{"id":93063,"date":"2022-11-21T14:36:00","date_gmt":"2022-11-21T13:36:00","guid":{"rendered":"https:\/\/www.dgsspa.com\/visibility\/"},"modified":"2023-04-13T09:27:58","modified_gmt":"2023-04-13T08:27:58","slug":"visibility","status":"publish","type":"page","link":"https:\/\/www.dgsspa.com\/en\/cyber-security\/customised-solutions\/visibility\/","title":{"rendered":"Visibility"},"content":{"rendered":"<section class=\"dgs-hero\">\n\t<div class=\"dgs-hero-bg\" style=\"background: url('https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/bg-managed-services-min.jpg') no-repeat 50% 50%; background-size: cover;\"><\/div>\n\t\t<div class=\"dgs-hero-ptrn \"><\/div>\n\t<div class=\"hero-inner\">\n\t\t\n\n<span class=\"wp-block-dgs-theme-category-title category-title\"><span class=\"label\">Customised Solutions<\/span><\/span>\n\n\n\n<h1 class=\"hero-heading hero-heading--undefined\">Visibility<\/h1>\n\n\t<\/div>\n<\/section>\n\n\n<nav class=\"no-wrap alignfull is-style-sticky wp-block-navigation is-nowrap is-layout-flex wp-container-core-navigation-is-layout-ad2f72ca wp-block-navigation-is-layout-flex\" aria-label=\"Customised Solutions\"><ul class=\"wp-block-navigation__container  no-wrap alignfull is-style-sticky wp-block-navigation\"><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/www.dgsspa.com\/en\/customised-solutions\/zero-trust\/\"><span class=\"wp-block-navigation-item__label\">Zero Trust<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/www.dgsspa.com\/en\/customised-solutions\/visibility\/\"><span class=\"wp-block-navigation-item__label\">Visibility<\/span><\/a><\/li><\/ul><\/nav>\n\n\n<div class=\"wp-block-media-text alignfull has-media-on-the-right is-stacked-on-mobile is-image-fill\" id=\"content\"><div class=\"wp-block-media-text__content\">\n<span class=\"wp-block-dgs-theme-category-title category-title\"><span class=\"label\">Visibility<\/span><\/span>\n\n\n\n<p>We help you to have complete visibility of your IT infrastructure. Visibility is the key to knowing your attack surface with the aim of identifying risks, monitoring all attack vectors, and managing vulnerabilities to protect your assets and your brand.<\/p>\n\n\n\n<p>Learn more about the individual services.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\" style=\"background-image:url(https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/customised-solutions-building.jpg);background-position:50% 50%\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"699\" src=\"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/customised-solutions-building.jpg\" alt=\"\" class=\"wp-image-258 size-full\" srcset=\"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/customised-solutions-building.jpg 700w, https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/customised-solutions-building-300x300.jpg 300w, https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/customised-solutions-building-150x150.jpg 150w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-group alignfull content-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull main-text is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-cyan-color has-text-color\">Application<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>The multi-layered visibility of business applications in terms of usage, operational flows, and infrastructure architecture allows you to mitigate the risk associated with cyber threats and increase the operational resilience of business services.Our offer includes: Application Flow, Application Mapping.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignfull main-text is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-cyan-color has-text-color\">Compliance<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Measuring compliance with Best Practices and industry regulations allows you to reduce the risk associated with cyber threats. Having clear visibility of the degree of compliance is essential for planning the evolution of your security infrastructure with a clear road map.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignfull main-text is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-cyan-color has-text-color\">Data &amp; Information<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Multi-level visibility into data access and use allows you to proactively manage the risk associated with information loss and increase your organization&#8217;s operational resiliency.<\/p>\n\n\n\n<p>Our offer includes: Data Governance, Data Breach Management, Data Protection (in Motion, Data at Rest, Data at Use).<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignfull main-text is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-cyan-color has-text-color\">Identity<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>With Identity solutions we guarantee multi-level visibility of identities in terms of profiling and use. With these premises, your company becomes able to proactively manage the risk associated with operations, increasing its operational resilience.<\/p>\n\n\n\n<p>Our offer includes: Identity Governance, PAM, IAM, IGA, Secrets Management, ICES.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignfull main-text is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-cyan-color has-text-color\">Security Posture<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Security Posture solutions allow you to have a direct overview of the security status of a corporate IT infrastructure, to organize its defenses and to respond effectively and quickly to any attacks.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignfull main-text is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-cyan-color has-text-color\">Threat<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Multilayered visibility into threats allows you to proactively manage associated risk, increasing business operational resilience.<\/p>\n\n\n\n<p>Our offer includes: Threat Hunting, Threat Detection, Threat Intelligence, Threat Emulation.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignfull main-text is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading has-cyan-color has-text-color\">Vulnerabilities<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Thanks to a clear visibility of the vulnerabilities of an IT infrastructure, you will have the information necessary to plan and implement the necessary actions to reduce the attack surface and the associated risk.<\/p>\n\n\n\n<p>Our offer includes: VA\/PT, NPT, WAPT, MAPT, Wireless Assessment (WA), BAS, EASM.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-cover alignfull cta-section\" style=\"min-height:41vw;aspect-ratio:unset;\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"370\" class=\"wp-block-cover__image-background wp-image-176535 size-large\" alt=\"\" src=\"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2026\/03\/gradienta-KZ5EIdidXSk-unsplash-2-1024x370.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2026\/03\/gradienta-KZ5EIdidXSk-unsplash-2-1024x370.jpg 1024w, https:\/\/www.dgsspa.com\/wp-content\/uploads\/2026\/03\/gradienta-KZ5EIdidXSk-unsplash-2-300x108.jpg 300w, https:\/\/www.dgsspa.com\/wp-content\/uploads\/2026\/03\/gradienta-KZ5EIdidXSk-unsplash-2-768x277.jpg 768w, https:\/\/www.dgsspa.com\/wp-content\/uploads\/2026\/03\/gradienta-KZ5EIdidXSk-unsplash-2.jpg 1440w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-0 has-background-dim\" style=\"background-color:#396a88\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-group alignfull mk-banner has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading has-text-align-center has-background-color has-text-color\" style=\"font-style:normal;font-weight:300\">Are you looking for a product or for an ad hoc solution for your business?&nbsp;<\/h3>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background-color has-text-color wp-element-button\" href=\"https:\/\/www.dgsspa.com\/en\/contatti\/scrivici\/\">ask for information<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<button class=\"wp-block-dgs-theme-scrollup mk-scroll-up has-background-color has-text-color\"><svg version=\"1.1\" width=\"40\" height=\"40\" aria-hidden=\"true\"><path class=\"st0\" d=\"M20,0c11,0,20,9,20,20s-9,20-20,20S0,31,0,20S9,0,20,0z M20,39c10.5,0,19-8.5,19-19S30.5,1,20,1S1,9.5,1,20 S9.5,39,20,39z M13.8,21.3c-0.4-0.4-0.4-1.1,0-1.5L20,14l6.2,5.8c0.4,0.4,0.4,1.1,0,1.5l-0.1,0.1c-0.4,0.4-1,0.4-1.4,0l-4.8-4.5 l-4.8,4.5C14.8,21.7,14.2,21.7,13.8,21.3L13.8,21.3z\"><\/path><\/svg><\/button>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Application The multi-layered visibility of business applications in terms of usage, operational flows, and infrastructure architecture allows you to mitigate the risk associated with cyber threats and increase the operational resilience of business services.Our offer includes: Application Flow, Application Mapping. Compliance Measuring compliance with Best Practices and industry regulations allows you to reduce the risk [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":93081,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[57],"class_list":["post-93063","page","type-page","status-publish","hentry","category-customised-solutions-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Visibility - DGS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dgsspa.com\/en\/cyber-security\/customised-solutions\/visibility\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Visibility - DGS\" \/>\n<meta property=\"og:description\" content=\"Application The multi-layered visibility of business applications in terms of usage, operational flows, and infrastructure architecture allows you to mitigate the risk associated with cyber threats and increase the operational resilience of business services.Our offer includes: Application Flow, Application Mapping. Compliance Measuring compliance with Best Practices and industry regulations allows you to reduce the risk [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dgsspa.com\/en\/cyber-security\/customised-solutions\/visibility\/\" \/>\n<meta property=\"og:site_name\" content=\"DGS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gruppoDGS\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-13T08:27:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/customised-solutions-building.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@dgs_group\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/customised-solutions\\\/visibility\\\/\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/customised-solutions\\\/visibility\\\/\",\"name\":\"Visibility - DGS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/customised-solutions\\\/visibility\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/customised-solutions\\\/visibility\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dgsspa.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/customised-solutions-building.jpg\",\"datePublished\":\"2022-11-21T13:36:00+00:00\",\"dateModified\":\"2023-04-13T08:27:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/customised-solutions\\\/visibility\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/customised-solutions\\\/visibility\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/customised-solutions\\\/visibility\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/customised-solutions-building.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dgsspa.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/customised-solutions-building.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/customised-solutions\\\/visibility\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\",\"item\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Customised Solutions\",\"item\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/customised-solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Visibility\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/\",\"name\":\"DGS spa\",\"description\":\"DGS SPA\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#organization\",\"name\":\"DGS spa\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Logo_DGS.png\",\"contentUrl\":\"https:\\\/\\\/www.dgsspa.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Logo_DGS.png\",\"width\":400,\"height\":400,\"caption\":\"DGS spa\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/gruppoDGS\",\"https:\\\/\\\/x.com\\\/dgs_group\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dgsspa\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCTrU_JDYEEOcYXNjL5a9k5g\",\"https:\\\/\\\/www.instagram.com\\\/dgs_spa\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Visibility - DGS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dgsspa.com\/en\/cyber-security\/customised-solutions\/visibility\/","og_locale":"en_US","og_type":"article","og_title":"Visibility - DGS","og_description":"Application The multi-layered visibility of business applications in terms of usage, operational flows, and infrastructure architecture allows you to mitigate the risk associated with cyber threats and increase the operational resilience of business services.Our offer includes: Application Flow, Application Mapping. Compliance Measuring compliance with Best Practices and industry regulations allows you to reduce the risk [&hellip;]","og_url":"https:\/\/www.dgsspa.com\/en\/cyber-security\/customised-solutions\/visibility\/","og_site_name":"DGS","article_publisher":"https:\/\/www.facebook.com\/gruppoDGS","article_modified_time":"2023-04-13T08:27:58+00:00","og_image":[{"url":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/customised-solutions-building.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@dgs_group","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.dgsspa.com\/en\/cyber-security\/customised-solutions\/visibility\/","url":"https:\/\/www.dgsspa.com\/en\/cyber-security\/customised-solutions\/visibility\/","name":"Visibility - DGS","isPartOf":{"@id":"https:\/\/www.dgsspa.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dgsspa.com\/en\/cyber-security\/customised-solutions\/visibility\/#primaryimage"},"image":{"@id":"https:\/\/www.dgsspa.com\/en\/cyber-security\/customised-solutions\/visibility\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/customised-solutions-building.jpg","datePublished":"2022-11-21T13:36:00+00:00","dateModified":"2023-04-13T08:27:58+00:00","breadcrumb":{"@id":"https:\/\/www.dgsspa.com\/en\/cyber-security\/customised-solutions\/visibility\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dgsspa.com\/en\/cyber-security\/customised-solutions\/visibility\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dgsspa.com\/en\/cyber-security\/customised-solutions\/visibility\/#primaryimage","url":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/customised-solutions-building.jpg","contentUrl":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/customised-solutions-building.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dgsspa.com\/en\/cyber-security\/customised-solutions\/visibility\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dgsspa.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Security","item":"https:\/\/www.dgsspa.com\/en\/cyber-security\/"},{"@type":"ListItem","position":3,"name":"Customised Solutions","item":"https:\/\/www.dgsspa.com\/en\/cyber-security\/customised-solutions\/"},{"@type":"ListItem","position":4,"name":"Visibility"}]},{"@type":"WebSite","@id":"https:\/\/www.dgsspa.com\/en\/#website","url":"https:\/\/www.dgsspa.com\/en\/","name":"DGS spa","description":"DGS SPA","publisher":{"@id":"https:\/\/www.dgsspa.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dgsspa.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.dgsspa.com\/en\/#organization","name":"DGS spa","url":"https:\/\/www.dgsspa.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dgsspa.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/Logo_DGS.png","contentUrl":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/Logo_DGS.png","width":400,"height":400,"caption":"DGS spa"},"image":{"@id":"https:\/\/www.dgsspa.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gruppoDGS","https:\/\/x.com\/dgs_group","https:\/\/www.linkedin.com\/company\/dgsspa\/","https:\/\/www.youtube.com\/channel\/UCTrU_JDYEEOcYXNjL5a9k5g","https:\/\/www.instagram.com\/dgs_spa"]}]}},"_links":{"self":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/pages\/93063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/comments?post=93063"}],"version-history":[{"count":8,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/pages\/93063\/revisions"}],"predecessor-version":[{"id":94717,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/pages\/93063\/revisions\/94717"}],"up":[{"embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/pages\/93081"}],"wp:attachment":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/media?parent=93063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/categories?post=93063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}