{"id":38949,"date":"2024-11-21T16:50:31","date_gmt":"2024-11-21T16:50:31","guid":{"rendered":"https:\/\/wegg.it\/?p=38949"},"modified":"2024-11-22T14:27:09","modified_gmt":"2024-11-22T14:27:09","slug":"come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai","status":"publish","type":"post","link":"https:\/\/wegg.it\/eng\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/","title":{"rendered":"How Software Asset Management Helps Monitor and Manage Shadow AI"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"38949\" class=\"elementor elementor-38949\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-53e0c95 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53e0c95\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-531edbf\" data-id=\"531edbf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8bb2f54 elementor-hidden-mobile elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8bb2f54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Livello_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 92.25 92.25\" style=\"enable-background:new 0 0 92.25 92.25;\" xml:space=\"preserve\"><polygon points=\"90.25,2.93 90.25,88.84 1.41,0 0,1.41 88.84,90.25 2.93,90.25 2.93,92.25 92.25,92.25 92.25,2.93 \"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5ee191b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5ee191b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2c6e3a6\" data-id=\"2c6e3a6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20926b3 elementor-widget elementor-widget-image\" data-id=\"20926b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/11\/stillness-inmotion-YSCCnRGrD-4--1024x768.jpg\" class=\"attachment-large size-large wp-image-38950\" alt=\"\" srcset=\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/11\/stillness-inmotion-YSCCnRGrD-4--1024x768.jpg 1024w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/11\/stillness-inmotion-YSCCnRGrD-4--300x225.jpg 300w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/11\/stillness-inmotion-YSCCnRGrD-4--768x576.jpg 768w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/11\/stillness-inmotion-YSCCnRGrD-4--1536x1152.jpg 1536w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/11\/stillness-inmotion-YSCCnRGrD-4--16x12.jpg 16w, https:\/\/wegg.it\/wp-content\/uploads\/2024\/11\/stillness-inmotion-YSCCnRGrD-4-.jpg 1587w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-025de72 elementor-widget elementor-widget-post-info\" data-id=\"025de72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-8dd652e\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/wegg.it\/eng\/2024\/11\/21\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>November 21, 2024<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3e7748 elementor-widget__width-initial elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"a3e7748\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Come il Software Asset Management aiuta a monitorare e gestire lo Shadow AI<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc8c728 elementor-widget elementor-widget-text-editor\" data-id=\"bc8c728\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><span class=\"LineBreakBlob BlobObject DragDrop SCXW94002043 BCX0\"><span class=\"NormalTextRun SCXW168148773 BCX0\">Rischi <\/span><span class=\"NormalTextRun SCXW168148773 BCX0\">legati all\u2019utilizzo di soluzioni AI non tracciate <\/span><span class=\"NormalTextRun SCXW168148773 BCX0\">(e soluzioni per prevenirli)\u00a0<\/span><\/span><\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c790ad1 elementor-widget elementor-widget-text-editor\" data-id=\"c790ad1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\"><em><span class=\"LineBreakBlob BlobObject DragDrop SCXW94002043 BCX0\"><span class=\"NormalTextRun SCXW219566365 BCX0\">Una breve panoramica sui rischi legati all\u2019utilizzo di applicazioni AI in azienda e <\/span><span class=\"NormalTextRun SCXW219566365 BCX0\">sul ruolo<\/span><span class=\"NormalTextRun SCXW219566365 BCX0\"> chiave<\/span><span class=\"NormalTextRun SCXW219566365 BCX0\"> che il Software Asset Management potrebbe avere nella gestione e nel monitoraggio preventivo delle situazioni non conformi.<\/span><\/span><\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2197133 elementor-widget elementor-widget-text-editor\" data-id=\"2197133\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Nel panorama tecnologico odierno, l\u2019intelligenza artificiale (AI) rappresenta <\/span><b><span data-contrast=\"auto\">uno strumento straordinario<\/span><\/b><span data-contrast=\"auto\"> che sta rivoluzionando il mondo del lavoro, rendendolo <\/span><b><span data-contrast=\"auto\">pi\u00f9 rapido ed efficiente<\/span><\/b><span data-contrast=\"auto\">. Tuttavia, quando queste tecnologie vengono utilizzate <\/span><b><span data-contrast=\"auto\">senza il controllo della funzione IT<\/span><\/b><span data-contrast=\"auto\">, emergono rischi significativi per le aziende, una sfida nota come <\/span><b><span data-contrast=\"auto\">Shadow AI.<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Il concetto deriva dall\u2019evoluzione del termine \u201cShadow IT\u201d ovvero <\/span><b><span data-contrast=\"auto\">l\u2019utilizzo di applicativi e software aziendali<\/span><\/b> <b><span data-contrast=\"auto\">senza il<\/span><\/b> <b><span data-contrast=\"auto\">coinvolgimento o la supervisione del reparto IT<\/span><\/b><span data-contrast=\"auto\">. Con l\u2019aumento dell\u2019adozione di strumenti di intelligenza artificiale, come ChatGPT e altri assistenti digitali, il rischio di perdere il controllo degli utilizzi non tracciati \u00e8 cresciuto esponenzialmente.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Lo\u202fShadow AI\u202frappresenta, infatti, <\/span><b><span data-contrast=\"auto\">l\u2019uso non autorizzato o non monitorato di applicazioni AI<\/span><\/b><span data-contrast=\"auto\">, che spesso finiscono per <\/span><b><span data-contrast=\"auto\">elaborare dati sensibili e critici<\/span><\/b><span data-contrast=\"auto\">, senza alcun controllo sui processi che attivano.<\/span>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f22127 elementor-widget elementor-widget-text-editor\" data-id=\"3f22127\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><strong><span class=\"TextRun MacChromeBold SCXW106574657 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW106574657 BCX0\">Shadow AI: quali sono i rischi<\/span><\/span><\/strong><\/h2><p style=\"font-weight: 400;\"><span class=\"TextRun SCXW30514132 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW30514132 BCX0\">L<\/span><span class=\"NormalTextRun SCXW30514132 BCX0\">\u2019<\/span><span class=\"NormalTextRun SCXW30514132 BCX0\">utilizzo non controllato di tecnologie AI pu\u00f2 aprire la strada a numerosi problemi, tra cui:<\/span><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW30514132 BCX0\"><span class=\"SCXW30514132 BCX0\">\u00a0<\/span><\/span><\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">rivelazione accidentale di dati sensibili<\/span><\/b><span data-contrast=\"auto\">: strumenti utilizzati senza supervisione potrebbero trasmettere o salvare <\/span><b><span data-contrast=\"auto\">informazioni aziendali critiche su server esterni<\/span><\/b><span data-contrast=\"auto\">, esponendo l\u2019organizzazione a <\/span><a href=\"https:\/\/www.cybersecurity360.it\/soluzioni-aziendali\/chatgpt-enterprise-entra-nel-mondo-del-lavoro-ma-privacy-e-trasparenza-restano-questioni-aperte\/\"><span data-contrast=\"none\">violazioni di sicurezza.<\/span><\/a>\u00a0<\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">errori nella gestione dei dati<\/span><\/b><span data-contrast=\"auto\">: l\u2019assenza di linee guida chiare pu\u00f2 portare a <\/span><b><span data-contrast=\"auto\">processi errati o mal configurati<\/span><\/b><span data-contrast=\"auto\">, con conseguenze gravi per la compliance normativa e la governance interna.<\/span> <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">attacchi informatici<\/span><\/b><span data-contrast=\"auto\">: i dati confidenziali che vengono esposti in questi utilizzi non tracciati portano ad aumentare <\/span><b><span data-contrast=\"auto\">il rischio di attacchi informatici<\/span><\/b><span data-contrast=\"auto\">. Ci sono, infatti, diversi studi e articoli<\/span> <span data-contrast=\"auto\">che confermano come queste informazioni poi possono infatti venire sfruttate per <\/span><b><span data-contrast=\"auto\">tentativi di phishing e di social engineering con pi\u00f9 alta probabilit\u00e0 di successo<\/span><\/b><span data-contrast=\"auto\">.<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">costi nascosti e debito tecnico<\/span><\/b><span data-contrast=\"auto\">: uno degli aspetti pi\u00f9 critici dello Shadow AI \u00e8 il rischio di <\/span><b><span data-contrast=\"auto\">alimentare il debito tecnico<\/span><\/b><span data-contrast=\"auto\">. Se questi strumenti dovessero venire implementati senza <\/span><b><span data-contrast=\"auto\">un\u2019analisi preventiva,<\/span><\/b><span data-contrast=\"auto\"> potrebbero sorgere in futuro <\/span><b><span data-contrast=\"auto\">problemi significativi di integrazione con i sistemi aziendali esistenti<\/span><\/b><span data-contrast=\"auto\">, complicando ulteriormente la gestione operativa e aumentando i costi per riconfigurare o sostituire le tecnologie non compatibili.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li><\/ul><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">dipendenza critica dai processi AI non monitorati<\/span><\/b><span data-contrast=\"auto\">: se un processo basato su un\u2019applicazione AI non ufficiale <\/span><b><span data-contrast=\"auto\">dovesse venire meno o smettere di funzionare<\/span><\/b><span data-contrast=\"auto\">, le conseguenze potrebbero essere catastrofiche. L&#8217;interruzione <\/span><b><span data-contrast=\"auto\">potrebbe bloccare interi flussi di lavoro aziendali,<\/span><\/b><span data-contrast=\"auto\"> portando a ritardi operativi, perdite economiche e difficolt\u00e0 a ristabilire la normalit\u00e0. \u00c8 come un castello di carte che crolla improvvisamente, rivelando tutta la fragilit\u00e0 di <\/span><b><span data-contrast=\"auto\">una struttura non supervisionata.<\/span><\/b>\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-adbad63 elementor-widget elementor-widget-text-editor\" data-id=\"adbad63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW176071292 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW176071292 BCX0\">Questi rischi sottolineano l\u2019importanza di <\/span><\/span><span class=\"TextRun MacChromeBold SCXW176071292 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW176071292 BCX0\">un approccio proattivo e strutturato<\/span><\/span><span class=\"TextRun SCXW176071292 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW176071292 BCX0\"> per monitorare e gestire le applicazioni AI utilizzate in azienda.<\/span><\/span><span class=\"EOP SCXW176071292 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7e041d elementor-widget elementor-widget-text-editor\" data-id=\"f7e041d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><strong><span class=\"TextRun MacChromeBold SCXW54604036 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW54604036 BCX0\">Come difendersi dallo Shadow AI<\/span><\/span><\/strong><\/h2><p><b><span data-contrast=\"auto\">Monitorare gli accessi ad ogni applicazione AI tramite<\/span><\/b> <b><span data-contrast=\"auto\">API dedicate<\/span><\/b><span data-contrast=\"auto\"> pu\u00f2 sembrare una soluzione ideale, ma nella pratica si <\/span><b><span data-contrast=\"auto\">rivela inefficiente e insostenibile<\/span><\/b><span data-contrast=\"auto\">. Creare un\u2019API personalizzata per ogni strumento o applicazione utilizzata richiederebbe <\/span><b><span data-contrast=\"auto\">un enorme investimento di risorse tecniche e di tempo<\/span><\/b><span data-contrast=\"auto\">, senza contare la complessit\u00e0 di mantenere e aggiornare costantemente queste integrazioni.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Inoltre, la proliferazione incontrollata di nuove applicazioni AI rende <\/span><b><span data-contrast=\"auto\">questa strategia impraticabile<\/span><\/b><span data-contrast=\"auto\">, poich\u00e9 il panorama tecnologico <\/span><b><span data-contrast=\"auto\">evolve pi\u00f9 rapidamente delle capacit\u00e0 di adattamento delle infrastrutture IT tradizionali.<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Per questo motivo \u00e8 fondamentale adottare <\/span><b><span data-contrast=\"auto\">approcci pi\u00f9 centralizzati e automatizzati<\/span><\/b><span data-contrast=\"auto\">, come l\u2019utilizzo di <\/span><b><span data-contrast=\"auto\">processi e strumenti di Software Asset Management (SAM),<\/span><\/b><span data-contrast=\"auto\"> in grado di rilevare e monitorare in modo trasversale <\/span><b><span data-contrast=\"auto\">tutte le applicazioni utilizzate dai dipendenti<\/span><\/b><span data-contrast=\"auto\"> senza la necessit\u00e0 di creare soluzioni ad hoc per ciascuna di esse.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a7811b elementor-widget elementor-widget-text-editor\" data-id=\"1a7811b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Grazie a processi e tecnologie SAM, infatti, \u00e8 possibile:\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3>monitorare l\u2019utilizzo di software in azienda\u00a0<\/h3>\n<p><span data-contrast=\"auto\">Diventa, infatti, possibile con questi strumenti <\/span><b><span data-contrast=\"auto\">rilevare automaticamente tutte le applicazioni utilizzate sui dispositivi aziendali,<\/span><\/b><span data-contrast=\"auto\"> inclusi i software non autorizzati e gli accessi tramite browser. Questo avviene attraverso <\/span><b><span data-contrast=\"auto\">l\u2019analisi dei dati di utilizzo<\/span><\/b> <b><span data-contrast=\"auto\">provenienti<\/span><\/b> <b><span data-contrast=\"auto\">da endpoint, reti e sistemi aziendali<\/span><\/b><span data-contrast=\"auto\">: questo aiuta a tracciare in modo preciso <\/span><b><span data-contrast=\"auto\">quali software vengono eseguiti, con quale frequenza e in quali contesti<\/span><\/b><span data-contrast=\"auto\">. Grazie a questa visibilit\u00e0 completa, \u00e8 possibile<\/span><b><span data-contrast=\"auto\"> individuare<\/span><\/b> <b><span data-contrast=\"auto\">rapidamente strumenti e utilizzi AI non conformi o non approvati,<\/span><\/b><span data-contrast=\"auto\"> per intervenire tempestivamente e ridurre i rischi associati.<\/span><\/p>\n<h3>creare report dettagliati per verificare chi manipola informazioni critiche\u00a0<\/h3>\n<p><span data-contrast=\"auto\">Il fatto di avere disponibili <\/span><b><span data-contrast=\"auto\">analisi puntuali sull\u2019uso delle piattaforme<\/span><\/b> <b><span data-contrast=\"auto\">AI <\/span><\/b><span data-contrast=\"auto\">aiuta a identificare chi utilizza questi strumenti, in quali reparti e per quali finalit\u00e0. Questi report sono fondamentali <\/span><b><span data-contrast=\"auto\">non solo per mappare le attivit\u00e0,<\/span><\/b><span data-contrast=\"auto\"> ma anche per garantire che l&#8217;accesso ai dati sensibili <\/span><b><span data-contrast=\"auto\">sia limitato alle persone autorizzate<\/span><\/b><span data-contrast=\"auto\">, in conformit\u00e0 con le policy aziendali e le normative sulla protezione dei dati.\u00a0<\/span><\/p>\n<h3>aumentare la consapevolezza interna<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Sapere quali applicazioni sono utilizzate in azienda \u00e8 il primo passo per <\/span><b><span data-contrast=\"auto\">definire politiche di utilizzo e mitigare i rischi. <\/span><\/b><span data-contrast=\"auto\">Le policy di utilizzo devono <\/span><b><span data-contrast=\"auto\">prevedere un processo di approvazione da parte del reparto IT<\/span><\/b><span data-contrast=\"auto\">, che garantisca il rispetto degli standard di sicurezza e la conformit\u00e0 alle normative aziendali. Allo stesso tempo, <\/span><b><span data-contrast=\"auto\">\u00e8 fondamentale sensibilizzare i dipendenti sull&#8217;importanza di una maggiore attenzione nella condivisione dei dati<\/span><\/b><span data-contrast=\"auto\">, per evitare che informazioni sensibili vengano esposte a strumenti non autorizzati o non sicuri.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:360,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8dcaf09 elementor-widget elementor-widget-text-editor\" data-id=\"8dcaf09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW194550875 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW194550875 BCX0\">Conoscere \u00e8 sempre la scelta migliore. Solo con <\/span><\/span><span class=\"TextRun MacChromeBold SCXW194550875 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW194550875 BCX0\">un <strong>approccio consapevole e strutturato<\/strong><\/span><\/span><span class=\"TextRun SCXW194550875 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"> <span class=\"NormalTextRun SCXW194550875 BCX0\">come il SAM <\/span><span class=\"NormalTextRun SCXW194550875 BCX0\">\u00e8 possibile sfruttare i vantaggi dell\u2019intelligenza artificiale <\/span><\/span><strong><span class=\"TextRun MacChromeBold SCXW194550875 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW194550875 BCX0\">senza compromettere la sicurezza e la reputazione aziendale.<\/span><\/span><\/strong><span class=\"LineBreakBlob BlobObject DragDrop SCXW194550875 BCX0\"><span class=\"SCXW194550875 BCX0\">\u00a0<\/span><br class=\"SCXW194550875 BCX0\" \/><\/span><span class=\"LineBreakBlob BlobObject DragDrop SCXW194550875 BCX0\"><span class=\"SCXW194550875 BCX0\">\u00a0<\/span><br class=\"SCXW194550875 BCX0\" \/><\/span><span class=\"TextRun SCXW194550875 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW194550875 BCX0\">In WEGG offriamo <\/span><\/span><strong><span class=\"TextRun MacChromeBold SCXW194550875 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW194550875 BCX0\">una consulenza esperta in <\/span><span class=\"NormalTextRun SCXW194550875 BCX0\">questo ambito<\/span><span class=\"NormalTextRun SCXW194550875 BCX0\">,<\/span><\/span><\/strong><span class=\"TextRun SCXW194550875 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"> <span class=\"NormalTextRun SCXW194550875 BCX0\">allo scopo di aiutarvi a <\/span><span class=\"NormalTextRun SCXW194550875 BCX0\">monitorare e gestire efficacemente gli applicativi aziendali, inclusi quelli non autorizzati. Grazie <\/span><\/span><strong><span class=\"TextRun MacChromeBold SCXW194550875 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW194550875 BCX0\">all&#8217;utilizzo di tecnologie di<\/span><\/span> <span class=\"TextRun MacChromeBold SCXW194550875 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW194550875 BCX0\">visibilit\u00e0 IT avanzata<\/span><\/span><\/strong><span class=\"TextRun SCXW194550875 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW194550875 BCX0\"><strong>,<\/strong> come gli strumenti d<\/span><span class=\"NormalTextRun SCXW194550875 BCX0\">el nostro partner <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SpellingErrorHighlight SCXW194550875 BCX0\">Flexera<\/span><span class=\"NormalTextRun SCXW194550875 BCX0\">, <\/span><span class=\"NormalTextRun SCXW194550875 BCX0\">possiamo supportarvi nell\u2019ottenere in tempo reale <\/span><span class=\"NormalTextRun SCXW194550875 BCX0\">una panoramica completa del vostro ecosistema software<\/span><span class=\"NormalTextRun SCXW194550875 BCX0\">.<\/span><\/span><span class=\"EOP SCXW194550875 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d4c0349\" data-id=\"d4c0349\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54a6278 elementor-widget elementor-widget-text-editor\" data-id=\"54a6278\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Approfondimenti<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dceb23 elementor-grid-1 elementor-posts--thumbnail-none elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-posts\" data-id=\"6dceb23\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;classic_columns&quot;:&quot;1&quot;,&quot;classic_columns_tablet&quot;:&quot;2&quot;,&quot;classic_columns_mobile&quot;:&quot;1&quot;,&quot;classic_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;classic_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;classic_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.classic\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-classic elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-38735 post type-post status-publish format-standard has-post-thumbnail hentry category-asset-management category-cloud-management category-financial-management category-gestione-asset-it category-live-event category-news category-riduzione-spesa-it category-risk-avoidance category-spend-optimization tag-flexera-emea-partner-roadshow tag-innovazioni-gestione-it-cloud tag-itam-gestione-asset-it tag-ottimizzazione-spesa-it tag-riduzione-non-conformita-software tag-saas-e-finops-soluzioni-it tag-sam tag-software-asset-management tag-tendenze-sam-2024 tag-wegg-eventi-it-amsterdam\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/wegg-al-flexera-roadshow-innovazioni-nella-gestione-degli-asset-it\/\" >\n\t\t\t\tWEGG al Flexera Roadshow: innovazioni nella gestione degli asset IT\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-24762 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti category-protezione-dei-dati category-work-from-anywhere category-workplace-security tag-cyber-attacchi tag-everywhere-workplace tag-hacker tag-lavoro-agile tag-lavoro-remoto tag-smart-working\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/lavoro-agile-evitare-attacchi-cyber\/\" >\n\t\t\t\tLavoro agile e attacchi: tutte le minacce all&#8217;Everywhere Workplace\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-38069 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti category-asset-management category-riduzione-spesa-it category-spend-optimization tag-cal tag-core tag-software-asset-management tag-sql-server\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/licenze-per-microsoft-sql-server-una-guida\/\" >\n\t\t\t\tLicenze per Microsoft SQL Server: una guida\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-26181 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti category-business-process-management category-digital-service-experience category-digitalizzazione-processi category-migliorare-erogazione-servizi tag-digitale tag-digitalizzazione tag-servizi\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/self-service-digitale-i-vantaggi\/\" >\n\t\t\t\tSelf-service digitale: perch\u00e9 funziona\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-24785 post type-post status-publish format-standard has-post-thumbnail hentry category-allestimento-postazioni-digitali category-approfondimenti category-work-from-anywhere category-workplace-management tag-everywhere-workplace tag-lavoro-agile tag-lavoro-remoto tag-mobile-device tag-postazioni-agili tag-smart-working\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/everywhere-workplace-come-creare-ambienti-di-lavoro-agili\/\" >\n\t\t\t\tEverywhere Workplace: come creare ambienti di lavoro agili\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-38822 post type-post status-publish format-standard has-post-thumbnail hentry category-approfondimenti category-business-process-management category-cloud-management category-digitalizzazione-processi category-facilitare-adozione-digitale category-gestione-servizi-aziendali category-migliorare-processo-decisionale category-process-automation category-spend-optimization tag-architettura-modulare-erp tag-automazione-processi-aziendali tag-core-erp-pulito tag-digitalizzazione-processi-aziendali tag-low-code-mendix tag-sap-business-technology-platform tag-sap-composable-erp tag-sap-s-4hana-integrazione tag-scalabilita-sistemi-erp tag-soluzioni-low-code-per-erp\" role=\"listitem\">\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wegg.it\/eng\/sap-composable-erp-e-low-code-la-combinazione-vincente-per-evolvere-agilmente\/\" >\n\t\t\t\tSAP Composable ERP e low-code: la combinazione vincente per evolvere agilmente\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bc87895 elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bc87895\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7e6f41e\" data-id=\"7e6f41e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-01244f8 elementor-widget elementor-widget-image\" data-id=\"01244f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" data-src=\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/04\/02-s-pattern02.png\" title=\"02-s pattern02\" alt=\"02-s pattern02\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 1655px; --smush-placeholder-aspect-ratio: 1655\/388;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb98fd6 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"cb98fd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Livello_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 92.25 92.25\" style=\"enable-background:new 0 0 92.25 92.25;\" xml:space=\"preserve\"><polygon points=\"90.25,2.93 90.25,88.84 1.41,0 0,1.41 88.84,90.25 2.93,90.25 2.93,92.25 92.25,92.25 92.25,2.93 \"><\/polygon><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f32d69c elementor-widget elementor-widget-heading\" data-id=\"f32d69c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Hai bisogno di aumentare la visibilit\u00e0 sugli applicativi aziendali?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a20b313 elementor-widget elementor-widget-heading\" data-id=\"a20b313\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Contattaci per una consulenza! <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe88395 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fe88395\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-372754d elementor-button-align-center elementor-widget elementor-widget-form\" data-id=\"372754d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Contattaci per una consulenza\" aria-label=\"Contattaci per una consulenza\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"38949\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"372754d\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Come il Software Asset Management aiuta a monitorare e gestire lo Shadow AI - WEGG\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"38949\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tNome:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-email elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tCognome:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-field_298f6a1 elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_298f6a1\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tEmail aziendale:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[field_298f6a1]\" id=\"form-field-field_298f6a1\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_fa5f1b6 elementor-col-50\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_fa5f1b6\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tNumero di Telefono:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_fa5f1b6]\" id=\"form-field-field_fa5f1b6\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Sono accettati solo numeri e caratteri telefonici (#, -, *, ecc.).\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_c83c665 elementor-col-50\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_c83c665\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tRuolo aziendale:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_c83c665]\" id=\"form-field-field_c83c665\" class=\"elementor-field elementor-size-sm  elementor-field-textual\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tSpiegaci meglio la tua situazione:\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"4\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_687c4cc elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_687c4cc]\" id=\"form-field-field_687c4cc\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\" checked=\"checked\">\n\t\t\t\t<label for=\"form-field-field_687c4cc\">Ho preso visione dell'<a href=\"https:\/\/wegg.it\/privacy-policy\">informativa privacy<\/a> di WEGG e acconsento il trattamento dei miei dati.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_ea8ed71 elementor-col-100\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_ea8ed71]\" id=\"form-field-field_ea8ed71\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\">\n\t\t\t\t<label for=\"form-field-field_ea8ed71\">Voglio rimanere in contatto con WEGG e ricevere contenuti gratuiti.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text\">\n\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_d2bf274]\" id=\"form-field-field_d2bf274\" class=\"elementor-field elementor-size-sm \" style=\"display:none !important;\">\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Invia<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c253fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0c253fd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a87d5fb\" data-id=\"a87d5fb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Discover how SAM prevents the risks of Shadow AI, ensuring security, compliance, and management of corporate AI applications.<\/p>","protected":false},"author":8838,"featured_media":39014,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[14,96,21,111,289,110,23,72],"tags":[506,510,504,507,509,505,502,503,19,508],"class_list":["post-38949","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-approfondimenti","category-artificial-intelligence-anywhere","category-asset-management","category-digitalizzazione-processi","category-gestione-asset-it","category-monitoraggio-asset-it","category-risk-avoidance","category-workplace-security","tag-compliance-normativa-ai","tag-flexera-tecnologia-visibilita","tag-gestione-applicazioni-ai","tag-monitoraggio-software-aziendali","tag-prevenzione-rischi-it","tag-rischi-intelligenza-artificiale","tag-shadow-ai","tag-sicurezza-aziendale-ai","tag-software-asset-management","tag-soluzioni-shadow-it"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Come il Software Asset Management aiuta a monitorare e gestire lo Shadow AI - WEGG<\/title>\n<meta name=\"description\" content=\"Scopri come il SAM previene rischi di Shadow AI, garantendo sicurezza, compliance e gestione delle applicazioni AI aziendali.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wegg.it\/eng\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Come il Software Asset Management aiuta a monitorare e gestire lo Shadow AI - WEGG\" \/>\n<meta property=\"og:description\" content=\"Scopri come il SAM previene rischi di Shadow AI, garantendo sicurezza, compliance e gestione delle applicazioni AI aziendali.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wegg.it\/eng\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/\" \/>\n<meta property=\"og:site_name\" content=\"WEGG\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-21T16:50:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-22T14:27:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/11\/1-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1152\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Giovanni Pigatto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Giovanni Pigatto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/\"},\"author\":{\"name\":\"Giovanni Pigatto\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/person\/5e227588aab87e757d5d534e846725c2\"},\"headline\":\"Come il Software Asset Management aiuta a monitorare e gestire lo Shadow AI\",\"datePublished\":\"2024-11-21T16:50:31+00:00\",\"dateModified\":\"2024-11-22T14:27:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/\"},\"wordCount\":960,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.wegg.it\/#organization\"},\"image\":{\"@id\":\"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/11\/1-2.png\",\"keywords\":[\"Compliance normativa AI\",\"Flexera tecnologia visibilit\u00e0\",\"Gestione applicazioni AI\",\"Monitoraggio software aziendali\",\"Prevenzione rischi IT\",\"Rischi intelligenza artificiale\",\"Shadow AI\",\"Sicurezza aziendale AI\",\"software asset management\",\"Soluzioni Shadow IT\"],\"articleSection\":[\"Approfondimenti\",\"Artificial Intelligence Anywhere\",\"Asset Management\",\"Digitalizzazione processi\",\"Gestione asset IT\",\"Monitoraggio asset IT\",\"Risk Avoidance\",\"Workplace Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/\",\"url\":\"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/\",\"name\":\"Come il Software Asset Management aiuta a monitorare e gestire lo Shadow AI - WEGG\",\"isPartOf\":{\"@id\":\"https:\/\/www.wegg.it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/11\/1-2.png\",\"datePublished\":\"2024-11-21T16:50:31+00:00\",\"dateModified\":\"2024-11-22T14:27:09+00:00\",\"description\":\"Scopri come il SAM previene rischi di Shadow AI, garantendo sicurezza, compliance e gestione delle applicazioni AI aziendali.\",\"breadcrumb\":{\"@id\":\"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/#primaryimage\",\"url\":\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/11\/1-2.png\",\"contentUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2024\/11\/1-2.png\",\"width\":2048,\"height\":1152},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wegg.it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Come il Software Asset Management aiuta a monitorare e gestire lo Shadow AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wegg.it\/#website\",\"url\":\"https:\/\/www.wegg.it\/\",\"name\":\"WEGG\",\"description\":\"The Impact factory\",\"publisher\":{\"@id\":\"https:\/\/www.wegg.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wegg.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.wegg.it\/#organization\",\"name\":\"WEGG\",\"url\":\"https:\/\/www.wegg.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png\",\"contentUrl\":\"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png\",\"width\":968,\"height\":236,\"caption\":\"WEGG\"},\"image\":{\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/it.linkedin.com\/company\/wegg-theimpactfactory\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/person\/5e227588aab87e757d5d534e846725c2\",\"name\":\"Giovanni Pigatto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wegg.it\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/20c04987ca0abd06eb1633671384a5bbbc303cb7fca2f73977063883cd224a19?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/20c04987ca0abd06eb1633671384a5bbbc303cb7fca2f73977063883cd224a19?s=96&d=mm&r=g\",\"caption\":\"Giovanni Pigatto\"},\"url\":\"https:\/\/wegg.it\/eng\/author\/gpigatto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Come il Software Asset Management aiuta a monitorare e gestire lo Shadow AI - WEGG","description":"Scopri come il SAM previene rischi di Shadow AI, garantendo sicurezza, compliance e gestione delle applicazioni AI aziendali.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wegg.it\/eng\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/","og_locale":"en_US","og_type":"article","og_title":"Come il Software Asset Management aiuta a monitorare e gestire lo Shadow AI - WEGG","og_description":"Scopri come il SAM previene rischi di Shadow AI, garantendo sicurezza, compliance e gestione delle applicazioni AI aziendali.","og_url":"https:\/\/wegg.it\/eng\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/","og_site_name":"WEGG","article_published_time":"2024-11-21T16:50:31+00:00","article_modified_time":"2024-11-22T14:27:09+00:00","og_image":[{"width":2048,"height":1152,"url":"https:\/\/wegg.it\/wp-content\/uploads\/2024\/11\/1-2.png","type":"image\/png"}],"author":"Giovanni Pigatto","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Giovanni Pigatto","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/#article","isPartOf":{"@id":"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/"},"author":{"name":"Giovanni Pigatto","@id":"https:\/\/www.wegg.it\/#\/schema\/person\/5e227588aab87e757d5d534e846725c2"},"headline":"Come il Software Asset Management aiuta a monitorare e gestire lo Shadow AI","datePublished":"2024-11-21T16:50:31+00:00","dateModified":"2024-11-22T14:27:09+00:00","mainEntityOfPage":{"@id":"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/"},"wordCount":960,"commentCount":0,"publisher":{"@id":"https:\/\/www.wegg.it\/#organization"},"image":{"@id":"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2024\/11\/1-2.png","keywords":["Compliance normativa AI","Flexera tecnologia visibilit\u00e0","Gestione applicazioni AI","Monitoraggio software aziendali","Prevenzione rischi IT","Rischi intelligenza artificiale","Shadow AI","Sicurezza aziendale AI","software asset management","Soluzioni Shadow IT"],"articleSection":["Approfondimenti","Artificial Intelligence Anywhere","Asset Management","Digitalizzazione processi","Gestione asset IT","Monitoraggio asset IT","Risk Avoidance","Workplace Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/","url":"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/","name":"Come il Software Asset Management aiuta a monitorare e gestire lo Shadow AI - WEGG","isPartOf":{"@id":"https:\/\/www.wegg.it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/#primaryimage"},"image":{"@id":"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2024\/11\/1-2.png","datePublished":"2024-11-21T16:50:31+00:00","dateModified":"2024-11-22T14:27:09+00:00","description":"Scopri come il SAM previene rischi di Shadow AI, garantendo sicurezza, compliance e gestione delle applicazioni AI aziendali.","breadcrumb":{"@id":"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/#primaryimage","url":"https:\/\/wegg.it\/wp-content\/uploads\/2024\/11\/1-2.png","contentUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2024\/11\/1-2.png","width":2048,"height":1152},{"@type":"BreadcrumbList","@id":"https:\/\/wegg.it\/come-il-software-asset-management-aiuta-a-monitorare-e-gestire-lo-shadow-ai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wegg.it\/"},{"@type":"ListItem","position":2,"name":"Come il Software Asset Management aiuta a monitorare e gestire lo Shadow AI"}]},{"@type":"WebSite","@id":"https:\/\/www.wegg.it\/#website","url":"https:\/\/www.wegg.it\/","name":"WEGG","description":"The Impact factory","publisher":{"@id":"https:\/\/www.wegg.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wegg.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.wegg.it\/#organization","name":"WEGG","url":"https:\/\/www.wegg.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/","url":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png","contentUrl":"https:\/\/wegg.it\/wp-content\/uploads\/2022\/03\/cropped-WEGG-marchio-RGB.png","width":968,"height":236,"caption":"WEGG"},"image":{"@id":"https:\/\/www.wegg.it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/it.linkedin.com\/company\/wegg-theimpactfactory"]},{"@type":"Person","@id":"https:\/\/www.wegg.it\/#\/schema\/person\/5e227588aab87e757d5d534e846725c2","name":"Giovanni Pigatto","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wegg.it\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/20c04987ca0abd06eb1633671384a5bbbc303cb7fca2f73977063883cd224a19?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/20c04987ca0abd06eb1633671384a5bbbc303cb7fca2f73977063883cd224a19?s=96&d=mm&r=g","caption":"Giovanni Pigatto"},"url":"https:\/\/wegg.it\/eng\/author\/gpigatto\/"}]}},"_links":{"self":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts\/38949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/users\/8838"}],"replies":[{"embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/comments?post=38949"}],"version-history":[{"count":20,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts\/38949\/revisions"}],"predecessor-version":[{"id":38970,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/posts\/38949\/revisions\/38970"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/media\/39014"}],"wp:attachment":[{"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/media?parent=38949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/categories?post=38949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wegg.it\/eng\/wp-json\/wp\/v2\/tags?post=38949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}