{"id":93088,"date":"2022-11-08T23:09:37","date_gmt":"2022-11-08T22:09:37","guid":{"rendered":"https:\/\/www.dgsspa.com\/cyber-security\/managed-services\/"},"modified":"2026-03-12T15:07:01","modified_gmt":"2026-03-12T14:07:01","slug":"managed-services","status":"publish","type":"page","link":"https:\/\/www.dgsspa.com\/en\/cyber-security\/managed-services\/","title":{"rendered":"Managed Services"},"content":{"rendered":"<section class=\"dgs-hero\">\n\t<div class=\"dgs-hero-bg\" style=\"background: url('https:\/\/www.dgsspa.com\/wp-content\/themes\/dgs-theme\/img\/bg-hero-default.jpg') no-repeat 50% 50%; background-size: cover;\"><\/div>\n\t\t<div class=\"dgs-hero-ptrn \"><\/div>\n\t<div class=\"hero-inner\">\n\t\t\n\n<span class=\"wp-block-dgs-theme-category-title category-title\"><span class=\"label\">Cyber Security<\/span><\/span>\n\n\n\n<h1 class=\"hero-heading hero-heading--undefined\">Managed Services<\/h1>\n\n\n\n<div class=\"wp-block-dgs-theme-hero-text hero-text\"><p>Keep your business infrastructure and your Cyber Security policies effective and efficient against cyber threats.<br>With DGS you will be able to benefit from the advantages deriving from our offer of managed services that leverage simplification and automation, always counting on our expertise and proactivity.<br>Discover all our Managed Services.<\/p><\/div>\n\n\t<\/div>\n<\/section>\n\n\n<nav class=\"is-responsive wp-block-navigation is-layout-flex wp-block-navigation-is-layout-flex\" aria-label=\"Managed Services\" \n\t\t data-wp-interactive=\"core\/navigation\" data-wp-context='{\"overlayOpenedBy\":{\"click\":false,\"hover\":false,\"focus\":false},\"type\":\"overlay\",\"roleAttribute\":\"\",\"ariaLabel\":\"Menu\"}'><button aria-haspopup=\"dialog\" aria-label=\"Open menu\" class=\"wp-block-navigation__responsive-container-open\" \n\t\t\t\tdata-wp-on-async--click=\"actions.openMenuOnClick\"\n\t\t\t\tdata-wp-on--keydown=\"actions.handleMenuKeydown\"\n\t\t\t><svg width=\"24\" height=\"24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" aria-hidden=\"true\" focusable=\"false\"><rect x=\"4\" y=\"7.5\" width=\"16\" height=\"1.5\" \/><rect x=\"4\" y=\"15\" width=\"16\" height=\"1.5\" \/><\/svg><\/button>\n\t\t\t\t<div class=\"wp-block-navigation__responsive-container\"  id=\"modal-1\" \n\t\t\t\tdata-wp-class--has-modal-open=\"state.isMenuOpen\"\n\t\t\t\tdata-wp-class--is-menu-open=\"state.isMenuOpen\"\n\t\t\t\tdata-wp-watch=\"callbacks.initMenu\"\n\t\t\t\tdata-wp-on--keydown=\"actions.handleMenuKeydown\"\n\t\t\t\tdata-wp-on-async--focusout=\"actions.handleMenuFocusout\"\n\t\t\t\ttabindex=\"-1\"\n\t\t\t>\n\t\t\t\t\t<div class=\"wp-block-navigation__responsive-close\" tabindex=\"-1\">\n\t\t\t\t\t\t<div class=\"wp-block-navigation__responsive-dialog\" \n\t\t\t\tdata-wp-bind--aria-modal=\"state.ariaModal\"\n\t\t\t\tdata-wp-bind--aria-label=\"state.ariaLabel\"\n\t\t\t\tdata-wp-bind--role=\"state.roleAttribute\"\n\t\t\t>\n\t\t\t\t\t\t\t<button aria-label=\"Close menu\" class=\"wp-block-navigation__responsive-container-close\" \n\t\t\t\tdata-wp-on-async--click=\"actions.closeMenuOnClick\"\n\t\t\t><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\" width=\"24\" height=\"24\" aria-hidden=\"true\" focusable=\"false\"><path d=\"m13.06 12 6.47-6.47-1.06-1.06L12 10.94 5.53 4.47 4.47 5.53 10.94 12l-6.47 6.47 1.06 1.06L12 13.06l6.47 6.47 1.06-1.06L13.06 12Z\"><\/path><\/svg><\/button>\n\t\t\t\t\t\t\t<div class=\"wp-block-navigation__responsive-container-content\" \n\t\t\t\tdata-wp-watch=\"callbacks.focusFirstElement\"\n\t\t\t id=\"modal-1-content\">\n\t\t\t\t\t\t\t\t<ul class=\"wp-block-navigation__container is-responsive wp-block-navigation\"><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/www.dgsspa.com\/en\/managed-services\/cyber-services\/\"><span class=\"wp-block-navigation-item__label\">Cyber services<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/www.dgsspa.com\/en\/managed-services\/device-management\/#content\"><span class=\"wp-block-navigation-item__label\">Device management<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/www.dgsspa.com\/en\/managed-services\/assurance\/#content\"><span class=\"wp-block-navigation-item__label\">Assurance<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/www.dgsspa.com\/cyber-security\/managed-services\/x-soc\/\"><span class=\"wp-block-navigation-item__label\">X-SOC<\/span><\/a><\/li><li class=\" wp-block-navigation-item wp-block-navigation-link\"><a class=\"wp-block-navigation-item__content\"  href=\"https:\/\/www.dgsspa.com\/en\/cyber-security\/managed-services\/armonisya\/\"><span class=\"wp-block-navigation-item__label\">Armonisya<\/span><\/a><\/li><\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/nav>\n\n\n<section class=\"wp-block-group alignfull content-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" id=\"content\">\n<div class=\"wp-block-columns alignwide main-text is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<span class=\"wp-block-dgs-theme-category-title category-title\"><span class=\"label\">Cyber services<\/span><\/span>\n\n\n\n<h3 class=\"wp-block-heading\">An expert team of security professionals and latest generation platforms dedicated to identifying and reducing the attack surface of your company to make infrastructure, processes, data and people more secure.<\/h3>\n\n\n\n<p>Learn more about the individual services.&nbsp;<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-dgs-theme-subsection-heading subsection-heading subsection-heading--top --has-icon\"><img decoding=\"async\" src=\"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/icon-shield-eye.svg\"\/><span>VA\/PT &#8211; Vulnerability Assessment &amp; Penetration Test<\/span><\/h3>\n\n\n\n<p>Vulnerability identification of an IT infrastructure is the first step to reduce the attack surface with the aim of reducing the associated risk.<br>Our offer includes: VA\/PT, NPT, WAPT, MAPT, Wireless Assessment (WA).<\/p>\n\n\n\n<h3 class=\"wp-block-dgs-theme-subsection-heading subsection-heading subsection-heading--top --has-icon\"><img decoding=\"async\" src=\"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/icon-shield-criminal.svg\"\/><span>BAS &#8211; Breach Attack Simulation<\/span><\/h3>\n\n\n\n<p>We simulate breaches and attacks to test your company&#8217;s entire Cyber Security infrastructure by imitating the techniques, tactics and procedures used by malicious actors.<\/p>\n\n\n\n<h3 class=\"wp-block-dgs-theme-subsection-heading subsection-heading subsection-heading--top --has-icon\"><img decoding=\"async\" src=\"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/icon-shield-crosshair.svg\"\/><span>EASM &#8211; External Attack Surface Management<\/span><\/h3>\n\n\n\n<p>With the external attack surface management (EASM) service, we continuously search for vulnerabilities and anomalies in systems and technologies &#8211; such as infrastructure, third-party services and applications &#8211; that could exploit entry or exit points on interfaces public.<br>Identifying and monitoring changes in the external attack surface is critical to pinpointing the actions you need to take to secure your attack surface.<\/p>\n\n\n\n<h3 class=\"wp-block-dgs-theme-subsection-heading subsection-heading subsection-heading--top --has-icon\"><img decoding=\"async\" src=\"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/icon-shield-lock.svg\"\/><span>Blue Team<\/span><\/h3>\n\n\n\n<p>The Blue Team defends your company from attacks, eliminates security risks and responds when cybersecurity incidents occur.<\/p>\n\n\n\n<h3 class=\"wp-block-dgs-theme-subsection-heading subsection-heading subsection-heading--top --has-icon\"><img decoding=\"async\" src=\"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/icon-shield-lock-open.svg\"\/><span>Red Team<\/span><\/h3>\n\n\n\n<p>The Red Team simulates the attacker and tries to take over the systems using the vulnerabilities of technologies and people. Once this hacking phase is over, it takes care that all the vulnerabilities found are reported and eliminated.<\/p>\n\n\n\n<h3 class=\"wp-block-dgs-theme-subsection-heading subsection-heading subsection-heading--top --has-icon\"><img decoding=\"async\" src=\"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/icon-shield-umbrella.svg\"\/><span>Purple Team<\/span><\/h3>\n\n\n\n<p>The Purple Team merges tools and knowledge from both Blue Team and Red Team and allows us to help you respond to threats more efficiently. Information security risks are constantly evolving and this new collaborative approach ensures better protection, containment and response.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n<div class=\"wp-block-cover alignfull cta-section\" style=\"min-height:41vw;aspect-ratio:unset;\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"370\" class=\"wp-block-cover__image-background wp-image-176535 size-large\" alt=\"\" src=\"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2026\/03\/gradienta-KZ5EIdidXSk-unsplash-2-1024x370.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2026\/03\/gradienta-KZ5EIdidXSk-unsplash-2-1024x370.jpg 1024w, https:\/\/www.dgsspa.com\/wp-content\/uploads\/2026\/03\/gradienta-KZ5EIdidXSk-unsplash-2-300x108.jpg 300w, https:\/\/www.dgsspa.com\/wp-content\/uploads\/2026\/03\/gradienta-KZ5EIdidXSk-unsplash-2-768x277.jpg 768w, https:\/\/www.dgsspa.com\/wp-content\/uploads\/2026\/03\/gradienta-KZ5EIdidXSk-unsplash-2.jpg 1440w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-0 has-background-dim\" style=\"background-color:#396a88\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<div class=\"wp-block-group alignfull mk-banner has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading has-text-align-center has-background-color has-text-color\" style=\"font-style:normal;font-weight:300\">Are you looking for a product or for an ad hoc solution for your business?&nbsp;<\/h3>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--2\"><a class=\"wp-block-button__link has-background-color has-text-color wp-element-button\" href=\"https:\/\/www.dgsspa.com\/en\/contatti\/scrivici\/\">ask for information<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<button class=\"wp-block-dgs-theme-scrollup mk-scroll-up has-background-color has-text-color\"><svg version=\"1.1\" width=\"40\" height=\"40\" aria-hidden=\"true\"><path class=\"st0\" d=\"M20,0c11,0,20,9,20,20s-9,20-20,20S0,31,0,20S9,0,20,0z M20,39c10.5,0,19-8.5,19-19S30.5,1,20,1S1,9.5,1,20 S9.5,39,20,39z M13.8,21.3c-0.4-0.4-0.4-1.1,0-1.5L20,14l6.2,5.8c0.4,0.4,0.4,1.1,0,1.5l-0.1,0.1c-0.4,0.4-1,0.4-1.4,0l-4.8-4.5 l-4.8,4.5C14.8,21.7,14.2,21.7,13.8,21.3L13.8,21.3z\"><\/path><\/svg><\/button>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>An expert team of security professionals and latest generation platforms dedicated to identifying and reducing the attack surface of your company to make infrastructure, processes, data and people more secure. Learn more about the individual services.&nbsp; Vulnerability identification of an IT infrastructure is the first step to reduce the attack surface with the aim of [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":92965,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"class_list":["post-93088","page","type-page","status-publish","hentry","category-cyber-security-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Managed Services - DGS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dgsspa.com\/en\/cyber-security\/managed-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managed Services - DGS\" \/>\n<meta property=\"og:description\" content=\"An expert team of security professionals and latest generation platforms dedicated to identifying and reducing the attack surface of your company to make infrastructure, processes, data and people more secure. Learn more about the individual services.&nbsp; Vulnerability identification of an IT infrastructure is the first step to reduce the attack surface with the aim of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dgsspa.com\/en\/cyber-security\/managed-services\/\" \/>\n<meta property=\"og:site_name\" content=\"DGS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gruppoDGS\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T14:07:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/icon-shield-eye.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@dgs_group\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/managed-services\\\/\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/managed-services\\\/\",\"name\":\"Managed Services - DGS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/managed-services\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/managed-services\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dgsspa.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/icon-shield-eye.svg\",\"datePublished\":\"2022-11-08T22:09:37+00:00\",\"dateModified\":\"2026-03-12T14:07:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/managed-services\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/managed-services\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/managed-services\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/icon-shield-eye.svg\",\"contentUrl\":\"https:\\\/\\\/www.dgsspa.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/icon-shield-eye.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/managed-services\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\",\"item\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/cyber-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Managed Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/\",\"name\":\"DGS spa\",\"description\":\"DGS SPA\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#organization\",\"name\":\"DGS spa\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dgsspa.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Logo_DGS.png\",\"contentUrl\":\"https:\\\/\\\/www.dgsspa.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Logo_DGS.png\",\"width\":400,\"height\":400,\"caption\":\"DGS spa\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dgsspa.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/gruppoDGS\",\"https:\\\/\\\/x.com\\\/dgs_group\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dgsspa\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCTrU_JDYEEOcYXNjL5a9k5g\",\"https:\\\/\\\/www.instagram.com\\\/dgs_spa\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Managed Services - DGS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dgsspa.com\/en\/cyber-security\/managed-services\/","og_locale":"en_US","og_type":"article","og_title":"Managed Services - DGS","og_description":"An expert team of security professionals and latest generation platforms dedicated to identifying and reducing the attack surface of your company to make infrastructure, processes, data and people more secure. Learn more about the individual services.&nbsp; Vulnerability identification of an IT infrastructure is the first step to reduce the attack surface with the aim of [&hellip;]","og_url":"https:\/\/www.dgsspa.com\/en\/cyber-security\/managed-services\/","og_site_name":"DGS","article_publisher":"https:\/\/www.facebook.com\/gruppoDGS","article_modified_time":"2026-03-12T14:07:01+00:00","og_image":[{"url":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/icon-shield-eye.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@dgs_group","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.dgsspa.com\/en\/cyber-security\/managed-services\/","url":"https:\/\/www.dgsspa.com\/en\/cyber-security\/managed-services\/","name":"Managed Services - DGS","isPartOf":{"@id":"https:\/\/www.dgsspa.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dgsspa.com\/en\/cyber-security\/managed-services\/#primaryimage"},"image":{"@id":"https:\/\/www.dgsspa.com\/en\/cyber-security\/managed-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/icon-shield-eye.svg","datePublished":"2022-11-08T22:09:37+00:00","dateModified":"2026-03-12T14:07:01+00:00","breadcrumb":{"@id":"https:\/\/www.dgsspa.com\/en\/cyber-security\/managed-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dgsspa.com\/en\/cyber-security\/managed-services\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dgsspa.com\/en\/cyber-security\/managed-services\/#primaryimage","url":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/icon-shield-eye.svg","contentUrl":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/icon-shield-eye.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dgsspa.com\/en\/cyber-security\/managed-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dgsspa.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Security","item":"https:\/\/www.dgsspa.com\/en\/cyber-security\/"},{"@type":"ListItem","position":3,"name":"Managed Services"}]},{"@type":"WebSite","@id":"https:\/\/www.dgsspa.com\/en\/#website","url":"https:\/\/www.dgsspa.com\/en\/","name":"DGS spa","description":"DGS SPA","publisher":{"@id":"https:\/\/www.dgsspa.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dgsspa.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.dgsspa.com\/en\/#organization","name":"DGS spa","url":"https:\/\/www.dgsspa.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dgsspa.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/Logo_DGS.png","contentUrl":"https:\/\/www.dgsspa.com\/wp-content\/uploads\/2022\/11\/Logo_DGS.png","width":400,"height":400,"caption":"DGS spa"},"image":{"@id":"https:\/\/www.dgsspa.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gruppoDGS","https:\/\/x.com\/dgs_group","https:\/\/www.linkedin.com\/company\/dgsspa\/","https:\/\/www.youtube.com\/channel\/UCTrU_JDYEEOcYXNjL5a9k5g","https:\/\/www.instagram.com\/dgs_spa"]}]}},"_links":{"self":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/pages\/93088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/comments?post=93088"}],"version-history":[{"count":10,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/pages\/93088\/revisions"}],"predecessor-version":[{"id":176533,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/pages\/93088\/revisions\/176533"}],"up":[{"embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/pages\/92965"}],"wp:attachment":[{"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/media?parent=93088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dgsspa.com\/en\/wp-json\/wp\/v2\/categories?post=93088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}