{"id":36246,"date":"2024-01-08T14:00:39","date_gmt":"2024-01-08T14:00:39","guid":{"rendered":"https:\/\/wegg.it\/?p=36246"},"modified":"2024-02-02T08:48:29","modified_gmt":"2024-02-02T08:48:29","slug":"software-eol-itam-utile-sicurezza","status":"publish","type":"post","link":"https:\/\/wegg.it\/eng\/software-eol-itam-utile-sicurezza\/","title":{"rendered":"EOL software: a practical case where ITAM is useful for security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"36246\" class=\"elementor elementor-36246\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-53e0c95 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53e0c95\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-531edbf\" data-id=\"531edbf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8bb2f54 elementor-hidden-mobile elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8bb2f54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Livello_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 92.25 92.25\" style=\"enable-background:new 0 0 92.25 92.25;\" xml:space=\"preserve\"><polygon points=\"90.25,2.93 90.25,88.84 1.41,0 0,1.41 88.84,90.25 2.93,90.25 2.93,92.25 92.25,92.25 92.25,2.93 \"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5ee191b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5ee191b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2c6e3a6\" data-id=\"2c6e3a6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20926b3 elementor-widget elementor-widget-image\" data-id=\"20926b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/elia-pellegrini-yB-L_e7PzFM--1024x683.jpg\" class=\"attachment-large size-large wp-image-36249\" alt=\"\" srcset=\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/elia-pellegrini-yB-L_e7PzFM--1024x683.jpg 1024w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/elia-pellegrini-yB-L_e7PzFM--300x200.jpg 300w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/elia-pellegrini-yB-L_e7PzFM--768x512.jpg 768w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/elia-pellegrini-yB-L_e7PzFM--1536x1024.jpg 1536w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/elia-pellegrini-yB-L_e7PzFM--18x12.jpg 18w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/elia-pellegrini-yB-L_e7PzFM-.jpg 1587w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-025de72 elementor-widget elementor-widget-post-info\" data-id=\"025de72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-8dd652e elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/wegg.it\/eng\/2024\/01\/08\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>January 8, 2024<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3e7748 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"a3e7748\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Software EOL: un caso pratico in cui ITAM \u00e8 utile alla sicurezza<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71e4747 elementor-widget elementor-widget-text-editor\" data-id=\"71e4747\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Il caso Microsoft Exchange Server.<\/strong><\/p><p><em>In che modo i processi ITAM di monitoraggio di software EOL sono utili per ridurre le esposizioni alle vulnerabilit\u00e0 di sicurezza.<\/em><\/p><p>Con il termine <strong>software<\/strong>\u00a0<strong>EOL (End of Life)<\/strong> si fa riferimento a <strong>versioni software<\/strong> per cui \u00e8 stata prevista <strong>la fine del supporto <\/strong>e quindi <strong>non saranno pi\u00f9 disponibili<\/strong> <strong>aggiornamenti di sicurezza<\/strong>.<\/p><p><strong>La visibilit\u00e0 sul software EOL<\/strong> e quindi <strong>con supporto terminato<\/strong> \u00e8 un aspetto da non trascurare, perch\u00e9 alla sua esecuzione sulle reti aziendali possono essere associate delle <strong>vulnerabilit\u00e0<\/strong> <strong>che aumentano il rischio di violazione dei dati di un\u2019organizzazione.<\/strong><\/p><p>I motivi per cui le aziende <strong>non riescono ad avere il controllo sul software EOL sono molteplici<\/strong>: acquisti indipendenti a livello multi-dipartimentale con il risultato di avere informazioni frammentarie, documentazione non aggiornata sul ciclo di vita degli asset, <strong>ma<\/strong> <strong>anche difficolt\u00e0 nel rincorrere gli annunci<\/strong> <strong>dei vendor<\/strong> per pianificare massivamente migrazioni o aggiornamenti.<\/p><p>Ma gli impatti a livello di sicurezza sono sotto gli occhi di tutti: prendiamo come esempio <strong>Microsoft Exchange Server nelle sue versioni 2007, 2010, 2013<\/strong>. Secondo <a href=\"https:\/\/dashboard.shadowserver.org\/statistics\/combined\/time-series\/?date_range=7&amp;source=exchange&amp;source=exchange6&amp;tag=eol%2B&amp;style=stacked\">una scansione di ShadowServer<\/a> ci sono quasi 20.000 server di posta elettronica Microsoft Exchange in Europa, USA e Asia che sono vulnerabili a difetti di esecuzione di codice remoto e sono esposti in Internet.<\/p><p>Questi sistemi di posta elettronica, infatti, eseguono <strong>una versione del software<\/strong> <strong>che attualmente<\/strong> <strong>non \u00e8 pi\u00f9 supportata<\/strong> (come si pu\u00f2 vedere dal sito di Microsoft per le versioni <a href=\"https:\/\/learn.microsoft.com\/en-us\/lifecycle\/products\/exchange-server-2007\">2007<\/a>, <a href=\"https:\/\/learn.microsoft.com\/en-us\/lifecycle\/products\/exchange-server-2010\">2010<\/a> e non ultima la <a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/enterprise\/exchange-2013-end-of-support?view=o365-worldwide\">2013<\/a> che ha terminato il supporto l\u201911 aprile 2023 e per cui Microsoft consiglia caldamente la migrazione a <strong>Microsoft 365, Office 365 o Exchange 2019<\/strong>).<\/p><p>Exchange rientra tra prodotti di Microsoft con <a href=\"https:\/\/learn.microsoft.com\/en-us\/lifecycle\/policies\/fixed\">Fixed Lifecycle Policy<\/a>, ovvero prodotti che al momento del rilascio hanno gi\u00e0 <strong>una<\/strong> <strong>data di fine supporto<\/strong>.\u00a0 Solitamente si definisce un minimo di cinque anni per il Mainstream Support e un periodo addizionale di <strong>Extended Support<\/strong>, termini entro i quali i clienti hanno a disposizione <strong>Service Pack<\/strong> <strong>da distribuire<\/strong> (correzioni raccolte in \u201cpacchetti\u201d) o <strong>indicazioni per sanare le vulnerabilit\u00e0.<\/strong><\/p><p>Oltre queste date, <strong>Microsoft NON garantisce pi\u00f9 aggiornamenti di sicurezza<\/strong>. Con Exchange 2007 la data di fine del supporto esteso risale al 2017, mentre con <strong>le sue versioni pi\u00f9 \u201cgiovani\u201d<\/strong> siamo al 2020 e all\u2019aprile di quest\u2019anno.<\/p><h2><strong>Software EOL: i rischi legati ad Exchange <\/strong><\/h2><p>Come si legge su <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/over-20-000-vulnerable-microsoft-exchange-servers-exposed-to-attacks\/\">Bleeping Computer<\/a>, i computer che eseguono le versioni non pi\u00f9 supportate del server Exchange sono vulnerabili a <a href=\"https:\/\/proxylogon.com\/\">ProxyLogon<\/a>, <strong>un problema di sicurezza critico<\/strong> classificato come CVE-2021-26855, che pu\u00f2 essere concatenato con un bug meno grave identificato come CVE-2021-27065 per ottenere l&#8217;esecuzione di codice remoto.<\/p><p>Nel caso di istanze che hanno raggiunto la fine del supporto, l&#8217;unica opzione rimasta \u00e8 l&#8217;aggiornamento a una versione che riceva ancora <strong>gli aggiornamenti di sicurezza.<\/strong><\/p><p><strong>L\u2019impostazione di processi SAM<\/strong> (ne abbiamo parlato anche <a href=\"https:\/\/wegg.it\/dora-come-integrare-itam-alla-sicurezza\/\">qui<\/a>) permette di ottenere dei <strong>report di qualit\u00e0 elevata<\/strong> sull\u2019uso in tempo reale del software: <strong>tra<\/strong> <strong>le informazioni condivise<\/strong> troviamo anche <strong>i dati di fine supporto<\/strong>.<\/p><p>In WEGG ci appoggiamo <strong>alla tecnologia Snow<\/strong>, il cui <strong>database di riconoscimento software<\/strong> si integra ai dati sulle vulnerabilit\u00e0 forniti dal <strong>National Vulnerability Database: <\/strong>nelle aziende nostre clienti ci adoperiamo per promuovere il monitoraggio del software in esecuzione sulle reti aziendali in modo da disporre di dati utili alla sicurezza.<\/p><p>Sotto si vede una <strong>schermata di dettaglio<\/strong> <strong>del prodotto Exchange 2007<\/strong>, che estrae le informazioni di fine supporto direttamente dagli annunci forniti dal vendor:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb39753 elementor-widget elementor-widget-image\" data-id=\"eb39753\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/MicrosoftExchangeServer2007-1.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"MicrosoftExchangeServer2007\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MzYyNzgsInVybCI6Imh0dHBzOlwvXC93ZWdnLml0XC93cC1jb250ZW50XC91cGxvYWRzXC8yMDI0XC8wMVwvTWljcm9zb2Z0RXhjaGFuZ2VTZXJ2ZXIyMDA3LTEucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"524\" data-src=\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/MicrosoftExchangeServer2007-1-1024x671.png\" class=\"attachment-large size-large wp-image-36278 lazyload\" alt=\"\" data-srcset=\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/MicrosoftExchangeServer2007-1-1024x671.png 1024w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/MicrosoftExchangeServer2007-1-300x197.png 300w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/MicrosoftExchangeServer2007-1-768x503.png 768w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/MicrosoftExchangeServer2007-1-18x12.png 18w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/MicrosoftExchangeServer2007-1.png 1251w\" data-sizes=\"(max-width: 800px) 100vw, 800px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/524;\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78357f7 elementor-widget elementor-widget-text-editor\" data-id=\"78357f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Come WEGG risolve il problema del software EOL<\/strong><\/h2><p><strong>\u00a0<\/strong><strong>La preparazione di report<\/strong> <strong>sul software EOL<\/strong> da parte dei nostri consulenti ITAM con il supporto della tecnologia Snow facilita la comprensione di quanti dispositivi sono interessati <strong>da<\/strong> <strong>possibili software con supporto terminato e dove si trovano questi asset.<\/strong><\/p><p>L\u2019organizzazione di questi report \u2013 disponibili dopo <strong>un periodo di metering<\/strong> &#8211; include informazioni quali:<\/p><ul><li>Software Name<\/li><li>Software Version<\/li><li>Software Edition<\/li><li>Date Type (EOL, EOS)<\/li><li>Date Value (la data attuale di monitoraggio)<\/li><li>Source (il link all\u2019announcement ufficiale del vendor)<\/li><\/ul><p><strong><br \/>La consapevolezza di quali versioni<\/strong> non sono pi\u00f9 supportate <strong>permette di<\/strong> <strong>avere il controllo<\/strong> sulle vulnerabilit\u00e0 che possono interessare il proprio parco licenze: nella schermata sotto, tratta da un\u2019analisi fatta su un nostro cliente, si vedono quali sono le versioni Exchange installate <strong>per cui<\/strong> <strong>\u00e8 ancora previsto il supporto<\/strong> (2016 e 2019) e quali per cui sarebbe bene <strong>pianificare al pi\u00f9 presto una migrazione (2010).<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ec0b20 elementor-widget elementor-widget-image\" data-id=\"9ec0b20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/ApplicazioniEOL-1.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"ApplicazioniEOL\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MzYyNzksInVybCI6Imh0dHBzOlwvXC93ZWdnLml0XC93cC1jb250ZW50XC91cGxvYWRzXC8yMDI0XC8wMVwvQXBwbGljYXppb25pRU9MLTEucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"499\" data-src=\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/ApplicazioniEOL-1-1024x639.png\" class=\"attachment-large size-large wp-image-36279 lazyload\" alt=\"\" data-srcset=\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/ApplicazioniEOL-1-1024x639.png 1024w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/ApplicazioniEOL-1-300x187.png 300w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/ApplicazioniEOL-1-768x479.png 768w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/ApplicazioniEOL-1-18x12.png 18w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/ApplicazioniEOL-1.png 1248w\" data-sizes=\"(max-width: 800px) 100vw, 800px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/499;\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d60bd68 elementor-widget elementor-widget-text-editor\" data-id=\"d60bd68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>L\u2019analisi<\/strong> <strong>non \u00e8 solo retroattiva<\/strong>: il fatto di disporre di report aggiornati sul software EOL permette anche di pianificare le future migrazioni. \u00a0\u00c8 possibile, infatti, <strong>attivare degli alert sugli asset IT <\/strong>che raggiungono la fine del loro ciclo di vita entro 12 mesi e trovarsi sempre un passo avanti alle <strong>versioni non pi\u00f9 supportate<\/strong>.<\/p><p>La presenza all\u2019interno del proprio ambiente di <strong>software obsoleto<\/strong> (fuori supporto), infatti, espone l\u2019azienda a una costante vulnerabilit\u00e0 di sicurezza: ma quello che le aziende spesso trascurano \u00e8 il fatto che il problema si estende <strong>non solo ai prodotti che richiedono una licenza a pagamento<\/strong> (vedi il caso Exchange), ma anche a prodotti gratuiti. Nel report seguente, ad esempio, si vede uno di essi, <strong>7-Zip. <\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d1db42a elementor-widget elementor-widget-image\" data-id=\"d1db42a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/7Zip-1.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"7Zip\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MzYyODAsInVybCI6Imh0dHBzOlwvXC93ZWdnLml0XC93cC1jb250ZW50XC91cGxvYWRzXC8yMDI0XC8wMVwvN1ppcC0xLnBuZyJ9\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"752\" data-src=\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/7Zip-1-1024x962.png\" class=\"attachment-large size-large wp-image-36280 lazyload\" alt=\"\" data-srcset=\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/7Zip-1-1024x962.png 1024w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/7Zip-1-300x282.png 300w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/7Zip-1-768x721.png 768w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/7Zip-1-13x12.png 13w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/7Zip-1.png 1266w\" data-sizes=\"(max-width: 800px) 100vw, 800px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/752;\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6f3c32 elementor-widget elementor-widget-text-editor\" data-id=\"d6f3c32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>La reportistica SAM predisposta da WEGG sulla tecnologia Snow<\/strong> diventa uno strumento fondamentale per aiutare i team di Security e Operations a impostare dei processi continui di mitigazione del rischio.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d4c0349\" data-id=\"d4c0349\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54a6278 elementor-widget elementor-widget-text-editor\" data-id=\"54a6278\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Approfondimenti<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dceb23 elementor-grid-1 elementor-posts--thumbnail-none elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-posts\" data-id=\"6dceb23\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;classic_columns&quot;:&quot;1&quot;,&quot;classic_columns_tablet&quot;:&quot;2&quot;,&quot;classic_columns_mobile&quot;:&quot;1&quot;,&quot;classic_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;classic_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;classic_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.classic\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-classic elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-38822 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti category-business-process-management category-cloud-management category-digitalizzazione-processi category-facilitare-adozione-digitale category-gestione-servizi-aziendali category-migliorare-processo-decisionale category-process-automation category-spend-optimization tag-architettura-modulare-erp tag-automazione-processi-aziendali tag-core-erp-pulito tag-digitalizzazione-processi-aziendali tag-low-code-mendix tag-sap-business-technology-platform tag-sap-composable-erp tag-sap-s-4hana-integrazione tag-scalabilita-sistemi-erp tag-soluzioni-low-code-per-erp\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/sap-composable-erp-e-low-code-la-combinazione-vincente-per-evolvere-agilmente\/\" >\n\t\t\t\tSAP Composable ERP e low-code: la combinazione vincente per evolvere agilmente\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-29759 post type-post status-publish format-standard has-post-thumbnail hentry category-abilitazione-sicura-postazioni category-approfondimenti category-protezione-dei-dati category-webinar category-work-from-anywhere category-workplace-security tag-edge-intelligence tag-patch tag-rischio tag-sicurezza tag-vulnerabilita tag-workplace-security\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/priorita-rischio-strategie-strumenti-di-gestione-vulnerabilita\/\" >\n\t\t\t\tDiamo priorit\u00e0 al rischio!\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-39783 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti category-business-process-management category-digital-service-experience category-migliorare-erogazione-servizi category-process-automation category-riduzione-attivita-manuali tag-automazione-2 tag-digitaltransformation tag-efficienza tag-flussidilavoro tag-gestioneserviziit tag-integrazioni tag-ipaas tag-itsm-2 tag-produttivitateamit tag-sicurezzaapi\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/itsm-e-integrazioni-esterne-gli-ostacoli-invisibili-che-rallentano-il-team-it\/\" >\n\t\t\t\tITSM e integrazioni esterne: gli ostacoli invisibili che rallentano il team IT\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-32300 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti category-asset-management category-rinegoziazione-contratti category-risk-avoidance category-software-non-in-regola category-spend-optimization tag-database-hana tag-licensing-sap tag-licenze tag-sap-hana tag-spend-optimization\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/licensing-sap-applicato-database-hana\/\" >\n\t\t\t\tIl licensing SAP applicato al database HANA\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-42152 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti tag-assistenza-tecnica tag-customer-care tag-service-manager\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/misurare-per-migliorare-il-nostro-approccio-alla-soddisfazione-del-cliente\/\" >\n\t\t\t\tMisurare per migliorare: il nostro approccio alla soddisfazione del cliente\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-26165 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti category-digital-experience category-digital-service-experience category-riduzione-resistenza-cambiamento tag-digitalizzazione tag-tecnologia tag-work-life-balance\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/tecnologia-work-life-balance-legame\/\" >\n\t\t\t\tTecnologia e work-life balance: sono correlati?\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bc87895 elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bc87895\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7e6f41e\" data-id=\"7e6f41e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-01244f8 elementor-widget elementor-widget-image\" data-id=\"01244f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" data-src=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/04\/02-s-pattern02.png\" title=\"02-s pattern02\" alt=\"02-s pattern02\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 1655px; --smush-placeholder-aspect-ratio: 1655\/388;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb98fd6 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"cb98fd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Livello_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 92.25 92.25\" style=\"enable-background:new 0 0 92.25 92.25;\" xml:space=\"preserve\"><polygon points=\"90.25,2.93 90.25,88.84 1.41,0 0,1.41 88.84,90.25 2.93,90.25 2.93,92.25 92.25,92.25 92.25,2.93 \"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f32d69c elementor-widget elementor-widget-heading\" data-id=\"f32d69c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vorresti monitorare il ciclo di vita delle tue applicazioni software?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a20b313 elementor-widget elementor-widget-heading\" data-id=\"a20b313\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CONTATTACI PER APPROFONDIRE!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe88395 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fe88395\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-372754d elementor-button-align-center elementor-widget elementor-widget-form\" data-id=\"372754d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Contattaci per una consulenza\" aria-label=\"Contattaci per una consulenza\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"36246\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"372754d\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"WEGG\" \/>\n\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tNome:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-email elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tCognome:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-field_298f6a1 elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_298f6a1\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tEmail aziendale:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[field_298f6a1]\" id=\"form-field-field_298f6a1\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_fa5f1b6 elementor-col-50\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_fa5f1b6\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tNumero di Telefono:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_fa5f1b6]\" id=\"form-field-field_fa5f1b6\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Sono accettati solo numeri e caratteri telefonici (#, -, *, ecc.).\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_c83c665 elementor-col-50\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_c83c665\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tRuolo aziendale:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_c83c665]\" id=\"form-field-field_c83c665\" class=\"elementor-field elementor-size-sm  elementor-field-textual\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tSpiegaci meglio la tua situazione:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"4\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_687c4cc elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_687c4cc]\" id=\"form-field-field_687c4cc\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\" checked=\"checked\">\n\t\t\t\t<label for=\"form-field-field_687c4cc\">Ho preso visione dell'<a href=\"https:\/\/wegg.it\/privacy-policy\">informativa privacy<\/a> di WEGG e acconsento il trattamento dei miei dati.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_ea8ed71 elementor-col-100\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_ea8ed71]\" id=\"form-field-field_ea8ed71\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\">\n\t\t\t\t<label for=\"form-field-field_ea8ed71\">Voglio rimanere in contatto con WEGG e ricevere contenuti gratuiti.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text\">\n\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_d2bf274]\" id=\"form-field-field_d2bf274\" class=\"elementor-field elementor-size-sm \" style=\"display:none !important;\">\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Invia<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>How ITAM processes for monitoring EOL software are helpful in reducing exposures to security vulnerabilities.<\/p>","protected":false},"author":8828,"featured_media":36249,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[14,21,106,23,109],"tags":[326,320,327,325,180],"class_list":["post-36246","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-approfondimenti","category-asset-management","category-riduzione-non-conformita","category-risk-avoidance","category-software-non-in-regola","tag-fine-supporto","tag-itam","tag-microsoft-exchange","tag-software-eol","tag-vulnerabilita"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Software EOL: un caso pratico in cui ITAM \u00e8 utile alla sicurezza - WEGG<\/title>\n<meta name=\"description\" content=\"In che modo i processi ITAM di monitoraggio di software EOL sono utili per ridurre le esposizioni alle vulnerabilit\u00e0 di sicurezza.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wegg.it\/eng\/software-eol-itam-utile-sicurezza\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Software EOL: un caso pratico in cui ITAM \u00e8 utile alla sicurezza - WEGG\" \/>\n<meta property=\"og:description\" content=\"In che modo i processi ITAM di monitoraggio di software EOL sono utili per ridurre le esposizioni alle vulnerabilit\u00e0 di sicurezza.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wegg.it\/eng\/software-eol-itam-utile-sicurezza\/\" \/>\n<meta property=\"og:site_name\" content=\"WEGG\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-08T14:00:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-02T08:48:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/elia-pellegrini-yB-L_e7PzFM-.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1587\" \/>\n\t<meta property=\"og:image:height\" content=\"1058\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Camilla Bottin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Camilla Bottin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/\"},\"author\":{\"name\":\"Camilla Bottin\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/person\/24198ae076770466cc8f909ad75bea89\"},\"headline\":\"Software EOL: un caso pratico in cui ITAM \u00e8 utile alla sicurezza\",\"datePublished\":\"2024-01-08T14:00:39+00:00\",\"dateModified\":\"2024-02-02T08:48:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/\"},\"wordCount\":873,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.wegg.it\/#organization\"},\"image\":{\"@id\":\"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/elia-pellegrini-yB-L_e7PzFM-.jpg\",\"keywords\":[\"fine supporto\",\"ITAM\",\"Microsoft Exchange\",\"software EOL\",\"vulnerabilit\u00e0\"],\"articleSection\":[\"Approfondimenti\",\"Asset Management\",\"Riduzione non conformit\u00e0\",\"Risk Avoidance\",\"Software non in regola\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/\",\"url\":\"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/\",\"name\":\"Software EOL: un caso pratico in cui ITAM \u00e8 utile alla sicurezza - WEGG\",\"isPartOf\":{\"@id\":\"https:\/\/www.wegg.it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/elia-pellegrini-yB-L_e7PzFM-.jpg\",\"datePublished\":\"2024-01-08T14:00:39+00:00\",\"dateModified\":\"2024-02-02T08:48:29+00:00\",\"description\":\"In che modo i processi ITAM di monitoraggio di software EOL sono utili per ridurre le esposizioni alle vulnerabilit\u00e0 di sicurezza.\",\"breadcrumb\":{\"@id\":\"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/#primaryimage\",\"url\":\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/elia-pellegrini-yB-L_e7PzFM-.jpg\",\"contentUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/elia-pellegrini-yB-L_e7PzFM-.jpg\",\"width\":1587,\"height\":1058},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wegg.it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Software EOL: un caso pratico in cui ITAM \u00e8 utile alla sicurezza\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wegg.it\/#website\",\"url\":\"https:\/\/www.wegg.it\/\",\"name\":\"WEGG\",\"description\":\"The Impact factory\",\"publisher\":{\"@id\":\"https:\/\/www.wegg.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wegg.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.wegg.it\/#organization\",\"name\":\"WEGG\",\"url\":\"https:\/\/www.wegg.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png\",\"contentUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png\",\"width\":968,\"height\":236,\"caption\":\"WEGG\"},\"image\":{\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/it.linkedin.com\/company\/wegg-theimpactfactory\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/person\/24198ae076770466cc8f909ad75bea89\",\"name\":\"Camilla Bottin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4dfdf1e48dfe6958209ecc04d673e37c0e6743fb4c85ab6199ed40cd200097de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4dfdf1e48dfe6958209ecc04d673e37c0e6743fb4c85ab6199ed40cd200097de?s=96&d=mm&r=g\",\"caption\":\"Camilla Bottin\"},\"url\":\"https:\/\/wegg.it\/eng\/author\/cbottin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Software EOL: un caso pratico in cui ITAM \u00e8 utile alla sicurezza - WEGG","description":"How ITAM processes for monitoring EOL software are helpful in reducing exposures to security vulnerabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wegg.it\/eng\/software-eol-itam-utile-sicurezza\/","og_locale":"en_US","og_type":"article","og_title":"Software EOL: un caso pratico in cui ITAM \u00e8 utile alla sicurezza - WEGG","og_description":"In che modo i processi ITAM di monitoraggio di software EOL sono utili per ridurre le esposizioni alle vulnerabilit\u00e0 di sicurezza.","og_url":"https:\/\/wegg.it\/eng\/software-eol-itam-utile-sicurezza\/","og_site_name":"WEGG","article_published_time":"2024-01-08T14:00:39+00:00","article_modified_time":"2024-02-02T08:48:29+00:00","og_image":[{"width":1587,"height":1058,"url":"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/elia-pellegrini-yB-L_e7PzFM-.jpg","type":"image\/jpeg"}],"author":"Camilla Bottin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Camilla Bottin","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/#article","isPartOf":{"@id":"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/"},"author":{"name":"Camilla Bottin","@id":"https:\/\/www.wegg.it\/#\/schema\/person\/24198ae076770466cc8f909ad75bea89"},"headline":"Software EOL: un caso pratico in cui ITAM \u00e8 utile alla sicurezza","datePublished":"2024-01-08T14:00:39+00:00","dateModified":"2024-02-02T08:48:29+00:00","mainEntityOfPage":{"@id":"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/"},"wordCount":873,"commentCount":0,"publisher":{"@id":"https:\/\/www.wegg.it\/#organization"},"image":{"@id":"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/#primaryimage"},"thumbnailUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/elia-pellegrini-yB-L_e7PzFM-.jpg","keywords":["fine supporto","ITAM","Microsoft Exchange","software EOL","vulnerabilit\u00e0"],"articleSection":["Approfondimenti","Asset Management","Riduzione non conformit\u00e0","Risk Avoidance","Software non in regola"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/","url":"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/","name":"Software EOL: un caso pratico in cui ITAM \u00e8 utile alla sicurezza - WEGG","isPartOf":{"@id":"https:\/\/www.wegg.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/#primaryimage"},"image":{"@id":"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/#primaryimage"},"thumbnailUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/elia-pellegrini-yB-L_e7PzFM-.jpg","datePublished":"2024-01-08T14:00:39+00:00","dateModified":"2024-02-02T08:48:29+00:00","description":"How ITAM processes for monitoring EOL software are helpful in reducing exposures to security vulnerabilities.","breadcrumb":{"@id":"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/#primaryimage","url":"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/elia-pellegrini-yB-L_e7PzFM-.jpg","contentUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2024\/01\/elia-pellegrini-yB-L_e7PzFM-.jpg","width":1587,"height":1058},{"@type":"BreadcrumbList","@id":"https:\/\/wegg.it\/software-eol-itam-utile-sicurezza\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wegg.it\/"},{"@type":"ListItem","position":2,"name":"Software EOL: un caso pratico in cui ITAM \u00e8 utile alla sicurezza"}]},{"@type":"WebSite","@id":"https:\/\/www.wegg.it\/#website","url":"https:\/\/www.wegg.it\/","name":"WEGG","description":"The Impact factory","publisher":{"@id":"https:\/\/www.wegg.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wegg.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.wegg.it\/#organization","name":"WEGG","url":"https:\/\/www.wegg.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/","url":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png","contentUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png","width":968,"height":236,"caption":"WEGG"},"image":{"@id":"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/it.linkedin.com\/company\/wegg-theimpactfactory"]},{"@type":"Person","@id":"https:\/\/www.wegg.it\/#\/schema\/person\/24198ae076770466cc8f909ad75bea89","name":"Camilla Bottin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wegg.it\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4dfdf1e48dfe6958209ecc04d673e37c0e6743fb4c85ab6199ed40cd200097de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4dfdf1e48dfe6958209ecc04d673e37c0e6743fb4c85ab6199ed40cd200097de?s=96&d=mm&r=g","caption":"Camilla Bottin"},"url":"https:\/\/wegg.it\/eng\/author\/cbottin\/"}]}},"_links":{"self":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts\/36246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/users\/8828"}],"replies":[{"embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/comments?post=36246"}],"version-history":[{"count":25,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts\/36246\/revisions"}],"predecessor-version":[{"id":36496,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts\/36246\/revisions\/36496"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/media\/36249"}],"wp:attachment":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/media?parent=36246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/categories?post=36246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/tags?post=36246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}