{"id":384338,"date":"2020-04-22T06:23:40","date_gmt":"2020-04-22T13:23:40","guid":{"rendered":"https:\/\/blog.webex.com\/uncategorized-it\/come-webex-mantiene-la-collaborazione-sicura-mentre-si-lavora-da-remoto\/"},"modified":"2020-04-22T06:23:40","modified_gmt":"2020-04-22T13:23:40","slug":"come-webex-mantiene-la-collaborazione-sicura-mentre-si-lavora-da-remoto","status":"publish","type":"post","link":"https:\/\/blog.webex.com\/it\/collaborazione\/videoconferenze\/come-webex-mantiene-la-collaborazione-sicura-mentre-si-lavora-da-remoto\/","title":{"rendered":"Come Webex mantiene la collaborazione sicura mentre si lavora da ..."},"content":{"rendered":"<p><span data-contrast=\"auto\">Molti di voi stanno conducendo questi tempi incerti e responsabili per aiutare la vostra azienda, persone e clienti <\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"> a <\/span><span data-contrast=\"auto\">rimanere connessi <\/span><span data-contrast=\"auto\"><\/span> <span data-contrast=\"auto\">e<\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"> <\/span>produttivi.<span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\">Le nostre promesse rimangono invariate: <\/span><b><br \/>\n  <i><br \/>\n    <span data-contrast=\"auto\">Stiamo continuando a fare tutto il possibile per supportare il funzionamento remoto e la continuit\u00e0 aziendale per garantire la sicurezza dei<\/span>   <\/i> <\/b><b>   <i>     <span data-contrast=\"auto\"> <\/span>   <\/i> <\/b><b>   <i>     <span data-contrast=\"auto\"> dipendenti e della sicurezza.<\/span><br \/>\n  <\/i><br \/>\n<\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{}\" data-wac-het=\"1\">\u00a0<\/span><\/p>\n<h2><span><br \/>\n  <strong data-wp-editing=\"1\"><br \/>\n    <a href=\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/04\/0d876a50-telehealth_deskpro_webex.jpg\"><br \/>\n      <img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-320224\" src=\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/04\/0d876a50-telehealth_deskpro_webex.jpg\" alt=\"TeleHealth_DeskPro_webex\" width=\"475\" height=\"317\" \/><br \/>\n    <\/a>La sicurezza della videoconferenza \u00e8 pi\u00f9 importante che mai<\/strong><br \/>\n<\/span><\/h2>\n<p><span data-contrast=\"auto\">Stiamo consentendo di videoconferenza nelle nostre case<\/span><span data-contrast=\"auto\"> per lavorare, apprendere e comunicare. Occorre essere certi che qualsiasi oggetto inserito nell&#8217;ambiente domestico sia al sicuro. Quando si utilizza una tecnologia per le riunioni, si affidano informazioni confidenziali e proprietarie a tale piattaforma, pertanto le societ\u00e0 devono agire per proteggere l&#8217;integrit\u00e0 delle relative attivit\u00e0, dipendenti e <\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"> clienti. In caso di assistenza sanitaria, nessuno desidera avere a che fare con gli archivi della<\/span><span data-contrast=\"auto\"> famiglia.<\/span><span data-contrast=\"auto\"> Inoltre, mentre i bambini in tutto il mondo continuano ad apprendere e connettersi virtualmente, dobbiamo assicurarci che siano protetti.\u00a0<\/span><span data-ccp-props=\"{}\" data-wac-het=\"1\">\u00a0<\/span><\/p>\n<h2><span><br \/>\n  <strong>Soluzioni facili da usare, affidabili e affidabili<\/strong><br \/>\n<\/span><\/h2>\n<p><span data-contrast=\"auto\">Un numero sempre maggiore di organizzazioni sta assumendo un&#8217;occhiata alle relative soluzioni di collaborazione poich\u00e9 i problemi relativi alle riunioni vengono evase e impostazioni di sicurezza non sicure mettevano gli<\/span> <span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"> <\/span> <span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"> utenti<\/span> <span data-contrast=\"auto\">a <\/span><span data-contrast=\"auto\"><\/span> <span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\">rischio. I clienti desiderano<\/span><span data-contrast=\"auto\">utilizzare soluzioni<\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\">affidabili, sicure e<\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\">affidabili.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{}\" data-wac-het=\"1\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Cisco ha una collaborazione di lungo periodo con le organizzazioni per la sicurezza e la privacy ed \u00e8 stata in grado di costruire una cultura della sicurezza attraverso<\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\">l&#8217;organizzazione<\/span><span data-contrast=\"auto\">. <\/span><span data-contrast=\"auto\">Cisco Webex \u00e8 supportato dalla cronologia e<\/span> <span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"none\"> dall&#8217;esperienza di Cisco nella sicurezza, <\/span><span data-contrast=\"none\"> <\/span><span data-contrast=\"none\"> <\/span>dalla rete<span data-contrast=\"none\">agli endpoint, al centro dati e si estende ai nostri servizi cloud.<\/span><span data-ccp-props=\"{}\" data-wac-het=\"1\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Nel mio ruolo in Cisco, il mio team si concentra su come creare la sicurezza e la<\/span><span data-contrast=\"none\"> <\/span><span data-contrast=\"none\"> privacy<\/span> <span data-contrast=\"none\">in Cisco <\/span><span data-contrast=\"none\">Webex<\/span><span data-contrast=\"none\"> per impostazione predefinita.\u00a0<\/span> <span data-contrast=\"none\">Sono contento di questo argomento e ho desiderato evidenziare alcuni modi in cui stiamo aiutando i nostri clienti a collaborare in<\/span><span data-contrast=\"none\">sicurezza.<\/span><span data-ccp-props=\"{}\" data-wac-het=\"1\">\u00a0<\/span><\/p>\n<h2><span><br \/>\n  <b>Ciclo di vita e privacy dati<\/b>   <b>S oftware D<\/b>   <b>sicuri<\/b>\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\"><br \/>\n  <a href=\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/04\/8b87bfec-users-data.jpg\"><br \/>\n    <img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-320222\" src=\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/04\/8b87bfec-users-data.jpg\" alt=\"dati utenti \" width=\"475\" height=\"317\" \/><br \/>\n  <\/a>Il ciclo di vita di sviluppo sicuro di Cisco \u00e8 stato rilevato come creare tutti i nostri prodotti ed \u00e8 bloccato dal nostro approccio aperto e trasparente<\/span><span data-contrast=\"none\">  <\/span><span data-contrast=\"none\"><\/span><span data-contrast=\"none\"> <\/span><span data-contrast=\"none\">con<\/span><span data-contrast=\"none\"> i <\/span><span data-contrast=\"none\"><\/span><span data-contrast=\"none\"> clienti.<\/span><span data-contrast=\"none\">\u00a0<\/span> <span data-contrast=\"none\">L&#8217;organizzazione Cisco Security and Trust collabora con i team tecnici in tutto Cisco, incluso Webex, per costruire la sicurezza e la privacy nei nostri prodotti utilizzando il ciclo di vita di sviluppo sicuro di Cisco che include test di penetrazione proattivo e modelli di minaccia, oltre a valutazione <\/span><span data-contrast=\"none\"><\/span><span data-contrast=\"none\">  <\/span><span data-contrast=\"none\"><\/span><span data-contrast=\"none\"><\/span><span data-contrast=\"none\">  <\/span><span data-contrast=\"none\"><\/span><span data-contrast=\"none\"> dell&#8217;impatto sulla <\/span><span data-contrast=\"none\">privacy dei <\/span><span data-contrast=\"none\"><\/span><span data-contrast=\"none\">prodotti.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559740&quot;:259}\" data-wac-het=\"1\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Cisco prende molto di pi\u00f9 la privacy dell&#8217;utente. <\/span><span data-contrast=\"none\">Per questo motivo<\/span> <span data-contrast=\"none\">la nostra governance della privacy garantisce di pubblicare schede tecniche sulla privacy e mappe dei dati della privacy per tutti i nostri prodotti <\/span><a href=\"|https:\/\/trustportal.cisco.com\/c\/r\/ctp\/trust-portal.html?doctype=Privacy%20Data%20Sheet Privacy%20Data%20Map&#038;search_keyword=webex%20meetings#\/customer_transparency\/pdfViewer\/c%2Fdam%2Fr%2Fctp%2Fdocs%2Fprivacydatamap%2Fcollaboration%2Fwebex-meetings-privacy-data-map.pdf?docClassification=public\">   <span data-contrast=\"none\"><\/span> <\/a><span data-contrast=\"none\">  <\/span><a href=\"https:\/\/www.cisco.com\/c\/en\/us\/about\/trust-center.html\">   <span data-contrast=\"none\">sul nostro Centro <\/span> <\/a><span data-contrast=\"none\"><\/span><span data-contrast=\"none\">protezione. <\/span><span data-contrast=\"none\">Siamo molto certi della nostra cronologia e della nostra conoscenza dei programmi sulla privacy e siamo conformi con GDPR, HIPAA, un d FERPA , tra gli altri &#8211; e siamo anche certificati <\/span><span data-contrast=\"none\"><\/span><span data-contrast=\"none\"><\/span> <span data-contrast=\"none\"><\/span><span data-contrast=\"none\"><\/span><span data-contrast=\"none\"> HITRUST<\/span><span data-contrast=\"none\">.<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{}\" data-wac-het=\"1\">\u00a0<\/span><span data-ccp-props=\"{}\" data-wac-het=\"1\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Inoltre, la pratica di Cisco consiste nel risolvere e divulgare le vulnerabilit\u00e0, indipendentemente se riscontrate internamente o esternamente <\/span><span data-contrast=\"none\">da terze<\/span><span data-contrast=\"none\">parti.<\/span> <span data-contrast=\"none\">O la risposta agli incidenti di sicurezza del prodotto<\/span><span data-contrast=\"none\"> <\/span><span data-contrast=\"none\">(PSIRT) \u00e8 responsabile di<\/span>ricevere, ricercare la causa e lavorare insieme al reparto tecnico per risolvere le vulnerabilit\u00e0<span data-contrast=\"none\"> dei nostri prodotti. Cisco mantiene un criterio pubblico in base agli standard di settore come ISO29147 che regolano le nostre pratiche in questo spazio. L&#8217;obiettivo di queste azioni \u00e8 far riconoscere ai nostri clienti i potenziali rischi per prodotti e servizi Cisco in modo che possano valutare e risolvere le vulnerabilit\u00e0 della sicurezza <\/span><span data-contrast=\"none\"> <\/span><span data-contrast=\"none\">in<\/span><span data-contrast=\"none\"> modo efficace.<\/span><span data-ccp-props=\"{}\" data-wac-het=\"1\">\u00a0<\/span><\/p>\n<h2><span><br \/>\n  <b>Protezione di utenti e dispositivi<\/b><br \/>\n<\/span><\/h2>\n<p><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\"><br \/>\n  <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\">Cisco consente di proteggere utenti e dispositivi da un singolo riquadro di <\/span> <\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\">vetro nel Webex Control H u b, tra cui <\/span> <\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SpellingErrorV2 SCXW75713991 BCX4\" data-wac-het=\"1\"><\/span> <\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\"> <\/span> <\/span> <span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\"><\/span> <\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\"><\/span> <\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\"><\/span> <\/span> <span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\"> <\/span> <\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\">SAML 2.0 <\/span> <\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\"> <\/span> Single Sign-On<\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   integrazioni con la scelta di provider di identit\u00e0 insieme a molte scelte di autenticazione<span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\"> <\/span> <\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\"><\/span> <\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\"> multi-fattori,<\/span> <\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\"><\/span> <\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\"><\/span> <\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\"> autorizzazione OAuth e controlli di accesso basati sul ruolo. <\/span><br \/>\n<\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\"><br \/>\n  <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\">Inoltre, \u00e8 possibile abilitare la pulizia remota sui dispositivi utente con blocco PIN, nel caso in cui<\/span> <\/span> <span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\"> <\/span> <\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\">i dispositivi<\/span> <\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\"> degli <\/span> <\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\"> <\/span> <\/span><span class=\"TextRun SCXW75713991 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"auto\">   <span class=\"NormalTextRun SCXW75713991 BCX4\" data-wac-het=\"1\">utenti diventino compromessi.<\/span><br \/>\n<\/span><span class=\"EOP SCXW75713991 BCX4\" data-ccp-props=\"{}\" data-wac-het=\"1\">\u00a0<\/span><\/p>\n<h2><span><br \/>\n  <b>Protezione di contenuto e riunioni<\/b>\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\"><br \/>\n  <a href=\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/04\/d8e3a475-securing-users-and-data.jpg\"><br \/>\n    <img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-320220\" src=\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/04\/d8e3a475-securing-users-and-data.jpg\" alt=\"Proteggere utenti e dati. Una collega che si \u00e8 seduti su una videoconferenza rossa che utilizza un macbook air\" width=\"475\" height=\"317\" \/><br \/>\n  <\/a>Webex<\/span><span data-contrast=\"auto\"> Teams \u00e8<\/span><span data-contrast=\"auto\"> un&#8217;applicazione unificata leader nel mercato nella messaggistica, nella chiamata alle riunioni e <\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\">nelle lavagne.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559740&quot;:259}\" data-wac-het=\"1\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Webex<\/span><span data-contrast=\"auto\"> Meetings offre la crittografia avanzata per impostazione predefinita con un&#8217;opzione che consente di abilitare la crittografia <\/span><a href=\"https:\/\/help.webex.com\/en-us\/WBX44739\/What-Does-End-to-End-Encryption-Do\">   <span data-contrast=\"none\"> <\/span>   <span data-contrast=\"none\">end-to-end.<\/span>   <span data-contrast=\"none\"><\/span> <\/a><span data-contrast=\"auto\"><\/span> <span data-contrast=\"auto\">Y qualche tempo fa , abbiamo riconosciuto che alcuni clienti<\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"> <\/span> <span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"> (come loro)<\/span> <span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\">  <\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\">lo richiedono, anche se questo non limita alcune funzioni di Webex Meetings . <\/span><span data-contrast=\"auto\">Pertanto, viene offerta come opzione per i clienti, un&#8217;altra opzione che consente ai clienti di controllare chi nella relativa organizzazione ha accesso a<\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\">riunioni crittografate.<\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\">\u00a0<\/span> <span data-contrast=\"auto\">Gli Amministratori IT dei nostri clienti possono concedere l&#8217;accesso a coloro che utilizzano Webex per il contenuto altamente classificato che richiedi la crittografia <\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\">  <\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"> end-to-end,<\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"> rispetto a coloro che non lo utilizzano.\u00a0<\/span><span data-ccp-props=\"{}\" data-wac-het=\"1\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Webex<\/span><span data-contrast=\"auto\"> abilita anche le password delle riunioni per impostazione predefinita. <\/span><span data-contrast=\"auto\">Webex fornisce il controllo dell&#8217;organizzatore della riunione per impedire ai partecipanti indesiderati di accedere alle riunioni tramite telefono o dispositivi video utilizzando PSTN<\/span> <span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\">  <\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\">e<\/span><span data-contrast=\"auto\">   <a href=\"https:\/\/blogs.cisco.com\/collaboration\/new-ways-to-connect-your-business-to-the-cloud-with-webex-calling\"> <\/a> PIN video. <\/span><span data-contrast=\"auto\">Webex offre un&#8217;opzione per il blocco automatico delle sale riunioni virtuali<\/span><span data-contrast=\"auto\">  <\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"><\/span> <span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\">(PMR) <\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"> immediatamente dopo che l&#8217;organizzatore \u00e8 stato avviato o dopo un determinato periodo di tempo dopo l&#8217;inizio della riunione. <\/span><span data-contrast=\"auto\">Pi\u00f9 di <\/span><span data-contrast=\"auto\">due anni<\/span><span data-contrast=\"auto\"> fa, w<\/span><span data-contrast=\"auto\">ha pubblicato un elenco completo delle <a href=\"https:\/\/help.webex.com\/en-us\/8zi8tq\/Cisco-Webex-Best-Practices-for-Secure-Meetings-Hosts\">procedure consigliate per la sicurezza delle riunioni <\/a><\/span><span data-contrast=\"auto\"> <\/span><span data-contrast=\"auto\"><\/span><span data-contrast=\"auto\"> Webex.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559740&quot;:259}\" data-wac-het=\"1\">\u00a0<\/span><b><\/b><\/p>\n<h2><span><br \/>\n  <b>Dati sensibili, Protezione da perdita di dati<\/b>   <b> <\/b>   <b>(DLP)<\/b>   <b> e<\/b>   <b>semplificazione C<\/b><br \/>\n<\/span><span data-ccp-props=\"{}\" data-wac-het=\"1\">\u00a0<\/span><\/h2>\n<p><a href=\"https:\/\/blogs.cisco.com\/collaboration\/secure-and-compliant-collaboration-with-webex-teams\"><br \/>\n  <span class=\"TextRun SCXW128123668 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\"><br \/>\n    <span class=\"NormalTextRun SCXW128123668 BCX4\" data-wac-het=\"1\">Cisco consente la collaborazione intersociet\u00e0 sicura, con la possibilit\u00e0 di impostare criteri di protezione della perdita di dati che proteggono gli utenti anche quando <\/span>   <\/span> <\/a><span class=\"TextRun SCXW128123668 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun SCXW128123668 BCX4\" data-wac-het=\"1\">collaborano su linee aziendali diverse. <\/span><br \/>\n<\/span><span class=\"TextRun SCXW128123668 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\"><br \/>\n  <span class=\"NormalTextRun SCXW128123668 BCX4\" data-wac-het=\"1\">I fornitori di soluzioni di gestione di identit\u00e0, sicurezza e conformit\u00e0 possono migliorare<\/span> <\/span><span class=\"TextRun SCXW128123668 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun SCXW128123668 BCX4\" data-wac-het=\"1\"> <\/span> <\/span><span class=\"TextRun SCXW128123668 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun SCXW128123668 BCX4\" data-wac-het=\"1\"> <\/span> <\/span><span class=\"TextRun Highlight SCXW128123668 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun SCXW128123668 BCX4\" data-wac-het=\"1\"><\/span> <\/span><span class=\"TextRun Highlight SCXW128123668 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun SCXW128123668 BCX4\" data-wac-het=\"1\"> Cisco <\/span> <\/span><span class=\"TextRun Highlight SCXW128123668 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun SpellingErrorV2 SCXW128123668 BCX4\" data-wac-het=\"1\">Webex<\/span> <\/span><span class=\"TextRun Highlight SCXW128123668 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun SCXW128123668 BCX4\" data-wac-het=\"1\"> Teams<\/span> <\/span><span class=\"TextRun Highlight SCXW128123668 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun SCXW128123668 BCX4\" data-wac-het=\"1\">e offrire funzionalit\u00e0 chiave a livello aziendale. <\/span><br \/>\n<\/span><span class=\"TextRun Highlight SCXW128123668 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\"><br \/>\n  <span class=\"NormalTextRun SCXW128123668 BCX4\" data-wac-het=\"1\">Inoltre, \u00e8 disponibile la possibilit\u00e0 per i clienti di impostare <\/span> <\/span><span class=\"TextRun Highlight SCXW128123668 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun SCXW128123668 BCX4\" data-wac-het=\"1\">i propri criteri <\/span> <\/span><span class=\"TextRun Highlight SCXW128123668 BCX4\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun SCXW128123668 BCX4\" data-wac-het=\"1\">per la conservazione, eDiscovery e il blocco a livello legale.<\/span><br \/>\n<\/span><span class=\"EOP SCXW128123668 BCX4\" data-ccp-props=\"{}\" data-wac-het=\"1\">\u00a0<\/span><\/p>\n<h2><span><br \/>\n  <b>Impostazioni di<\/b>   <b>ricorrenza<\/b>   <b>esteso<\/b><br \/>\n<\/span><\/h2>\n<p><span class=\"TextRun BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\"><br \/>\n  <span class=\"NormalTextRun BCX4 SCXW238473558\" data-wac-het=\"1\">Cisco offre anche opzioni di ricorrenza che includono<\/span> <\/span><span class=\"TextRun BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun BCX4 SCXW238473558\" data-wac-het=\"1\"> <\/span> <\/span><span class=\"TextRun BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun BCX4 SCXW238473558\" data-wac-het=\"1\"><\/span> <\/span><span class=\"TextRun BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun BCX4 SCXW238473558\" data-wac-het=\"1\">Cisco <\/span> <\/span><a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/cloudlock\/index.html\">   <span class=\"TextRun BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">     <span class=\"NormalTextRun SpellingErrorV2 BCX4 SCXW238473558\" data-wac-het=\"1\">Cloudlock<\/span>   <\/span> <\/a><span class=\"TextRun BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun BCX4 SCXW238473558\" data-wac-het=\"1\"> Cloud Access Security Broker<\/span> <\/span><span class=\"TextRun BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun BCX4 SCXW238473558\" data-wac-het=\"1\"> (CASB) e<\/span> <\/span><span class=\"TextRun BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun BCX4 SCXW238473558\" data-wac-het=\"1\"> Cisco <\/span> <\/span><span class=\"TextRun BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun SpellingErrorV2 BCX4 SCXW238473558\" data-wac-het=\"1\">Talos<\/span> <\/span> <span class=\"TextRun BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun SpellingErrorV2 BCX4 SCXW238473558\" data-wac-het=\"1\">Anti-malware ClamAV: le soluzioni thy sono facili da acquistare e facili da distribuire come parte di<\/span> <\/span><span class=\"TextRun BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun BCX4 SCXW238473558\" data-wac-het=\"1\"> <\/span> <\/span><span class=\"TextRun BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun BCX4 SCXW238473558\" data-wac-het=\"1\"> <\/span> <\/span><span class=\"TextRun BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun BCX4 SCXW238473558\" data-wac-het=\"1\"> <\/span> <\/span><span class=\"TextRun BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun BCX4 SCXW238473558\" data-wac-het=\"1\">Cisco Flex<\/span> <\/span><span class=\"TextRun BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun BCX4 SCXW238473558\" data-wac-het=\"1\"> P<\/span> <\/span><span class=\"TextRun BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun BCX4 SCXW238473558\" data-wac-het=\"1\">lan<\/span> <\/span><span class=\"TextRun Highlight BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun BCX4 SCXW238473558\" data-wac-het=\"1\">. <\/span><br \/>\n<\/span><span class=\"TextRun Highlight BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\"><br \/>\n  <span class=\"NormalTextRun BCX4 SCXW238473558\" data-wac-het=\"1\">Inoltre,<\/span> <\/span><span class=\"TextRun Highlight BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun BCX4 SCXW238473558\" data-wac-het=\"1\"><\/span> <\/span><span class=\"TextRun Highlight BCX4 SCXW238473558\" lang=\"it\" xml:lang=\"it\" data-contrast=\"none\">   <span class=\"NormalTextRun BCX4 SCXW238473558\" data-wac-het=\"1\"> \u00e8 disponibile anche l&#8217;autenticazione multifactor con Cisco Duo.\u00a0<\/span><br \/>\n<\/span><\/p>\n<h2><span><br \/>\n  <b>Protezione<\/b>   <b><\/b>   <b> all&#8217;uscita dalla finestra<\/b> <\/span><\/h2>\n<p><span data-contrast=\"none\">Webex consente agli utenti di collaborare liberamente senza dover preoccuparsi delle configurazioni; \u00e8 sicuro per la prima volta che sono certi che sono sicuri di non dover eseguire alcuna configurazione di formazione. Webex ha creato un&#8217;esperienza utente facile da usare, integrata e sicura. <\/span><span data-contrast=\"none\">Sia all&#8217;interno della propria organizzazione che quando si collabora su linee aziendali, Cisco Webex offre una piattaforma di collaborazione hardened a livello aziendale che garantisce la sicurezza predefinita e protegge i dati. <\/span><span data-contrast=\"none\">Non ci si chiede se Cisco Collaboration sia affidabile dal <\/span><span data-contrast=\"none\">95% delle aziende Fortune 500 e di molte agenzie governative in tutto il<\/span><span data-contrast=\"none\">mondo.\u00a0<\/span><span data-ccp-props=\"{}\" data-wac-het=\"1\"> Guarda questo video sul lavoro remoto e sull&#8217;importanza della sicurezza a livello aziendale:\u00a0<\/span><\/p>\n<p><iframe loading=\"lazy\" title=\"Remote working and why security matters\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/famD-S5bk-I?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<h2><strong><br \/>\n  <span>Differenza di sicurezza Webex<\/span><br \/>\n<\/strong><\/h2>\n<p><span data-contrast=\"none\">Questa \u00e8 collaborazione senza compromessi. Questa \u00e8 la differenza <\/span><span data-contrast=\"none\">di sicurezza di<\/span><span data-contrast=\"none\"> Webex. <\/span><span data-contrast=\"none\">Nelle prossime settimane, sar\u00e0 possibile guardare alla nostra serie di webinar Diritta per ottenere<\/span><span data-contrast=\"none\"> informazioni sulla sicurezza<\/span><span data-contrast=\"none\">  <\/span><span data-contrast=\"none\"><\/span>Webex.<span data-contrast=\"none\">\u00a0<\/span><\/p>\n<blockquote><p><a href=\"http:\/\/www.cisco.com\/go\/webexsecurity\"><br \/>\n  <span data-contrast=\"none\">Ulteriori informazioni sulla <\/span>   <span data-contrast=\"none\">sicurezza<\/span>   <span data-contrast=\"none\"> Webex<\/span><br \/>\n<\/a><\/p><\/blockquote>\n<hr \/>\n<p><span data-ccp-props=\"{}\" data-wac-het=\"1\"><br \/>\n  <strong>Ulteriori informazioni sulla<\/strong> <\/span>  <a href=\"https:\/\/blogs.cisco.com\/collaboration\/collaboration-without-compromise-a-security-first-approach-to-remote-working\">   <span data-ccp-props=\"{}\" data-wac-het=\"1\">collaborazione senza compromessi: Un approccio in primo luogo alla sicurezza per il funzionamento remoto<\/span> <\/a>  <a href=\"https:\/\/blogs.cisco.com\/news\/connected-and-secure-webex-in-todays-world?dtid=esotwt000260&#038;CAMPAIGN=Corporate+Communications&#038;Country_Site=GL&#038;POSITION=Social%2BMedia&#038;REFERRING_SITE=Twitter&#038;CREATIVE=Cisco%2B%2BBlog%2BGC+-+Collaboration\">connesso e sicuro: Webex nel mondo odierno Novit\u00e0 in sicurezza e conformit\u00e0 per Webex Il nostro interesse per la sicurezza in un mondo di collaborazione aperto<\/a>  <a href=\"https:\/\/blogs.cisco.com\/collaboration\/whats-new-in-security-and-compliance-for-webex\"><\/a>  <a href=\"https:\/\/blogs.cisco.com\/collaboration\/our-focus-on-security-in-an-open-collaboration-world\"><\/a>  <a href=\"https:\/\/blog.webex.com\/it\/videoconferenze\/cisco-webex-supporto-dei-clienti-in-questo-periodo-senza-precedenti\/\">Cisco Webex: Supporto dei clienti in questo periodo senza precedenti<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Per quanto riguarda la sicurezza, Webex ha da sempre effettuato le cose giuste, perch\u00e9 in Cisco la sicurezza \u00e8 nel nostro SISTEMA RELAS. Webex \u00e8 supportato dalla cronologia ed esperienza di Cisco nella sicurezza, dalla rete agli endpoint, al centro dati e ai nostri servizi cloud.\u00a0\u00a0<\/p>\n","protected":false},"author":5402,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[5273,1570,1495],"tags":[2092,15112],"class_list":["post-384338","post","type-post","status-publish","format-standard","hentry","category-collaborazione","category-lavoro-ibrido","category-videoconferenze","tag-strumenti-di-collaborazione","tag-workforce-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Come Webex mantiene la collaborazione sicura mentre si lavora da remoto | Webex Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Come Webex mantiene la collaborazione sicura mentre si lavora da remoto | Webex Blog\" \/>\n<meta property=\"og:description\" content=\"Per quanto riguarda la sicurezza, Webex ha da sempre effettuato le cose giuste, perch\u00e9 in Cisco la sicurezza \u00e8 nel nostro SISTEMA RELAS. Webex \u00e8 supportato dalla cronologia ed esperienza di Cisco nella sicurezza, dalla rete agli endpoint, al centro dati e ai nostri servizi cloud.\u00a0\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/\" \/>\n<meta property=\"og:site_name\" content=\"Webex Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-22T13:23:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/04\/0d876a50-telehealth_deskpro_webex.jpg\" \/>\n<meta name=\"author\" content=\"Abhay Kulkarni\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abhay Kulkarni\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/\"},\"author\":{\"name\":\"Abhay Kulkarni\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/c675d4a082282dd78c10bee7e8854dea\"},\"headline\":\"Come Webex mantiene la collaborazione sicura mentre si lavora da ...\",\"datePublished\":\"2020-04-22T13:23:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/\"},\"wordCount\":1193,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/04\/0d876a50-telehealth_deskpro_webex.jpg\",\"keywords\":[\"strumenti di collaborazione\",\"Workforce Management\"],\"articleSection\":[\"Collaborazione\",\"Lavoro ibrido\",\"Videoconferenze\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/\",\"url\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/\",\"name\":\"Come Webex mantiene la collaborazione sicura mentre si lavora da remoto | Webex Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.webex.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/04\/0d876a50-telehealth_deskpro_webex.jpg\",\"datePublished\":\"2020-04-22T13:23:40+00:00\",\"author\":{\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/c675d4a082282dd78c10bee7e8854dea\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/#primaryimage\",\"url\":\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/04\/0d876a50-telehealth_deskpro_webex.jpg\",\"contentUrl\":\"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/04\/0d876a50-telehealth_deskpro_webex.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.webex.com\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Come Webex mantiene la collaborazione sicura mentre si lavora da ...\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.webex.com\/es\/#website\",\"url\":\"https:\/\/blog.webex.com\/es\/\",\"name\":\"Webex Blog\",\"description\":\"Webex by Cisco powers collaboration through industry-leading video conferencing, cloud calling and contact center solutions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.webex.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/c675d4a082282dd78c10bee7e8854dea\",\"name\":\"Abhay Kulkarni\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/blog.webex.com\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3f450abde3e90ecaf22501c3ffd59d5b62e600450237f211156b3833dff7a59f?s=96&d=wp_user_avatar&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3f450abde3e90ecaf22501c3ffd59d5b62e600450237f211156b3833dff7a59f?s=96&d=wp_user_avatar&r=g\",\"caption\":\"Abhay Kulkarni\"},\"description\":\"Abhay Kulkarni is the Senior Vice President and General Manager of Webex App in the Cisco Team Collaboration Group. Abhay and his team are laser focused on creating the best meetings experiences in the industry. His team is responsible for development, product management, support and customer success for the Webex Meetings business line, one of the world\u2019s largest SaaS businesses. At Cisco, Abhay previously led the Webex Platform that powers Webex Teams, Meetings and Devices. A technologist at heart, his work on the platform delivered highly available, world class performance at scale and enables amazing developer experiences via developer.webex.com. Abhay brings 20+ years of industry experience in building and scaling large cloud SaaS platforms. Before joining Cisco, Abhay was head of engineering at cloud security startup Netskope. Prior to Netskope, Abhay led engineering for Norton Cloud - one of the largest Enterprise clouds managing many petabytes of data for 40M+ users. Abhay holds a Bachelor of Engineering in Computer Science from University of Pune.\",\"url\":\"https:\/\/blog.webex.com\/it\/contributors\/abhaykulkarni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Come Webex mantiene la collaborazione sicura mentre si lavora da remoto | Webex Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/","og_locale":"it_IT","og_type":"article","og_title":"Come Webex mantiene la collaborazione sicura mentre si lavora da remoto | Webex Blog","og_description":"Per quanto riguarda la sicurezza, Webex ha da sempre effettuato le cose giuste, perch\u00e9 in Cisco la sicurezza \u00e8 nel nostro SISTEMA RELAS. Webex \u00e8 supportato dalla cronologia ed esperienza di Cisco nella sicurezza, dalla rete agli endpoint, al centro dati e ai nostri servizi cloud.\u00a0\u00a0","og_url":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/","og_site_name":"Webex Blog","article_published_time":"2020-04-22T13:23:40+00:00","og_image":[{"url":"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/04\/0d876a50-telehealth_deskpro_webex.jpg","type":"","width":"","height":""}],"author":"Abhay Kulkarni","twitter_misc":{"Scritto da":"Abhay Kulkarni","Tempo di lettura stimato":"6 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/#article","isPartOf":{"@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/"},"author":{"name":"Abhay Kulkarni","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/c675d4a082282dd78c10bee7e8854dea"},"headline":"Come Webex mantiene la collaborazione sicura mentre si lavora da ...","datePublished":"2020-04-22T13:23:40+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/"},"wordCount":1193,"commentCount":0,"image":{"@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/#primaryimage"},"thumbnailUrl":"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/04\/0d876a50-telehealth_deskpro_webex.jpg","keywords":["strumenti di collaborazione","Workforce Management"],"articleSection":["Collaborazione","Lavoro ibrido","Videoconferenze"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/","url":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/","name":"Come Webex mantiene la collaborazione sicura mentre si lavora da remoto | Webex Blog","isPartOf":{"@id":"https:\/\/blog.webex.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/#primaryimage"},"image":{"@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/#primaryimage"},"thumbnailUrl":"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/04\/0d876a50-telehealth_deskpro_webex.jpg","datePublished":"2020-04-22T13:23:40+00:00","author":{"@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/c675d4a082282dd78c10bee7e8854dea"},"breadcrumb":{"@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/#primaryimage","url":"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/04\/0d876a50-telehealth_deskpro_webex.jpg","contentUrl":"https:\/\/storage.googleapis.com\/blogs-images\/ciscoblogs\/1\/2020\/04\/0d876a50-telehealth_deskpro_webex.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.webex.com\/collaboration\/video-conferencing\/how-webex-keeps-your-collaboration-safe-while-working-remotely\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.webex.com\/it\/"},{"@type":"ListItem","position":2,"name":"Come Webex mantiene la collaborazione sicura mentre si lavora da ..."}]},{"@type":"WebSite","@id":"https:\/\/blog.webex.com\/es\/#website","url":"https:\/\/blog.webex.com\/es\/","name":"Webex Blog","description":"Webex by Cisco powers collaboration through industry-leading video conferencing, cloud calling and contact center solutions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.webex.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/c675d4a082282dd78c10bee7e8854dea","name":"Abhay Kulkarni","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/blog.webex.com\/es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3f450abde3e90ecaf22501c3ffd59d5b62e600450237f211156b3833dff7a59f?s=96&d=wp_user_avatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3f450abde3e90ecaf22501c3ffd59d5b62e600450237f211156b3833dff7a59f?s=96&d=wp_user_avatar&r=g","caption":"Abhay Kulkarni"},"description":"Abhay Kulkarni is the Senior Vice President and General Manager of Webex App in the Cisco Team Collaboration Group. Abhay and his team are laser focused on creating the best meetings experiences in the industry. His team is responsible for development, product management, support and customer success for the Webex Meetings business line, one of the world\u2019s largest SaaS businesses. At Cisco, Abhay previously led the Webex Platform that powers Webex Teams, Meetings and Devices. A technologist at heart, his work on the platform delivered highly available, world class performance at scale and enables amazing developer experiences via developer.webex.com. Abhay brings 20+ years of industry experience in building and scaling large cloud SaaS platforms. Before joining Cisco, Abhay was head of engineering at cloud security startup Netskope. Prior to Netskope, Abhay led engineering for Norton Cloud - one of the largest Enterprise clouds managing many petabytes of data for 40M+ users. Abhay holds a Bachelor of Engineering in Computer Science from University of Pune.","url":"https:\/\/blog.webex.com\/it\/contributors\/abhaykulkarni\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.webex.com\/it\/wp-json\/wp\/v2\/posts\/384338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.webex.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.webex.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.webex.com\/it\/wp-json\/wp\/v2\/users\/5402"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.webex.com\/it\/wp-json\/wp\/v2\/comments?post=384338"}],"version-history":[{"count":0,"href":"https:\/\/blog.webex.com\/it\/wp-json\/wp\/v2\/posts\/384338\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.webex.com\/it\/wp-json\/wp\/v2\/media?parent=384338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.webex.com\/it\/wp-json\/wp\/v2\/categories?post=384338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.webex.com\/it\/wp-json\/wp\/v2\/tags?post=384338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}