{"id":2146,"date":"2026-02-03T15:05:40","date_gmt":"2026-02-03T15:05:40","guid":{"rendered":"https:\/\/lecs.cyberevolution.it\/?page_id=2146"},"modified":"2026-03-24T16:27:50","modified_gmt":"2026-03-24T15:27:50","slug":"lecs-ai-agent-cybersecurity","status":"publish","type":"page","link":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/","title":{"rendered":"Agent"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2146\" class=\"elementor elementor-2146\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8eb0768 e-flex e-con-boxed e-con e-parent\" data-id=\"8eb0768\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;https:\\\/\\\/lecs.io\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/lecs-ai-agent-tiresia.mp4&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-background-video-container elementor-hidden-mobile\">\n\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t<\/div>\t\t<div class=\"elementor-element elementor-element-192d757 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"192d757\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">NEXT RELEASE: L'unico Agent AI che anticipa le intenzioni dei cyber criminali.<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e8489e elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"5e8489e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1031\" data-end=\"1257\">Il modulo software di LECS Platform che analizza comportamento, contesto e identit\u00e0 in tempo reale per rilevare abusi di credenziali, movimenti laterali e minacce interne prima che diventino un danno operativo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fcf41a9 button-lecs e-transform elementor-widget elementor-widget-button\" data-id=\"fcf41a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_translateX_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-5,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#ai-agent\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"1351\" height=\"1351\" viewBox=\"0 0 1351 1351\" fill=\"none\"><path d=\"M675.5 3.15081e-05C1048.57 4.78154e-05 1351 302.432 1351 675.5C1351 1048.57 1048.57 1351 675.5 1351C302.432 1351 1.32197e-05 1048.57 2.9527e-05 675.5C4.58344e-05 302.432 302.432 1.52008e-05 675.5 3.15081e-05Z\" fill=\"black\"><\/path><path d=\"M816.229 534.791L816.229 816.249L534.77 816.249\" stroke=\"white\" stroke-width=\"56.2917\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M534.77 534.791L816.229 816.249\" stroke=\"white\" stroke-width=\"56.2917\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">SCOPRI COME ANTICIPA LE MINACCE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-62620db e-flex e-con-boxed e-con e-parent\" data-id=\"62620db\" data-element_type=\"container\" data-e-type=\"container\" id=\"ai-agent\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dae576b e-con-full e-flex e-con e-child\" data-id=\"dae576b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-305a1a1 e-con-full e-flex e-con e-child\" data-id=\"305a1a1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-396febb elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-lottie\" data-id=\"396febb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;source_json&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/lecs.io\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/lecs-the-limit-of-traditional-defense.json&quot;,&quot;id&quot;:6925,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;&quot;,&quot;source&quot;:&quot;library&quot;},&quot;lazyload&quot;:&quot;yes&quot;,&quot;source&quot;:&quot;media_file&quot;,&quot;caption_source&quot;:&quot;none&quot;,&quot;link_to&quot;:&quot;none&quot;,&quot;trigger&quot;:&quot;arriving_to_viewport&quot;,&quot;viewport&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;play_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;start_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;end_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;renderer&quot;:&quot;svg&quot;}\" data-widget_type=\"lottie.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"e-lottie__container\"><div class=\"e-lottie__animation\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e22bc9 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"4e22bc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Perch\u00e9 l\u2019EDR tradizionale non \u00e8 pi\u00f9 sufficiente?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2f9563 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"f2f9563\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Il 75% degli attacchi oggi utilizza credenziali valide.<\/strong> Se il cyber criminale entra con una password rubata diventa un utente autorizzato. Il rischio non \u00e8 pi\u00f9 il &#8220;file infetto&#8221;, ma l\u2019azione anomala nel contesto sbagliato. L&#8217;AGENT colma questo vuoto: non si limita a cercare malware o file sospetti, ma individua azioni fuori contesto, anomalie comportamentali e segnali di compromissione direttamente sull\u2019host.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c080e3b button-lecs e-transform elementor-invisible elementor-widget elementor-widget-button\" data-id=\"c080e3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_translateX_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-5,&quot;sizes&quot;:[]},&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_transform_translateX_effect_hover_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/lecs.io\/it\/contatti\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"1351\" height=\"1351\" viewBox=\"0 0 1351 1351\" fill=\"none\"><path d=\"M0 675.5C0 302.432 302.432 0 675.5 0C1048.57 0 1351 302.432 1351 675.5C1351 1048.57 1048.57 1351 675.5 1351C302.432 1351 0 1048.57 0 675.5Z\" fill=\"black\"><\/path><path d=\"M534.791 534.772H816.249V816.231\" stroke=\"white\" stroke-width=\"56.2917\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M534.791 816.231L816.249 534.772\" stroke=\"white\" stroke-width=\"56.2917\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">RICHIEDI INFORMAZIONI<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-17a6339 e-con-full e-flex e-con e-child\" data-id=\"17a6339\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a2fe2ed e-con-full e-flex e-con e-child\" data-id=\"a2fe2ed\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-fd10978 e-con-full e-flex e-con e-child\" data-id=\"fd10978\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a28f4a elementor-pagination-type-bullets elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-n-carousel\" data-id=\"1a28f4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;carousel_items&quot;:[{&quot;slide_title&quot;:&quot;Slide #1&quot;,&quot;_id&quot;:&quot;5541b58&quot;},{&quot;slide_title&quot;:&quot;Slide #2&quot;,&quot;_id&quot;:&quot;76c4af0&quot;},{&quot;slide_title&quot;:&quot;Slide #3&quot;,&quot;_id&quot;:&quot;9c70ccf&quot;}],&quot;slides_to_show_tablet&quot;:&quot;1&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;offset_sides&quot;:&quot;none&quot;,&quot;arrows&quot;:&quot;yes&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-carousel swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Carosello\" dir=\"ltr\">\n\t\t\t<div class=\"swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"1\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 di 3\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b8ec98a e-flex e-con-boxed e-con e-child\" data-id=\"b8ec98a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-29549e4 e-con-full neon e-flex e-con e-child\" data-id=\"29549e4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b868824 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"b868824\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Il problema non \u00e8 solo \u201ccosa entra\u201d, ma chi sta agendo e come<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c03f665 elementor-widget elementor-widget-text-editor\" data-id=\"c03f665\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gli EDR tradizionali analizzano soprattutto l\u2019oggetto tecnico dell\u2019attacco. L&#8217;AGENT aggiunge una lettura diversa: osserva identit\u00e0, comportamento e contesto operativo, per capire se un\u2019azione apparentemente autorizzata \u00e8 davvero coerente con il profilo dell\u2019utente o del sistema.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"2\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 di 3\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cce39b9 e-flex e-con-boxed e-con e-child\" data-id=\"cce39b9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b9db25f e-con-full neon e-flex e-con e-child\" data-id=\"b9db25f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f002d0 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5f002d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Le minacce moderne sfruttano strumenti legittimi<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82bebc4 elementor-widget elementor-widget-text-editor\" data-id=\"82bebc4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Molti attacchi non richiedono malware evidente sul disco. Usano credenziali rubate, strumenti amministrativi gi\u00e0 presenti, accessi remoti e movimenti laterali. L&#8217;AGENT rileva questi pattern osservando telemetria host-based, connessioni e comportamenti sospetti in tempo reale.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"3\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 di 3\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61d3aa1 e-flex e-con-boxed e-con e-child\" data-id=\"61d3aa1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-22c0d7c e-con-full neon e-flex e-con e-child\" data-id=\"22c0d7c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a6bab5f elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a6bab5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Serve uno strato di intelligence, non l\u2019ennesimo sostituto<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef5c52e elementor-widget elementor-widget-text-editor\" data-id=\"ef5c52e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L&#8217;AGENT non chiede di rimuovere la protezione esistente. Si integra con lo stack gi\u00e0 presente e aggiunge ci\u00f2 che spesso manca: un layer di intelligence comportamentale capace di intercettare l\u2019anomalia logica prima del danno economico o operativo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\" aria-label=\"Precedente\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\" aria-label=\"Successivo\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6de3918 gradient-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"6de3918\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f4e6c4b e-con-full e-flex e-con e-child\" data-id=\"f4e6c4b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4308d68 e-con-full e-flex e-con e-child\" data-id=\"4308d68\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-8a7dd16 e-con-full e-flex e-con e-child\" data-id=\"8a7dd16\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9d9acdf lottie elementor-hidden-tablet elementor-hidden-mobile elementor-align-center elementor-widget elementor-widget-lottie\" data-id=\"9d9acdf\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;source_json&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/lecs.io\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/lecs-tiresia-map-the-intent-1.json&quot;,&quot;id&quot;:6926,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;&quot;,&quot;source&quot;:&quot;library&quot;},&quot;source&quot;:&quot;media_file&quot;,&quot;caption_source&quot;:&quot;none&quot;,&quot;link_to&quot;:&quot;none&quot;,&quot;trigger&quot;:&quot;arriving_to_viewport&quot;,&quot;viewport&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;play_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;start_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;end_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;renderer&quot;:&quot;svg&quot;}\" data-widget_type=\"lottie.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"e-lottie__container\"><div class=\"e-lottie__animation\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3193874 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"3193874\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Un nuovo livello di protezione per identit\u00e0, host e rete<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-891b15a elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"891b15a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>l\u2019AI Agent di LECS progettato per portare sull\u2019endpoint una capacit\u00e0 evoluta di analisi comportamentale e NDR host-based. Non sostituisce antivirus o EDR: li completa. Dove gli strumenti tradizionali cercano soprattutto file infetti e pattern noti, Tiresia cerca segnali fuori contesto, abusi di identit\u00e0, connessioni anomale e movimenti laterali. Il risultato \u00e8 una protezione pi\u00f9 profonda, pi\u00f9 contestuale e pi\u00f9 aderente agli scenari di attacco reali.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4ff36c6 e-con-full e-flex e-con e-child\" data-id=\"4ff36c6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-018f7bc e-con-full e-flex e-con e-child\" data-id=\"018f7bc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-12d83b5 e-con-full e-flex e-con e-child\" data-id=\"12d83b5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aa381ad elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"aa381ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Engine SPECTO:\n\nDetection continua, invisibile, in real time<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a82e2f elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"4a82e2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Il motore SPECTO analizza eventi, log e connessioni senza appesantire l\u2019operativit\u00e0 dell\u2019utente. Lavora in modalit\u00e0 discreta, classificando i segnali rilevanti e riducendo il rumore, cos\u00ec il team IT o SOC pu\u00f2 concentrarsi su eventi realmente investigabili.<\/p><ul><li data-section-id=\"56myt5\" data-start=\"4417\" data-end=\"4459\"><p data-start=\"4419\" data-end=\"4459\">Analisi continua di eventi e connessioni<\/p><\/li><li data-section-id=\"dn9v8t\" data-start=\"4460\" data-end=\"4516\"><p data-start=\"4462\" data-end=\"4516\">Rilevamento di anomalie comportamentali e fuori schema<\/p><\/li><li data-section-id=\"ze4ywi\" data-start=\"4517\" data-end=\"4561\"><p data-start=\"4519\" data-end=\"4561\">Impatto minimo sulle prestazioni dell\u2019host<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-52a0b20 e-con-full e-flex e-con e-child\" data-id=\"52a0b20\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-98804bd e-con-full e-flex e-con e-child\" data-id=\"98804bd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2af4dcb elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"2af4dcb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Engine RAISES: Response autonoma e graduata<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de381b5 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"de381b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"4582\" data-end=\"4895\">Quando L&#8217;AGENT rileva una minaccia o un comportamento incompatibile con il contesto operativo, pu\u00f2 attivare una risposta proporzionata alla gravit\u00e0 dell\u2019evento. L\u2019obiettivo non \u00e8 solo segnalare, ma contenere rapidamente il rischio e ridurre il tempo di permanenza dell\u2019attaccante.<\/p><ul data-start=\"4897\" data-end=\"5036\"><li data-section-id=\"ynk8nv\" data-start=\"4897\" data-end=\"4935\"><p data-start=\"4899\" data-end=\"4935\">Valutazione dinamica della criticit\u00e0<\/p><\/li><li data-section-id=\"1t1twyu\" data-start=\"4936\" data-end=\"4972\"><p data-start=\"4938\" data-end=\"4972\">Azioni di contenimento automatiche<\/p><\/li><li data-section-id=\"1vltrib\" data-start=\"4973\" data-end=\"5036\"><p data-start=\"4975\" data-end=\"5036\">Supporto all\u2019isolamento rapido dell\u2019endpoint o della minaccia<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c77b27d e-con-full e-flex e-con e-child\" data-id=\"c77b27d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ae5d39e e-flex e-con-boxed e-con e-parent\" data-id=\"ae5d39e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8fab40c e-con-full e-flex e-con e-child\" data-id=\"8fab40c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fe2ee6a lottie elementor-align-center elementor-widget elementor-widget-lottie\" data-id=\"fe2ee6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;source_json&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/lecs.io\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/lecs-operational-efficiency.json&quot;,&quot;id&quot;:6897,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;&quot;,&quot;source&quot;:&quot;library&quot;},&quot;source&quot;:&quot;media_file&quot;,&quot;caption_source&quot;:&quot;none&quot;,&quot;link_to&quot;:&quot;none&quot;,&quot;trigger&quot;:&quot;arriving_to_viewport&quot;,&quot;viewport&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;play_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;start_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;end_point&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:100,&quot;sizes&quot;:[]},&quot;renderer&quot;:&quot;svg&quot;}\" data-widget_type=\"lottie.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"e-lottie__container\"><div class=\"e-lottie__animation\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bb9f49 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"2bb9f49\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">L\u2019intelligenza che trasforma i dati in certezza operativa.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea77e23 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"ea77e23\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Analisi morfologica e tracciabilit\u00e0 immutabile per una difesa senza compromessi.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87588df button-lecs e-transform elementor-invisible elementor-widget elementor-widget-button\" data-id=\"87588df\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_translateX_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-5,&quot;sizes&quot;:[]},&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_transform_translateX_effect_hover_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/lecs.io\/it\/programma-partner-cyber-security\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"1351\" height=\"1351\" viewBox=\"0 0 1351 1351\" fill=\"none\"><path d=\"M0 675.5C0 302.432 302.432 0 675.5 0C1048.57 0 1351 302.432 1351 675.5C1351 1048.57 1048.57 1351 675.5 1351C302.432 1351 0 1048.57 0 675.5Z\" fill=\"black\"><\/path><path d=\"M534.791 534.772H816.249V816.231\" stroke=\"white\" stroke-width=\"56.2917\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M534.791 816.231L816.249 534.772\" stroke=\"white\" stroke-width=\"56.2917\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">DIVENTA PARTNER<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-51bf73f e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"51bf73f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3dbd410 elementor-pagination-type-bullets elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-n-carousel\" data-id=\"3dbd410\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;carousel_items&quot;:[{&quot;slide_title&quot;:&quot;Slide #1&quot;,&quot;_id&quot;:&quot;f013cac&quot;},{&quot;slide_title&quot;:&quot;Slide #2&quot;,&quot;_id&quot;:&quot;7ed6b6f&quot;},{&quot;slide_title&quot;:&quot;Slide #3&quot;,&quot;_id&quot;:&quot;886cdbf&quot;},{&quot;slide_title&quot;:&quot;Slide #3&quot;,&quot;_id&quot;:&quot;e7ffb84&quot;},{&quot;slide_title&quot;:&quot;Slide #3&quot;,&quot;_id&quot;:&quot;c0e7126&quot;},{&quot;slide_title&quot;:&quot;Slide #3&quot;,&quot;_id&quot;:&quot;acddd1a&quot;}],&quot;slides_to_show&quot;:&quot;4&quot;,&quot;slides_to_show_tablet&quot;:&quot;2&quot;,&quot;slides_to_show_mobile&quot;:&quot;1&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;arrows&quot;:&quot;yes&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;image_spacing_custom_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-carousel swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Carosello\" dir=\"ltr\">\n\t\t\t<div class=\"swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"1\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 di 6\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c0f7e54 e-flex e-con-boxed e-con e-child\" data-id=\"c0f7e54\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-265074c e-con-full hover-element card-animation-background  e-flex e-con e-child\" data-id=\"265074c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-01fd8d6 e-con-full e-flex e-con e-child\" data-id=\"01fd8d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eacb316 elementor-widget elementor-widget-heading\" data-id=\"eacb316\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Identity <br>intelligence\n<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-40f905b e-con-full e-flex e-con e-child\" data-id=\"40f905b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-836238a elementor-widget elementor-widget-text-editor\" data-id=\"836238a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Analizza il comportamento delle identit\u00e0 e segnala accessi o azioni che, pur risultando autorizzati, non sono coerenti con il contesto operativo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"2\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 di 6\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d494c4e e-flex e-con-boxed e-con e-child\" data-id=\"d494c4e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cb994ef e-con-full hover-element card-animation-background  e-flex e-con e-child\" data-id=\"cb994ef\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-2632b68 e-con-full e-flex e-con e-child\" data-id=\"2632b68\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-272a2f7 elementor-widget elementor-widget-heading\" data-id=\"272a2f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Visibilit\u00e0 <br>host-based<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-04ea101 e-con-full e-flex e-con e-child\" data-id=\"04ea101\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88805ca elementor-widget elementor-widget-text-editor\" data-id=\"88805ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Porta capacit\u00e0 NDR direttamente sull\u2019endpoint, monitorando segnali di rete e di sistema che spesso non emergono dai controlli perimetrali.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"3\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 di 6\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-137c06a e-flex e-con-boxed e-con e-child\" data-id=\"137c06a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f87bf2a e-con-full hover-element card-animation-background  e-flex e-con e-child\" data-id=\"f87bf2a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3406f13 e-con-full e-flex e-con e-child\" data-id=\"3406f13\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c775489 elementor-widget elementor-widget-heading\" data-id=\"c775489\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Leggerezza e compatibilit\u00e0<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-416a4d6 e-con-full e-flex e-con e-child\" data-id=\"416a4d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e9a0a42 elementor-widget elementor-widget-text-editor\" data-id=\"e9a0a42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Non esegue scansioni file invasive e pu\u00f2 convivere con gli strumenti di sicurezza gi\u00e0 installati, riducendo conflitti e complessit\u00e0.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"4\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 di 6\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2326e6f e-flex e-con-boxed e-con e-child\" data-id=\"2326e6f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-06b492d e-con-full hover-element card-animation-background  e-flex e-con e-child\" data-id=\"06b492d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-465b415 e-con-full e-flex e-con e-child\" data-id=\"465b415\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fdd8dfc elementor-widget elementor-widget-heading\" data-id=\"fdd8dfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Risposta<br> autonoma<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-85ce745 e-con-full e-flex e-con e-child\" data-id=\"85ce745\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da5f435 elementor-widget elementor-widget-text-editor\" data-id=\"da5f435\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Non si limita a mostrare il problema: pu\u00f2 attivare contromisure immediate e proporzionate in base al livello di rischio.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"5\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 di 6\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7d11504 e-flex e-con-boxed e-con e-child\" data-id=\"7d11504\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fe2a773 e-con-full hover-element card-animation-background  e-flex e-con e-child\" data-id=\"fe2a773\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-bffc837 e-con-full e-flex e-con e-child\" data-id=\"bffc837\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1657065 elementor-widget elementor-widget-heading\" data-id=\"1657065\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Supporto a <br>compliance e audit<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-917161d e-con-full e-flex e-con e-child\" data-id=\"917161d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a3a29a elementor-widget elementor-widget-text-editor\" data-id=\"1a3a29a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La tracciabilit\u00e0 degli eventi e la qualit\u00e0 del dato raccolto rafforzano indagini, audit, accountability e requisiti normativi.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" data-slide=\"6\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 di 6\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-16b3fb0 e-flex e-con-boxed e-con e-child\" data-id=\"16b3fb0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-da980db e-con-full hover-element card-animation-background  e-flex e-con e-child\" data-id=\"da980db\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;none&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-0cd8d2a e-con-full e-flex e-con e-child\" data-id=\"0cd8d2a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a79f9d4 elementor-widget elementor-widget-heading\" data-id=\"a79f9d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Deployment rapido, integrazione immediata<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c8e5686 e-con-full e-flex e-con e-child\" data-id=\"c8e5686\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66e8e28 elementor-widget elementor-widget-text-editor\" data-id=\"66e8e28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Progettato per essere distribuito in modo semplice, veloce e non invasivo. L\u2019obiettivo \u00e8 ridurre al minimo l\u2019attrito tecnico: installazione rapida.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\" aria-label=\"Precedente\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\" aria-label=\"Successivo\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f35f5d0 e-flex e-con-boxed e-con e-parent\" data-id=\"f35f5d0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7b3257e e-con-full e-flex e-con e-child\" data-id=\"7b3257e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26dcae7 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"26dcae7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Deployment Zero-Friction: dall'installazione all'operativit\u00e0.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8957c0 button-lecs e-transform elementor-invisible elementor-widget elementor-widget-button\" data-id=\"f8957c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_translateX_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-5,&quot;sizes&quot;:[]},&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_transform_translateX_effect_hover_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateX_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_translateY_effect_hover_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"1351\" height=\"1351\" viewBox=\"0 0 1351 1351\" fill=\"none\"><path d=\"M0 675.5C0 302.432 302.432 0 675.5 0C1048.57 0 1351 302.432 1351 675.5C1351 1048.57 1048.57 1351 675.5 1351C302.432 1351 0 1048.57 0 675.5Z\" fill=\"black\"><\/path><path d=\"M534.791 534.772H816.249V816.231\" stroke=\"white\" stroke-width=\"56.2917\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><path d=\"M534.791 816.231L816.249 534.772\" stroke=\"white\" stroke-width=\"56.2917\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">APPROFONDISCI LA GAMMA PLATFORM<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb3a36c e-con-full e-flex e-con e-child\" data-id=\"eb3a36c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-66eb8f9 e-grid e-con-full e-con e-child\" data-id=\"66eb8f9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-00d4470 e-con-full neon e-flex e-con e-child\" data-id=\"00d4470\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f37f075 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"f37f075\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">01 | Distribuzione Scalabile<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0db6ee5 elementor-widget elementor-widget-text-editor\" data-id=\"0db6ee5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L\u2019agent pu\u00f2 essere distribuito in modo centralizzato su singoli host o su interi parchi macchine, semplificando rollout e governance operativa.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-314dea3 e-con-full neon e-flex e-con e-child\" data-id=\"314dea3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-372ee01 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"372ee01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">02 | Avvio zero friction<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d203c58 elementor-widget elementor-widget-text-editor\" data-id=\"d203c58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L\u2019installazione \u00e8 pensata per ridurre impatto e tempi di attivazione, cos\u00ec il team tecnico pu\u00f2 introdurre il nuovo layer di protezione senza interrompere i flussi esistenti.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d43840c e-con-full neon e-flex e-con e-child\" data-id=\"d43840c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-77fd2d5 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"77fd2d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">03 | Apprendimento del contesto<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6459c87 elementor-widget elementor-widget-text-editor\" data-id=\"6459c87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Una volta connesso alla piattaforma, Tiresia inizia a osservare il contesto operativo per distinguere pi\u00f9 rapidamente il comportamento normale dalle anomalie.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-03f48dd e-con-full e-flex e-con e-child\" data-id=\"03f48dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4278a2a elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"4278a2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Domande frequenti su l'AI AGENT.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efd3037 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"efd3037\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Tutto quello che devi sapere sull&#8217;AI Agent di LECS.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-534890c elementor-widget elementor-widget-n-accordion\" data-id=\"534890c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-8730\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-8730\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> In cosa L'AGENT si differenzia da un antivirus o da un EDR tradizionale? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8730\" class=\"elementor-element elementor-element-b2d86b3 e-con-full e-flex e-con e-child\" data-id=\"b2d86b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a036247 elementor-widget elementor-widget-text-editor\" data-id=\"a036247\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Antivirus ed EDR tradizionali si concentrano soprattutto su malware, file sospetti, firme e processi noti. Tiresia aggiunge un livello diverso di analisi: osserva identit\u00e0, comportamento, contesto e segnali di rete host-based per rilevare accessi anomali, abusi di credenziali e movimenti laterali che spesso sfuggono agli strumenti convenzionali.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-8731\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-8731\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> L'AGENT sostituisce l\u2019EDR gi\u00e0 installato? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8731\" class=\"elementor-element elementor-element-28af578 e-con-full e-flex e-con e-child\" data-id=\"28af578\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1289e10 elementor-widget elementor-widget-text-editor\" data-id=\"1289e10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>No. L&#8217;AGENT nasce per essere complementare. Si integra con la protezione esistente e aggiunge un layer di intelligence comportamentale e visibilit\u00e0 host-based senza imporre la sostituzione dello stack gi\u00e0 adottato.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-8732\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-8732\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Pu\u00f2 rilevare anche attacchi senza malware evidente sul disco? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8732\" class=\"elementor-element elementor-element-7062d32 e-con-full e-flex e-con e-child\" data-id=\"7062d32\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2731b2a elementor-widget elementor-widget-text-editor\" data-id=\"2731b2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>S\u00ec. L&#8217;AGENT \u00e8 progettato proprio per individuare scenari in cui l\u2019attaccante usa strumenti legittimi, credenziali rubate, accessi remoti o tecniche fileless. In questi casi il segnale utile non \u00e8 il file, ma il comportamento fuori contesto.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-8733\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-8733\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00c8 compatibile con ambienti gi\u00e0 protetti da altri vendor? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8733\" class=\"elementor-element elementor-element-b77b4c0 e-con-full e-flex e-con e-child\" data-id=\"b77b4c0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52d1855 elementor-widget elementor-widget-text-editor\" data-id=\"52d1855\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>S\u00ec. Uno dei punti di forza del prodotto \u00e8 la coesistenza con software di sicurezza gi\u00e0 presenti, grazie a un approccio leggero e non focalizzato sulla scansione file.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-8734\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-8734\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Quali benefici porta a partner e clienti finali? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8734\" class=\"elementor-element elementor-element-0813b73 e-con-full e-flex e-con e-child\" data-id=\"0813b73\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0627d81 elementor-widget elementor-widget-text-editor\" data-id=\"0627d81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Per il cliente finale significa pi\u00f9 visibilit\u00e0, migliore rilevazione di anomalie e protezione complementare agli strumenti gi\u00e0 presenti. Per i partner significa offrire un nuovo livello di valore, pi\u00f9 facile da proporre perch\u00e9 non richiede di sostituire l\u2019esistente ma di potenziarlo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>NEXT RELEASE: L&#8217;unico Agent AI che anticipa le intenzioni dei cyber criminali. Il modulo software di LECS Platform che analizza comportamento, contesto e identit\u00e0 in tempo reale per rilevare abusi di credenziali, movimenti laterali e minacce interne prima che diventino un danno operativo. SCOPRI COME ANTICIPA LE MINACCE Perch\u00e9 l\u2019EDR tradizionale non \u00e8 pi\u00f9 sufficiente? [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":7285,"parent":2131,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2146","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI Agent Cybersecurity: TIRESIA e la Difesa Proattiva - LECS<\/title>\n<meta name=\"description\" content=\"Proteggi i tuoi endpoint con l&#039;AI Agent Cybersecurity di TIRESIA. Analisi contestuale, difesa proattiva e zero impatto sulle performance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI Agent Cybersecurity: TIRESIA e la Difesa Proattiva - LECS\" \/>\n<meta property=\"og:description\" content=\"Proteggi i tuoi endpoint con l&#039;AI Agent Cybersecurity di TIRESIA. Analisi contestuale, difesa proattiva e zero impatto sulle performance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"LECS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Lecs.Cyber.Sec\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-24T15:27:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/lecs-tecnologia-ndr.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/\",\"url\":\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/\",\"name\":\"AI Agent Cybersecurity: TIRESIA e la Difesa Proattiva - LECS\",\"isPartOf\":{\"@id\":\"https:\/\/lecs.io\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/lecs-tecnologia-ndr.jpg\",\"datePublished\":\"2026-02-03T15:05:40+00:00\",\"dateModified\":\"2026-03-24T15:27:50+00:00\",\"description\":\"Proteggi i tuoi endpoint con l'AI Agent Cybersecurity di TIRESIA. Analisi contestuale, difesa proattiva e zero impatto sulle performance.\",\"breadcrumb\":{\"@id\":\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/lecs-tecnologia-ndr.jpg\",\"contentUrl\":\"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/lecs-tecnologia-ndr.jpg\",\"width\":1200,\"height\":630,\"caption\":\"LECS: Protezione intelligente e automatica per il futuro digitale.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lecs.io\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lecs Platform\",\"item\":\"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Agent\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lecs.io\/it\/#website\",\"url\":\"https:\/\/lecs.io\/it\/\",\"name\":\"LECS\",\"description\":\"Protect your future today\",\"publisher\":{\"@id\":\"https:\/\/lecs.io\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lecs.io\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lecs.io\/it\/#organization\",\"name\":\"LECS\",\"alternateName\":\"Protect your future today\",\"url\":\"https:\/\/lecs.io\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/lecs.io\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/logo-lecs.png\",\"contentUrl\":\"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/logo-lecs.png\",\"width\":1200,\"height\":675,\"caption\":\"LECS\"},\"image\":{\"@id\":\"https:\/\/lecs.io\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Lecs.Cyber.Sec\/\",\"https:\/\/it.linkedin.com\/company\/lecs-security\",\"https:\/\/www.instagram.com\/lecs_security\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI Agent Cybersecurity: TIRESIA e la Difesa Proattiva - LECS","description":"Proteggi i tuoi endpoint con l'AI Agent Cybersecurity di TIRESIA. Analisi contestuale, difesa proattiva e zero impatto sulle performance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/","og_locale":"it_IT","og_type":"article","og_title":"AI Agent Cybersecurity: TIRESIA e la Difesa Proattiva - LECS","og_description":"Proteggi i tuoi endpoint con l'AI Agent Cybersecurity di TIRESIA. Analisi contestuale, difesa proattiva e zero impatto sulle performance.","og_url":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/","og_site_name":"LECS","article_publisher":"https:\/\/www.facebook.com\/Lecs.Cyber.Sec\/","article_modified_time":"2026-03-24T15:27:50+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/lecs-tecnologia-ndr.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tempo di lettura stimato":"8 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/","url":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/","name":"AI Agent Cybersecurity: TIRESIA e la Difesa Proattiva - LECS","isPartOf":{"@id":"https:\/\/lecs.io\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/lecs-tecnologia-ndr.jpg","datePublished":"2026-02-03T15:05:40+00:00","dateModified":"2026-03-24T15:27:50+00:00","description":"Proteggi i tuoi endpoint con l'AI Agent Cybersecurity di TIRESIA. Analisi contestuale, difesa proattiva e zero impatto sulle performance.","breadcrumb":{"@id":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/#primaryimage","url":"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/lecs-tecnologia-ndr.jpg","contentUrl":"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/lecs-tecnologia-ndr.jpg","width":1200,"height":630,"caption":"LECS: Protezione intelligente e automatica per il futuro digitale."},{"@type":"BreadcrumbList","@id":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/lecs-ai-agent-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lecs.io\/it\/"},{"@type":"ListItem","position":2,"name":"Lecs Platform","item":"https:\/\/lecs.io\/it\/lecs-platform-cyber-security-ndr\/"},{"@type":"ListItem","position":3,"name":"Agent"}]},{"@type":"WebSite","@id":"https:\/\/lecs.io\/it\/#website","url":"https:\/\/lecs.io\/it\/","name":"LECS","description":"Protect your future today","publisher":{"@id":"https:\/\/lecs.io\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lecs.io\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/lecs.io\/it\/#organization","name":"LECS","alternateName":"Protect your future today","url":"https:\/\/lecs.io\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/lecs.io\/it\/#\/schema\/logo\/image\/","url":"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/logo-lecs.png","contentUrl":"https:\/\/lecs.io\/wp-content\/uploads\/2026\/03\/logo-lecs.png","width":1200,"height":675,"caption":"LECS"},"image":{"@id":"https:\/\/lecs.io\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Lecs.Cyber.Sec\/","https:\/\/it.linkedin.com\/company\/lecs-security","https:\/\/www.instagram.com\/lecs_security\/"]}]}},"_links":{"self":[{"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/pages\/2146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/comments?post=2146"}],"version-history":[{"count":275,"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/pages\/2146\/revisions"}],"predecessor-version":[{"id":7523,"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/pages\/2146\/revisions\/7523"}],"up":[{"embeddable":true,"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/pages\/2131"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/media\/7285"}],"wp:attachment":[{"href":"https:\/\/lecs.io\/it\/wp-json\/wp\/v2\/media?parent=2146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}