags":[164,79,162,128,127,163],"class_list":["post-26134","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-approfondimenti","category-semplificazione-utilizzo-postazioni","category-user-experience","category-work-from-anywhere","category-workplace-security","tag-attacchi","tag-hacker","tag-password","tag-rischio-informatico","tag-workplace-security","tag-zero-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Eliminare le password con un approccio Zero Trust - WEGG<\/title>\n<meta name=\"description\" content=\"Perch\u00e9 \u00e8 pi\u00f9 sicuro eliminare le password nell&#039;accesso ai dispositivi? In che modo pu\u00f2 essere efficace un approccio Zero Trust?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wegg.it\/eng\/eliminare-password-approccio-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Eliminare le password con un approccio Zero Trust - WEGG\" \/>\n<meta property=\"og:description\" content=\"Perch\u00e9 \u00e8 pi\u00f9 sicuro eliminare le password nell&#039;accesso ai dispositivi? In che modo pu\u00f2 essere efficace un approccio Zero Trust?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wegg.it\/eng\/eliminare-password-approccio-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"WEGG\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-29T08:26:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-02T09:43:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/Articolo1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Camilla Bottin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Camilla Bottin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/\"},\"author\":{\"name\":\"Camilla Bottin\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/person\/24198ae076770466cc8f909ad75bea89\"},\"headline\":\"Eliminare le password con un approccio Zero Trust\",\"datePublished\":\"2022-07-29T08:26:40+00:00\",\"dateModified\":\"2024-02-02T09:43:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/\"},\"wordCount\":928,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.wegg.it\/#organization\"},\"image\":{\"@id\":\"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/Articolo1.jpg\",\"keywords\":[\"attacchi\",\"hacker\",\"password\",\"rischio informatico\",\"workplace security\",\"zero trust\"],\"articleSection\":[\"Approfondimenti\",\"Semplificazione utilizzo postazioni\",\"User Experience\",\"Work From Anywhere\",\"Workplace Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/\",\"url\":\"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/\",\"name\":\"Eliminare le password con un approccio Zero Trust - WEGG\",\"isPartOf\":{\"@id\":\"https:\/\/www.wegg.it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/Articolo1.jpg\",\"datePublished\":\"2022-07-29T08:26:40+00:00\",\"dateModified\":\"2024-02-02T09:43:13+00:00\",\"description\":\"Perch\u00e9 \u00e8 pi\u00f9 sicuro eliminare le password nell'accesso ai dispositivi? In che modo pu\u00f2 essere efficace un approccio Zero Trust?\",\"breadcrumb\":{\"@id\":\"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/#primaryimage\",\"url\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/Articolo1.jpg\",\"contentUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/Articolo1.jpg\",\"width\":1024,\"height\":683},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wegg.it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Eliminare le password con un approccio Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wegg.it\/#website\",\"url\":\"https:\/\/www.wegg.it\/\",\"name\":\"WEGG\",\"description\":\"The Impact factory\",\"publisher\":{\"@id\":\"https:\/\/www.wegg.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wegg.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.wegg.it\/#organization\",\"name\":\"WEGG\",\"url\":\"https:\/\/www.wegg.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png\",\"contentUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png\",\"width\":968,\"height\":236,\"caption\":\"WEGG\"},\"image\":{\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/it.linkedin.com\/company\/wegg-theimpactfactory\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/person\/24198ae076770466cc8f909ad75bea89\",\"name\":\"Camilla Bottin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4dfdf1e48dfe6958209ecc04d673e37c0e6743fb4c85ab6199ed40cd200097de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4dfdf1e48dfe6958209ecc04d673e37c0e6743fb4c85ab6199ed40cd200097de?s=96&d=mm&r=g\",\"caption\":\"Camilla Bottin\"},\"url\":\"https:\/\/wegg.it\/eng\/author\/cbottin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Eliminare le password con un approccio Zero Trust - WEGG","description":"Perch\u00e9 \u00e8 pi\u00f9 sicuro eliminare le password nell'accesso ai dispositivi? In che modo pu\u00f2 essere efficace un approccio Zero Trust?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wegg.it\/eng\/eliminare-password-approccio-zero-trust\/","og_locale":"en_US","og_type":"article","og_title":"Eliminare le password con un approccio Zero Trust - WEGG","og_description":"Perch\u00e9 \u00e8 pi\u00f9 sicuro eliminare le password nell'accesso ai dispositivi? In che modo pu\u00f2 essere efficace un approccio Zero Trust?","og_url":"https:\/\/wegg.it\/eng\/eliminare-password-approccio-zero-trust\/","og_site_name":"WEGG","article_published_time":"2022-07-29T08:26:40+00:00","article_modified_time":"2024-02-02T09:43:13+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/Articolo1.jpg","type":"image\/jpeg"}],"author":"Camilla Bottin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Camilla Bottin","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/#article","isPartOf":{"@id":"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/"},"author":{"name":"Camilla Bottin","@id":"https:\/\/www.wegg.it\/#\/schema\/person\/24198ae076770466cc8f909ad75bea89"},"headline":"Eliminare le password con un approccio Zero Trust","datePublished":"2022-07-29T08:26:40+00:00","dateModified":"2024-02-02T09:43:13+00:00","mainEntityOfPage":{"@id":"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/"},"wordCount":928,"commentCount":0,"publisher":{"@id":"https:\/\/www.wegg.it\/#organization"},"image":{"@id":"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/Articolo1.jpg","keywords":["attacchi","hacker","password","rischio informatico","workplace security","zero trust"],"articleSection":["Approfondimenti","Semplificazione utilizzo postazioni","User Experience","Work From Anywhere","Workplace Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/","url":"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/","name":"Eliminare le password con un approccio Zero Trust - WEGG","isPartOf":{"@id":"https:\/\/www.wegg.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/Articolo1.jpg","datePublished":"2022-07-29T08:26:40+00:00","dateModified":"2024-02-02T09:43:13+00:00","description":"Perch\u00e9 \u00e8 pi\u00f9 sicuro eliminare le password nell'accesso ai dispositivi? In che modo pu\u00f2 essere efficace un approccio Zero Trust?","breadcrumb":{"@id":"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/#primaryimage","url":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/Articolo1.jpg","contentUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/07\/Articolo1.jpg","width":1024,"height":683},{"@type":"BreadcrumbList","@id":"https:\/\/wegg.it\/eliminare-password-approccio-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wegg.it\/"},{"@type":"ListItem","position":2,"name":"Eliminare le password con un approccio Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.wegg.it\/#website","url":"https:\/\/www.wegg.it\/","name":"WEGG","description":"The Impact factory","publisher":{"@id":"https:\/\/www.wegg.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wegg.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.wegg.it\/#organization","name":"WEGG","url":"https:\/\/www.wegg.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/","url":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png","contentUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png","width":968,"height":236,"caption":"WEGG"},"image":{"@id":"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/it.linkedin.com\/company\/wegg-theimpactfactory"]},{"@type":"Person","@id":"https:\/\/www.wegg.it\/#\/schema\/person\/24198ae076770466cc8f909ad75bea89","name":"Camilla Bottin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wegg.it\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4dfdf1e48dfe6958209ecc04d673e37c0e6743fb4c85ab6199ed40cd200097de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4dfdf1e48dfe6958209ecc04d673e37c0e6743fb4c85ab6199ed40cd200097de?s=96&d=mm&r=g","caption":"Camilla Bottin"},"url":"https:\/\/wegg.it\/eng\/author\/cbottin\/"}]}},"_links":{"self":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts\/26134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/users\/8828"}],"replies":[{"embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/comments?post=26134"}],"version-history":[{"count":21,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts\/26134\/revisions"}],"predecessor-version":[{"id":36638,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts\/26134\/revisions\/36638"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/media\/30595"}],"wp:attachment":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/media?parent=26134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/categories?post=26134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/tags?post=26134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}