{"id":57790,"date":"2025-02-11T13:30:01","date_gmt":"2025-02-11T12:30:01","guid":{"rendered":"https:\/\/www.smeup.com\/magazine\/?p=57790"},"modified":"2025-08-05T17:11:08","modified_gmt":"2025-08-05T15:11:08","slug":"managed-detection-and-response-mdr","status":"publish","type":"post","link":"https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/","title":{"rendered":"Managed Detection and Response (MDR): la difesa proattiva per la sicurezza informatica"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling gradient-container-1\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>Nel panorama attuale della cybersecurity, caratterizzato da minacce sempre pi\u00f9 sofisticate e in continua evoluzione, le aziende non possono pi\u00f9 limitarsi a soluzioni di sicurezza tradizionali. Firewall, antivirus e sistemi di prevenzione delle intrusioni (IPS) rappresentano solo una parte della difesa necessaria. <strong>Per una protezione efficace, serve un approccio proattivo e continuo: \u00e8 qui che entra in gioco il Managed Detection and Response (MDR)<\/strong>.<\/p>\n<\/div><div class=\"fusion-text fusion-text-2\"><h3 style=\"text-align: right\">Si stima che <span style=\"color: #800000\">entro il 2025, il 50% delle organizzazioni utilizzer\u00e0 servizi MDR <\/span>per le funzioni di monitoraggio, rilevamento e risposta alle minacce, sottolineando l&#8217;importanza crescente di questi servizi nel panorama della sicurezza informatica.<\/h3>\n<\/div><div class=\"fusion-text fusion-text-3\"><p>Queste tendenze indicano una crescente consapevolezza da parte delle aziende riguardo all&#8217;importanza di adottare soluzioni di sicurezza proattive e gestite per proteggere le proprie infrastrutture IT e i dati sensibili.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling gradient-container-2\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\"><h2>Cos&#8217;\u00e8 il Managed Detection and Response?<\/h2>\n<p>Il MDR \u00e8 un servizio di sicurezza gestito che combina tecnologie avanzate di rilevamento delle minacce con l\u2019esperienza di analisti di sicurezza specializzati. <strong>L\u2019obiettivo \u00e8 identificare, analizzare e rispondere rapidamente a incidenti di sicurezza prima che possano causare danni significativi.<\/strong><\/p>\n<p>A differenza dei tradizionali Security Operations Center (SOC) interni, l&#8217;MDR fornisce una soluzione esterna, scalabile e sempre attiva, riducendo la necessit\u00e0 di investimenti significativi in infrastrutture e personale altamente specializzato. Questo approccio consente alle aziende di concentrarsi sul proprio core business, affidando la gestione della sicurezza a professionisti esperti che utilizzano tecnologie all\u2019avanguardia.<\/p>\n<h2><\/h2>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5\"><h2>Differenze tra SOC e MDR<\/h2>\n<\/div>\n<div class=\"table-2\">\n<table width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\">Caratteristica<\/th>\n<th align=\"left\">SOC (Security Operations Center)<\/th>\n<th align=\"left\">MDR (Managed Detection and Response)<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"left\"><strong>Gestione<\/strong><\/td>\n<td align=\"left\">Interna o esternalizzata<\/td>\n<td align=\"left\">Principalmente esternalizzata<\/td>\n<\/tr>\n<tr>\n<td align=\"left\"><strong>Monitoraggio <\/strong><\/td>\n<td align=\"left\">24\/7, ma dipende dalle risorse interne<\/td>\n<td align=\"left\">Monitoraggio continuo 24\/7 garantito<\/td>\n<\/tr>\n<tr>\n<td align=\"left\"><strong>Tecnologie<\/strong><\/td>\n<td align=\"left\">Sistemi tradizionali di monitoraggio<\/td>\n<td align=\"left\">Tecnologie avanzate (AI, machine learning)<\/td>\n<\/tr>\n<tr>\n<td align=\"left\"><strong>Risposta agli incidenti<\/strong><\/td>\n<td align=\"left\">Pu\u00f2 essere limitata alle capacit\u00e0 interne<\/td>\n<td align=\"left\">Risposta rapida e proattiva agli incidenti<\/td>\n<\/tr>\n<tr>\n<td align=\"left\"><strong>Scalabilit\u00e0<\/strong><\/td>\n<td align=\"left\">Limitata dalle risorse e dall\u2019infrastruttura<\/td>\n<td align=\"left\">Alta scalabilit\u00e0 e flessibilit\u00e0<\/td>\n<\/tr>\n<tr>\n<td align=\"left\"><strong>Costi<\/strong><\/td>\n<td align=\"left\">Elevati per infrastruttura e personale dedicato<\/td>\n<td align=\"left\">Ottimizzazione dei costi tramite outsourcing<\/td>\n<\/tr>\n<tr>\n<td align=\"left\"><strong>Competenze<\/strong><\/td>\n<td align=\"left\">Dipende dal team interno<\/td>\n<td align=\"left\">Accesso a esperti altamente specializzati<\/td>\n<\/tr>\n<tr>\n<td align=\"left\"><strong>Aggiornamento delle minacce<\/strong><\/td>\n<td align=\"left\">Basato su fonti interne<\/td>\n<td align=\"left\">Integrato con threat intelligence globale<\/td>\n<\/tr>\n<tr>\n<td align=\"left\"><strong>Tempi di risposta<\/strong><\/td>\n<td align=\"left\">Variabili, legati all\u2019efficienza interna<\/td>\n<td align=\"left\">Tempi di risposta ridotti grazie a processi automatizzati<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"elegant-empty-space space-vertical fusion-clearfix \" style=\"height:40px;\"><\/div><div class=\"fusion-text fusion-text-6\"><p>Questa tabella evidenzia le principali differenze tra SOC e MDR, mostrando come l&#8217;MDR rappresenti una soluzione pi\u00f9 flessibile, efficiente e adatta alle esigenze di sicurezza informatica moderne.<\/p>\n<\/div><div class=\"elegant-empty-space space-vertical fusion-clearfix \" style=\"height:40px;\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling gradient-container-3\" style=\"--link_color: #ffffff;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:35px;--awb-background-color:#000000;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1920\" height=\"1084\" alt=\"pilastri_MDR cybersecurity\" title=\"pilastri_MDR cybersecurity\" src=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/pilastri_MDR-cybersecurity.png\" data-orig-src=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/pilastri_MDR-cybersecurity.png\" class=\"lazyload img-responsive wp-image-57819\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271920%27%20height%3D%271084%27%20viewBox%3D%270%200%201920%201084%27%3E%3Crect%20width%3D%271920%27%20height%3D%271084%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/pilastri_MDR-cybersecurity-200x113.png 200w, https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/pilastri_MDR-cybersecurity-400x226.png 400w, https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/pilastri_MDR-cybersecurity-600x339.png 600w, https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/pilastri_MDR-cybersecurity-800x452.png 800w, https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/pilastri_MDR-cybersecurity-1200x678.png 1200w, https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/pilastri_MDR-cybersecurity.png 1920w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-text-color:#ffffff;\"><h2><\/h2>\n<h2><span style=\"color: #ffffff\">I pilastri del MDR<\/span><\/h2>\n<p>Secondo il report Assintel 2024, che ha analizzato l&#8217;adozione delle tecnologie emergenti, la penetrazione di queste soluzioni \u00e8 ancora limitata, ma con segnali di crescita in alcune aree specifiche:<\/p>\n<p><span style=\"color: #00ebff\"><strong>RILEVAMENTO AVANZATO DELLE MINACCE<\/strong><\/span><br \/>\nUtilizzo di tecnologie come l&#8217;analisi comportamentale, l&#8217;intelligenza artificiale e il machine learning per identificare attivit\u00e0 sospette e anomale. Questi strumenti permettono di rilevare minacce che potrebbero sfuggire ai sistemi di sicurezza tradizionali, analizzando grandi quantit\u00e0 di dati in tempo reale e individuando schemi di comportamento anomali.<\/p>\n<p><span style=\"color: #00ebff\"><strong>MONITORAGGIO CONTINUO<\/strong><\/span><br \/>\nSupervisione 24\/7 dei sistemi IT per garantire una risposta tempestiva a qualsiasi minaccia rilevata. Il monitoraggio continuo consente di rilevare e rispondere rapidamente a potenziali incidenti di sicurezza, riducendo significativamente il tempo di permanenza delle minacce all&#8217;interno dei sistemi.<\/p>\n<p><span style=\"color: #00ebff\"><strong>RISPOSTA AGLI INCIDENTI<\/strong><\/span><br \/>\nIntervento rapido e coordinato per contenere e mitigare le minacce, riducendo al minimo l&#8217;impatto sull&#8217;operativit\u00e0 aziendale. L&#8217;MDR non si limita a rilevare le minacce, ma fornisce anche un supporto attivo nella gestione degli incidenti, collaborando con il team IT interno per risolvere rapidamente le problematiche.<\/p>\n<p><span style=\"color: #00ebff\"><strong>THREAT INTELLIGENCE<\/strong><\/span><br \/>\nIntegrazione di dati provenienti da fonti globali per anticipare le tendenze delle minacce e rafforzare le difese. L\u2019intelligence sulle minacce fornisce informazioni preziose sui nuovi vettori di attacco, consentendo di aggiornare costantemente le strategie di difesa e di adottare misure preventive efficaci.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling gradient-container-4\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8\"><h2><\/h2>\n<h2>Perch\u00e9 scegliere un servizio MDR?<\/h2>\n<p><strong>RIDUZIONE DEL TEMPO DI RILEVAMENTO E RISPOSTA<\/strong><br \/>\nGrazie a un monitoraggio costante e a tecnologie di rilevamento avanzate, le minacce vengono identificate e neutralizzate pi\u00f9 rapidamente. Questo riduce il rischio di danni gravi e minimizza le interruzioni operative.<\/p>\n<p><strong>ACCESSO A COMPETENZE SPECIALIZZATE<\/strong><br \/>\nTeam di esperti in cybersecurity lavorano per analizzare gli eventi e gestire le risposte agli incidenti. Questi professionisti hanno una conoscenza approfondita delle tecniche di attacco e delle migliori pratiche per la difesa, offrendo un livello di protezione superiore rispetto a quanto potrebbe essere ottenuto internamente.<\/p>\n<p><strong>SCALABILITA&#8217; E FLESSIBILITA&#8217;<\/strong><br \/>\nLe soluzioni MDR si adattano alle esigenze specifiche dell\u2019azienda, indipendentemente dalle dimensioni o dal settore. Questo significa che anche le piccole e medie imprese possono beneficiare di un livello di sicurezza elevato, senza dover sostenere costi proibitivi.<\/p>\n<p><strong>OTTIMIZZAZIONE DEI COSTI<\/strong><br \/>\nEsternalizzare la gestione della sicurezza riduce i costi legati a infrastrutture e formazione del personale. Inoltre, la prevenzione efficace degli incidenti di sicurezza pu\u00f2 evitare spese significative legate alla gestione di violazioni dei dati o interruzioni operative.<\/p>\n<p><strong>MIGLIORAMENTO DELLA CONFORMITA&#8217;<\/strong><br \/>\nI servizi MDR aiutano le aziende a soddisfare i requisiti normativi e di conformit\u00e0 in materia di sicurezza dei dati, fornendo report dettagliati e supporto nella gestione delle policy di sicurezza.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling gradient-container-5\" style=\"--link_color: #ffffff;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:35px;--awb-background-color:#000000;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1920\" height=\"933\" alt=\"vantaggi_MDR cybersecurity\" title=\"vantaggi_MDR cybersecurity\" src=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/vantaggi_MDR-cybersecurity.png\" data-orig-src=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/vantaggi_MDR-cybersecurity.png\" class=\"lazyload img-responsive wp-image-57820\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271920%27%20height%3D%27933%27%20viewBox%3D%270%200%201920%20933%27%3E%3Crect%20width%3D%271920%27%20height%3D%27933%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/vantaggi_MDR-cybersecurity-200x97.png 200w, https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/vantaggi_MDR-cybersecurity-400x194.png 400w, https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/vantaggi_MDR-cybersecurity-600x292.png 600w, https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/vantaggi_MDR-cybersecurity-800x389.png 800w, https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/vantaggi_MDR-cybersecurity-1200x583.png 1200w, https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/vantaggi_MDR-cybersecurity.png 1920w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 1200px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling gradient-container-6\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-9\"><h2><\/h2>\n<h2>MDR e il futuro della sicurezza informatica<\/h2>\n<p>Le minacce informatiche evolvono rapidamente e le aziende devono essere pronte a rispondere con la stessa velocit\u00e0. Il MDR rappresenta un elemento chiave per una strategia di sicurezza efficace, capace di offrire non solo protezione, ma anche resilienza. Grazie a un approccio basato su rilevamento proattivo e risposta tempestiva, le organizzazioni possono concentrarsi sul proprio core business, affidandosi a partner di sicurezza competenti e tecnologicamente avanzati.<\/p>\n<p>In smeup comprendiamo l&#8217;importanza di soluzioni di sicurezza affidabili e personalizzate. Per questo, supportiamo le aziende nell&#8217;adozione di servizi MDR che garantiscono protezione continua e una gestione efficace delle minacce informatiche. Il nostro approccio integrato consente di affrontare le sfide della <a href=\"https:\/\/www.smeup.com\/soluzioni-per-architetture-it\/cyber-security\/\" target=\"_blank\" rel=\"noopener\">cybersecurity<\/a> con strumenti e competenze di alto livello, offrendo alle aziende la tranquillit\u00e0 necessaria per crescere e innovare in un ambiente digitale sicuro.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling gradient-container-7\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-blend:overlay;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10\"><h2>Conclusione<\/h2>\n<p>Il Managed Detection and Response non \u00e8 solo una soluzione tecnologica, ma un vero e proprio alleato nella lotta contro le minacce informatiche. In un mondo in cui la sicurezza digitale \u00e8 un fattore critico per il successo aziendale, adottare <strong>un servizio MDR significa investire nella continuit\u00e0 operativa, nella protezione dei dati e nella fiducia dei clienti.<\/strong><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling gradient-container-8\" style=\"--link_color: #000000;--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-color:#068a9c;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1144px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-top:50px;--awb-padding-right:50px;--awb-padding-bottom:50px;--awb-padding-left:50px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-11\" style=\"--awb-content-alignment:center;--awb-font-size:28px;--awb-text-color:#ffffff;--awb-text-font-family:&quot;Open Sans&quot;;--awb-text-font-style:normal;--awb-text-font-weight:400;\"><p style=\"text-align: left\"><span style=\"color: #ffffff\"><strong>Scegliere smeup come partner per la sicurezza informatica significa affidarsi a un team di esperti dedicati a proteggere il futuro della tua azienda.<\/strong><\/span><\/p>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/www.smeup.com\/contatti\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">CONTATTACI<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Il Managed Detection and Response (MDR) di smeup offre un servizio di cybersecurity proattivo e continuo che combina tecnologia avanzata e competenze umane specializzate per rilevare e rispondere rapidamente alle minacce informatiche, garantendo alle aziende protezione 24\/7 senza la necessit\u00e0 di risorse interne dedicate.<\/p>\n","protected":false},"author":7,"featured_media":58004,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7190,7140,7187,7184],"tags":[7239,7238,7232],"class_list":["post-57790","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sicurezza-informatica","category-soluzioni","category-tecnologici","category-trend","tag-managed-detection-and-response","tag-mdr","tag-soc"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Managed Detection and Response (MDR): la difesa proattiva per la sicurezza informatica<\/title>\n<meta name=\"description\" content=\"Scopri come il Managed Detection and Response (MDR) rivoluziona la sicurezza informatica aziendale con monitoraggio continuo, threat intelligence e risposta rapida agli incidenti.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managed Detection and Response (MDR): la difesa proattiva per la sicurezza informatica\" \/>\n<meta property=\"og:description\" content=\"Scopri come il Managed Detection and Response (MDR) rivoluziona la sicurezza informatica aziendale con monitoraggio continuo, threat intelligence e risposta rapida agli incidenti.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/\" \/>\n<meta property=\"og:site_name\" content=\"Magazine\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-11T12:30:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-05T15:11:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/MDR-Cybersecurity_seo-social.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"awagueye\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Ottimizza la tua produzione con strumenti avanzati di Pianificazione e Controllo\" \/>\n<meta name=\"twitter:description\" content=\"scoprirai come un software di pianificazione e controllo della produzione pu\u00f2 trasformare la tua azienda, migliorando l&#039;efficienza operativa e riducendo i costi.\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"awagueye\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/managed-detection-and-response-mdr\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/managed-detection-and-response-mdr\\\/\"},\"author\":{\"name\":\"awagueye\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/d79ba238f89602cec0cec7f582c8b09a\"},\"headline\":\"Managed Detection and Response (MDR): la difesa proattiva per la sicurezza informatica\",\"datePublished\":\"2025-02-11T12:30:01+00:00\",\"dateModified\":\"2025-08-05T15:11:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/managed-detection-and-response-mdr\\\/\"},\"wordCount\":6974,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/managed-detection-and-response-mdr\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2025\\\/02\\\/MDR-1.jpg\",\"keywords\":[\"Managed Detection and Response\",\"MDR\",\"SOC\"],\"articleSection\":[\"Sicurezza informatica\",\"Soluzioni\",\"Tecnologici\",\"Trend\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/managed-detection-and-response-mdr\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/managed-detection-and-response-mdr\\\/\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/managed-detection-and-response-mdr\\\/\",\"name\":\"Managed Detection and Response (MDR): la difesa proattiva per la sicurezza informatica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/managed-detection-and-response-mdr\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/managed-detection-and-response-mdr\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2025\\\/02\\\/MDR-1.jpg\",\"datePublished\":\"2025-02-11T12:30:01+00:00\",\"dateModified\":\"2025-08-05T15:11:08+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/d79ba238f89602cec0cec7f582c8b09a\"},\"description\":\"Scopri come il Managed Detection and Response (MDR) rivoluziona la sicurezza informatica aziendale con monitoraggio continuo, threat intelligence e risposta rapida agli incidenti.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/managed-detection-and-response-mdr\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/managed-detection-and-response-mdr\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/managed-detection-and-response-mdr\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2025\\\/02\\\/MDR-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/2025\\\/02\\\/MDR-1.jpg\",\"width\":1920,\"height\":1278,\"caption\":\"MDR\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/managed-detection-and-response-mdr\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managed Detection and Response (MDR): la difesa proattiva per la sicurezza informatica\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#website\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/\",\"name\":\"Magazine\",\"description\":\"smeup\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/#\\\/schema\\\/person\\\/d79ba238f89602cec0cec7f582c8b09a\",\"name\":\"awagueye\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/70a570cc355be3877420c9354ff82641fe23c97f767b9be1515c06d1d95c2ee7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/70a570cc355be3877420c9354ff82641fe23c97f767b9be1515c06d1d95c2ee7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/70a570cc355be3877420c9354ff82641fe23c97f767b9be1515c06d1d95c2ee7?s=96&d=mm&r=g\",\"caption\":\"awagueye\"},\"url\":\"https:\\\/\\\/www.smeup.com\\\/magazine\\\/blog\\\/author\\\/awagueye\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Managed Detection and Response (MDR): la difesa proattiva per la sicurezza informatica","description":"Scopri come il Managed Detection and Response (MDR) rivoluziona la sicurezza informatica aziendale con monitoraggio continuo, threat intelligence e risposta rapida agli incidenti.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/","og_locale":"it_IT","og_type":"article","og_title":"Managed Detection and Response (MDR): la difesa proattiva per la sicurezza informatica","og_description":"Scopri come il Managed Detection and Response (MDR) rivoluziona la sicurezza informatica aziendale con monitoraggio continuo, threat intelligence e risposta rapida agli incidenti.","og_url":"https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/","og_site_name":"Magazine","article_published_time":"2025-02-11T12:30:01+00:00","article_modified_time":"2025-08-05T15:11:08+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/MDR-Cybersecurity_seo-social.png","type":"image\/png"}],"author":"awagueye","twitter_card":"summary_large_image","twitter_title":"Ottimizza la tua produzione con strumenti avanzati di Pianificazione e Controllo","twitter_description":"scoprirai come un software di pianificazione e controllo della produzione pu\u00f2 trasformare la tua azienda, migliorando l'efficienza operativa e riducendo i costi.","twitter_misc":{"Scritto da":"awagueye","Tempo di lettura stimato":"6 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/#article","isPartOf":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/"},"author":{"name":"awagueye","@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/d79ba238f89602cec0cec7f582c8b09a"},"headline":"Managed Detection and Response (MDR): la difesa proattiva per la sicurezza informatica","datePublished":"2025-02-11T12:30:01+00:00","dateModified":"2025-08-05T15:11:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/"},"wordCount":6974,"commentCount":0,"image":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/MDR-1.jpg","keywords":["Managed Detection and Response","MDR","SOC"],"articleSection":["Sicurezza informatica","Soluzioni","Tecnologici","Trend"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/","url":"https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/","name":"Managed Detection and Response (MDR): la difesa proattiva per la sicurezza informatica","isPartOf":{"@id":"https:\/\/www.smeup.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/#primaryimage"},"image":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/MDR-1.jpg","datePublished":"2025-02-11T12:30:01+00:00","dateModified":"2025-08-05T15:11:08+00:00","author":{"@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/d79ba238f89602cec0cec7f582c8b09a"},"description":"Scopri come il Managed Detection and Response (MDR) rivoluziona la sicurezza informatica aziendale con monitoraggio continuo, threat intelligence e risposta rapida agli incidenti.","breadcrumb":{"@id":"https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/#primaryimage","url":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/MDR-1.jpg","contentUrl":"https:\/\/www.smeup.com\/magazine\/wp-content\/uploads\/sites\/5\/2025\/02\/MDR-1.jpg","width":1920,"height":1278,"caption":"MDR"},{"@type":"BreadcrumbList","@id":"https:\/\/www.smeup.com\/magazine\/blog\/managed-detection-and-response-mdr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.smeup.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Managed Detection and Response (MDR): la difesa proattiva per la sicurezza informatica"}]},{"@type":"WebSite","@id":"https:\/\/www.smeup.com\/magazine\/#website","url":"https:\/\/www.smeup.com\/magazine\/","name":"Magazine","description":"smeup","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.smeup.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.smeup.com\/magazine\/#\/schema\/person\/d79ba238f89602cec0cec7f582c8b09a","name":"awagueye","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/70a570cc355be3877420c9354ff82641fe23c97f767b9be1515c06d1d95c2ee7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/70a570cc355be3877420c9354ff82641fe23c97f767b9be1515c06d1d95c2ee7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/70a570cc355be3877420c9354ff82641fe23c97f767b9be1515c06d1d95c2ee7?s=96&d=mm&r=g","caption":"awagueye"},"url":"https:\/\/www.smeup.com\/magazine\/blog\/author\/awagueye\/"}]}},"_links":{"self":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/57790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/comments?post=57790"}],"version-history":[{"count":30,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/57790\/revisions"}],"predecessor-version":[{"id":58120,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/posts\/57790\/revisions\/58120"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/media\/58004"}],"wp:attachment":[{"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/media?parent=57790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/categories?post=57790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.smeup.com\/magazine\/wp-json\/wp\/v2\/tags?post=57790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}