{"id":1831,"date":"2021-12-03T10:13:29","date_gmt":"2021-12-03T10:13:29","guid":{"rendered":"https:\/\/www.deeplab.it\/cybersecurity\/"},"modified":"2025-07-16T12:18:34","modified_gmt":"2025-07-16T12:18:34","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.deeplab.it\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1831\" class=\"elementor elementor-1831 elementor-710\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c212f31 e-con-full e-flex e-con e-parent\" data-id=\"c212f31\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d743608 e-con-full e-flex e-con e-parent\" data-id=\"2d743608\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b0bfe6f elementor-widget elementor-widget-heading\" data-id=\"b0bfe6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Services\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0f22ce elementor-widget elementor-widget-text-editor\" data-id=\"b0f22ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Protecting data and digital infrastructure is a top priority in today\u2019s increasingly connected world. We offer <strong>advanced cybersecurity<\/strong> solutions designed to prevent, detect, and respond effectively to all types of cyber threats. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4189566 e-con-full e-flex e-con e-parent\" data-id=\"4189566\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6571da0 elementor-widget elementor-widget-heading\" data-id=\"6571da0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Deep Lab Security Lab\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-620b174 elementor-widget elementor-widget-text-editor\" data-id=\"620b174\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our lab is accredited by the Italian National Cybersecurity Agency (ACN) as an official Security Analysis Laboratory (LAP).<\/p><p>This enables us to provide high-level assessments of ICT products, systems, and components, in compliance with national cybersecurity standards.<\/p><p>We support public and private organizations with:<\/p><p>\u2022 Independent technical analysis of hardware, firmware, and software<br \/>\u2022 Vulnerability and compliance testing aligned with major standards (e.g., ISO\/IEC 17025, Common Criteria)<br \/>\u2022 Assistance with certification and compliance processes, including for critical infrastructure and sensitive environments<\/p><p>We operate with advanced tools, internationally recognized methodologies, and a team of cybersecurity specialists to ensure maximum reliability, transparency, and quality.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9950f2d e-con-full e-flex e-con e-parent\" data-id=\"9950f2d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68a328b elementor-widget elementor-widget-heading\" data-id=\"68a328b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Our Core Services:<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1bd4058 e-con-full e-flex e-con e-child\" data-id=\"1bd4058\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b108358 e-con-full e-flex e-con e-child\" data-id=\"b108358\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-384c412 elementor-widget elementor-widget-heading\" data-id=\"384c412\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Penetration Testing<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-91663e3 elementor-widget elementor-widget-text-editor\" data-id=\"91663e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Simulated cyberattacks to identify and resolve vulnerabilities before they can be exploited by malicious actors.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-362f6f3 e-con-full e-flex e-con e-child\" data-id=\"362f6f3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bc51cc3 elementor-widget elementor-widget-heading\" data-id=\"bc51cc3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Vulnerability Assessment\n<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b15138 elementor-widget elementor-widget-text-editor\" data-id=\"4b15138\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSystematic identification of weaknesses in systems and applications, supported by detailed reports and remediation plans.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c6887c6 e-con-full e-flex e-con e-child\" data-id=\"c6887c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f5300cf e-con-full e-flex e-con e-child\" data-id=\"f5300cf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f67d498 elementor-widget elementor-widget-heading\" data-id=\"f67d498\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Security Monitoring &amp; Incident Response<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d2f90b elementor-widget elementor-widget-text-editor\" data-id=\"5d2f90b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t Continuous monitoring of corporate networks with fast, effective interventions in the event of anomalies or security breaches.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9efa286 e-con-full e-flex e-con e-child\" data-id=\"9efa286\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf42aa1 elementor-widget elementor-widget-heading\" data-id=\"cf42aa1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Consulting &amp; Training\n<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1638f4 elementor-widget elementor-widget-text-editor\" data-id=\"f1638f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tStrategic and operational support for IT infrastructure protection, along with customized training programs for internal staff.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1468405 elementor-widget elementor-widget-spacer\" data-id=\"1468405\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68ffcf1 elementor-widget elementor-widget-heading\" data-id=\"68ffcf1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What Sets Us Apart?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86a987f elementor-widget elementor-widget-text-editor\" data-id=\"86a987f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our team includes highly qualified professionals, all holding the prestigious <strong>OSCP (Offensive Security Certified Professional)<\/strong> certification\u2014one of the most respected in the field of ethical hacking and penetration testing. This guarantees expert-level interventions, up-to-date methodologies, and a practical, results-driven security approach. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dd401fe e-con-full e-flex e-con e-parent\" data-id=\"dd401fe\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a0e4217 elementor-cta--layout-image-right elementor-cta--valign-middle elementor-cta--mobile-layout-image-above elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"a0e4217\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h6 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tTailored Security\t\t\t\t\t<\/h6>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__description elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tWe are ready to protect what matters most to your organization.\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item \">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-md\" href=\"mailto:info@deeplab.it\">\n\t\t\t\t\t\tContact us for a personalized assessment\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Services Protecting data and digital infrastructure is a top priority in today\u2019s increasingly connected world. We offer advanced cybersecurity solutions designed to prevent, detect, and respond effectively to all types of cyber threats. The Deep Lab Security Lab Our lab is accredited by the Italian National Cybersecurity Agency (ACN) as an official Security Analysis [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":1765,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1831","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity - Deep Lab<\/title>\n<meta name=\"description\" content=\"DeepLab \u00e8 una startup innovativa nata dalla collaborazione di un\u2019azienda di esperienza decennale in innovazione IT e un\u2019organizzazione di rappresentanza delle piccole e medie imprese.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.deeplab.it\/en\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity - Deep Lab\" \/>\n<meta property=\"og:description\" content=\"DeepLab \u00e8 una startup innovativa nata dalla collaborazione di un\u2019azienda di esperienza decennale in innovazione IT e un\u2019organizzazione di rappresentanza delle piccole e medie imprese.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.deeplab.it\/en\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Deep Lab\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-16T12:18:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.deeplab.it\/wp-content\/uploads\/2019\/06\/cropped-cropped-shutterstock_638445265.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"518\" \/>\n\t<meta property=\"og:image:height\" content=\"348\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.deeplab.it\\\/en\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.deeplab.it\\\/en\\\/cybersecurity\\\/\",\"name\":\"Cybersecurity - Deep Lab\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.deeplab.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.deeplab.it\\\/en\\\/cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.deeplab.it\\\/en\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.deeplab.it\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/cropped-cropped-shutterstock_638445265.jpg\",\"datePublished\":\"2021-12-03T10:13:29+00:00\",\"dateModified\":\"2025-07-16T12:18:34+00:00\",\"description\":\"DeepLab \u00e8 una startup innovativa nata dalla collaborazione di un\u2019azienda di esperienza decennale in innovazione IT e un\u2019organizzazione di rappresentanza delle piccole e medie imprese.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.deeplab.it\\\/en\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.deeplab.it\\\/en\\\/cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.deeplab.it\\\/en\\\/cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.deeplab.it\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/cropped-cropped-shutterstock_638445265.jpg\",\"contentUrl\":\"https:\\\/\\\/www.deeplab.it\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/cropped-cropped-shutterstock_638445265.jpg\",\"width\":518,\"height\":348},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.deeplab.it\\\/en\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.deeplab.it\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.deeplab.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.deeplab.it\\\/en\\\/\",\"name\":\"Deep Lab\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.deeplab.it\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.deeplab.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.deeplab.it\\\/en\\\/#organization\",\"name\":\"Deeplab\",\"url\":\"https:\\\/\\\/www.deeplab.it\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.deeplab.it\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.deeplab.it\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/logo_orizzontale.png\",\"contentUrl\":\"https:\\\/\\\/www.deeplab.it\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/logo_orizzontale.png\",\"width\":1963,\"height\":439,\"caption\":\"Deeplab\"},\"image\":{\"@id\":\"https:\\\/\\\/www.deeplab.it\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity - Deep Lab","description":"DeepLab \u00e8 una startup innovativa nata dalla collaborazione di un\u2019azienda di esperienza decennale in innovazione IT e un\u2019organizzazione di rappresentanza delle piccole e medie imprese.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.deeplab.it\/en\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity - Deep Lab","og_description":"DeepLab \u00e8 una startup innovativa nata dalla collaborazione di un\u2019azienda di esperienza decennale in innovazione IT e un\u2019organizzazione di rappresentanza delle piccole e medie imprese.","og_url":"https:\/\/www.deeplab.it\/en\/cybersecurity\/","og_site_name":"Deep Lab","article_modified_time":"2025-07-16T12:18:34+00:00","og_image":[{"width":518,"height":348,"url":"https:\/\/www.deeplab.it\/wp-content\/uploads\/2019\/06\/cropped-cropped-shutterstock_638445265.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.deeplab.it\/en\/cybersecurity\/","url":"https:\/\/www.deeplab.it\/en\/cybersecurity\/","name":"Cybersecurity - Deep Lab","isPartOf":{"@id":"https:\/\/www.deeplab.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.deeplab.it\/en\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.deeplab.it\/en\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.deeplab.it\/wp-content\/uploads\/2019\/06\/cropped-cropped-shutterstock_638445265.jpg","datePublished":"2021-12-03T10:13:29+00:00","dateModified":"2025-07-16T12:18:34+00:00","description":"DeepLab \u00e8 una startup innovativa nata dalla collaborazione di un\u2019azienda di esperienza decennale in innovazione IT e un\u2019organizzazione di rappresentanza delle piccole e medie imprese.","breadcrumb":{"@id":"https:\/\/www.deeplab.it\/en\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.deeplab.it\/en\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.deeplab.it\/en\/cybersecurity\/#primaryimage","url":"https:\/\/www.deeplab.it\/wp-content\/uploads\/2019\/06\/cropped-cropped-shutterstock_638445265.jpg","contentUrl":"https:\/\/www.deeplab.it\/wp-content\/uploads\/2019\/06\/cropped-cropped-shutterstock_638445265.jpg","width":518,"height":348},{"@type":"BreadcrumbList","@id":"https:\/\/www.deeplab.it\/en\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.deeplab.it\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.deeplab.it\/en\/#website","url":"https:\/\/www.deeplab.it\/en\/","name":"Deep Lab","description":"","publisher":{"@id":"https:\/\/www.deeplab.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.deeplab.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.deeplab.it\/en\/#organization","name":"Deeplab","url":"https:\/\/www.deeplab.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.deeplab.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.deeplab.it\/wp-content\/uploads\/2019\/05\/logo_orizzontale.png","contentUrl":"https:\/\/www.deeplab.it\/wp-content\/uploads\/2019\/05\/logo_orizzontale.png","width":1963,"height":439,"caption":"Deeplab"},"image":{"@id":"https:\/\/www.deeplab.it\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.deeplab.it\/en\/wp-json\/wp\/v2\/pages\/1831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deeplab.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.deeplab.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.deeplab.it\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deeplab.it\/en\/wp-json\/wp\/v2\/comments?post=1831"}],"version-history":[{"count":7,"href":"https:\/\/www.deeplab.it\/en\/wp-json\/wp\/v2\/pages\/1831\/revisions"}],"predecessor-version":[{"id":1840,"href":"https:\/\/www.deeplab.it\/en\/wp-json\/wp\/v2\/pages\/1831\/revisions\/1840"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.deeplab.it\/en\/wp-json\/wp\/v2\/media\/1765"}],"wp:attachment":[{"href":"https:\/\/www.deeplab.it\/en\/wp-json\/wp\/v2\/media?parent=1831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}